Jove
Visualize
Contact Us
  1. Home
  2. Research Domains
  3. Information And Computing Sciences
  4. Theory Of Computation
  5. Data Structures And Algorithms
  6. Multi-key Hybrid Encryption Optical Codebook Based On Five-dimensional Hamiltonian Conservative Chaotic System

Multi-key hybrid encryption optical codebook based on five-dimensional Hamiltonian conservative chaotic system

Wei Zhang, Nana Yu, Xiangxiang Ji

Optics Express|June 14, 2025

Related Experiment Videos

View abstract on PubMed

Summary

A novel computational holographic optical codebook, utilizing a chaotic system and hybrid encryption, offers enhanced security and capacity. This method effectively resists brute-force attacks, showing significant practical value for secure data storage.

Area of Science:

  • Optics and Photonics
  • Information Security
  • Computational Science

Background:

  • Traditional codebook methods struggle with information capacity and security in the era of big data.
  • Brute-force attacks pose a significant threat to conventional encryption techniques.

Purpose of the Study:

  • To propose a computational holographic optical codebook for enhanced information capacity and security.
  • To develop a system resistant to brute-force attacks using chaotic encryption.

Main Methods:

  • A five-dimensional Hamiltonian conservative chaotic system (FHCCS) was employed.
  • Chaotic sequences generated by multiple keys were used for encrypting codebooks and ciphertexts.
  • Computer-generated holography (CGH) was utilized for codebook creation with hybrid encryption.

Main Results:

  • The proposed optical codebook demonstrated high security and large information capacity.
  • Fast decryption speeds and strong resistance to brute-force attacks were achieved.
  • Theoretical and experimental results validated the system's effectiveness.

Conclusions:

  • The computational holographic optical codebook presents a robust solution for secure data storage.
  • The hybrid encryption approach significantly enhances security against sophisticated attacks.
  • The system exhibits considerable practical value due to its security, capacity, and speed.

Related Experiment Videos

Related Concept Videos

JoVE
x logofacebook logolinkedin logoyoutube logo
ABOUT JoVE
OverviewLeadershipBlogJoVE Help Center
AUTHORS
Publishing ProcessEditorial BoardScope & PoliciesPeer ReviewFAQSubmit
LIBRARIANS
TestimonialsSubscriptionsAccessResourcesLibrary Advisory BoardFAQ
RESEARCH
JoVE JournalMethods CollectionsJoVE Encyclopedia of ExperimentsArchive
EDUCATION
JoVE CoreJoVE BusinessJoVE Science EducationJoVE Lab ManualFaculty Resource CenterFaculty Site

Terms & Conditions of Use
Privacy Policy
Policies