Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3122
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
In this paper, the security of an optical cryptosystem based on double random phase encoding (DRPE) with perfect forward secrecy (PFS) is analyzed for a particular session. In the cryptosystem, the PFS strategy is utilized to enhance the security and key management of the traditional DRPE scheme. Our analysis reveals that the use of PFS has certain advantages in the key management approach, but the method is still vulnerable against modified plaintext attacks when the attack is performed in the same session. Also, it is noted that the method is safe against conventional plaintext attacks, but it is vulnerable to the modified chosen and known plaintext attacks. The original plaintext can be easily retrieved with the proposed attack algorithms. Numerical simulation results are presented to validate the effectiveness of the proposed attack algorithms.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1364/AO.446070 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!