Abstract:There has been an increased interest in enhancing the security of optical communications systems and networks. All-optical cryptography methods have been considered as an alternative to electronic data encryption. In this paper we propose and verify the use of a novel all-optical scheme based on cryptographic keys applied on the spectral signal for encryption of the M-QAM modulated data with bit rates of up to 200 gigabits per second.
“…Herewith, we extend our previous analyses [5,6] by doubling the encoding-decoding stages applied on spectral slices obtained by optical band-pass filters (OBPFs) having identical 3-dB bandwidths. Encoding is done by independently applying a precise amount of phase-shift and delay making to each slice, which makes the signal data meaningless until the signal recovery is applied.…”
Section: Introductionmentioning
confidence: 82%
“…At the decoder (OD), which is aware of the OE key, the signal is re-sliced again (identically as in OE), where each portion i undergoes time delay, τ max -τ ι , and phase-shift ϕ max -ϕ ι (where τ max and ϕ max stand for maximum τ i and ϕ i of K e , respectively). A mathematical description for this proposal is presented in [6]. The OD reverses the delay to the correct time reference basis and to compensate for the amount of shiftedphase by knowing in advance the cryptographic key.…”
Section: Cyphering Technique and Double-encoding Schemesmentioning
confidence: 99%
“…On the other hand, the BER for the decoded signal should be below the FEC limit. As, in [6], in this work we assume that BER FEC = 2×10 -3 and that a valid cryptographic key occurs when BER e ≥ 10 -1 . Generally speaking, the higher the number of spectral slices, the longer the cryptographic key and the more secure communication becomes.…”
Section: Cyphering Technique and Double-encoding Schemesmentioning
confidence: 99%
“…Nevertheless, the investigated technique could also be applied to signals with other bit rates and modulation formats as in our previous work [5,6]. To investigate the sensitivity performance, we initially simulated the single-encoding Figure 3(a) shows the spectrum for the sliced signal, whereas Fig.…”
Section: Sensitivity Performancementioning
confidence: 99%
“…The SPE approach has shown effective protection on optical CDMA (OCDMA) channels, but may not be suitable for systems with high number of WDM channels. On the other side, the encoding of spectrum slices have been a technique showing a high potential for optical encryption of WDM signals with different modulation formats, [5,6].…”
The ever-growing demand for optical network security can be addressed by data encryption at different network layers. In this work, we consider all-optical cryptography technique that applies a spectral phase change and delay encoding on spectrum slices of a specified WDM channel. In this case we have investigated a novel approach where signals are double encrypted to achieve an enhanced degree of security. Simulation results indicate that such double cyphering scheme can be applied to high data-rate M-QAM signals propagating in metro/regional networks.
“…Herewith, we extend our previous analyses [5,6] by doubling the encoding-decoding stages applied on spectral slices obtained by optical band-pass filters (OBPFs) having identical 3-dB bandwidths. Encoding is done by independently applying a precise amount of phase-shift and delay making to each slice, which makes the signal data meaningless until the signal recovery is applied.…”
Section: Introductionmentioning
confidence: 82%
“…At the decoder (OD), which is aware of the OE key, the signal is re-sliced again (identically as in OE), where each portion i undergoes time delay, τ max -τ ι , and phase-shift ϕ max -ϕ ι (where τ max and ϕ max stand for maximum τ i and ϕ i of K e , respectively). A mathematical description for this proposal is presented in [6]. The OD reverses the delay to the correct time reference basis and to compensate for the amount of shiftedphase by knowing in advance the cryptographic key.…”
Section: Cyphering Technique and Double-encoding Schemesmentioning
confidence: 99%
“…On the other hand, the BER for the decoded signal should be below the FEC limit. As, in [6], in this work we assume that BER FEC = 2×10 -3 and that a valid cryptographic key occurs when BER e ≥ 10 -1 . Generally speaking, the higher the number of spectral slices, the longer the cryptographic key and the more secure communication becomes.…”
Section: Cyphering Technique and Double-encoding Schemesmentioning
confidence: 99%
“…Nevertheless, the investigated technique could also be applied to signals with other bit rates and modulation formats as in our previous work [5,6]. To investigate the sensitivity performance, we initially simulated the single-encoding Figure 3(a) shows the spectrum for the sliced signal, whereas Fig.…”
Section: Sensitivity Performancementioning
confidence: 99%
“…The SPE approach has shown effective protection on optical CDMA (OCDMA) channels, but may not be suitable for systems with high number of WDM channels. On the other side, the encoding of spectrum slices have been a technique showing a high potential for optical encryption of WDM signals with different modulation formats, [5,6].…”
The ever-growing demand for optical network security can be addressed by data encryption at different network layers. In this work, we consider all-optical cryptography technique that applies a spectral phase change and delay encoding on spectrum slices of a specified WDM channel. In this case we have investigated a novel approach where signals are double encrypted to achieve an enhanced degree of security. Simulation results indicate that such double cyphering scheme can be applied to high data-rate M-QAM signals propagating in metro/regional networks.
In this paper, a novel secure communication scheme based on temporal spreading and dual-phase perturbation is proposed to improve security at the physical layer. For one thing, the traditional electro-optical feedback phase encryption system is significantly sophisticated by the introduction of additional synchronized chaotic phase encryption. Besides, more keys in this system are available, with the attendance of dispersion and optical chaos, the key space is notably enhanced to ∼236, resisting the eavesdropping attacks. After passing through a series of encryption devices, the information is ultimately displayed as a noise-like signal. A 32 Gb s−1 on-off keying signal is successfully transmitted over a 100 km standard single-mode fiber. Simulation results show that by selecting the appropriate system parameters, a bit error rate as low as 10−10 can be obtained for legitimate terminals, and the effect of different hardware parameter mismatches on the decryption performance is also investigated which indicates a certain tolerance range for the mismatch of each parameter. This paper provides a new idea to combine an electro-optical feedback system with optical chaos to establish optical secrecy communication.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.