The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1364/ao.54.004359
|View full text |Cite
|
Sign up to set email alerts
|

All-optical cryptography of M-QAM formats by using two-dimensional spectrally sliced keys

Abstract: There has been an increased interest in enhancing the security of optical communications systems and networks. All-optical cryptography methods have been considered as an alternative to electronic data encryption. In this paper we propose and verify the use of a novel all-optical scheme based on cryptographic keys applied on the spectral signal for encryption of the M-QAM modulated data with bit rates of up to 200 gigabits per second.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0
5

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 12 publications
0
10
0
5
Order By: Relevance
“…Herewith, we extend our previous analyses [5,6] by doubling the encoding-decoding stages applied on spectral slices obtained by optical band-pass filters (OBPFs) having identical 3-dB bandwidths. Encoding is done by independently applying a precise amount of phase-shift and delay making to each slice, which makes the signal data meaningless until the signal recovery is applied.…”
Section: Introductionmentioning
confidence: 82%
See 4 more Smart Citations
“…Herewith, we extend our previous analyses [5,6] by doubling the encoding-decoding stages applied on spectral slices obtained by optical band-pass filters (OBPFs) having identical 3-dB bandwidths. Encoding is done by independently applying a precise amount of phase-shift and delay making to each slice, which makes the signal data meaningless until the signal recovery is applied.…”
Section: Introductionmentioning
confidence: 82%
“…At the decoder (OD), which is aware of the OE key, the signal is re-sliced again (identically as in OE), where each portion i undergoes time delay, τ max -τ ι , and phase-shift ϕ max -ϕ ι (where τ max and ϕ max stand for maximum τ i and ϕ i of K e , respectively). A mathematical description for this proposal is presented in [6]. The OD reverses the delay to the correct time reference basis and to compensate for the amount of shiftedphase by knowing in advance the cryptographic key.…”
Section: Cyphering Technique and Double-encoding Schemesmentioning
confidence: 99%
See 3 more Smart Citations