2022
DOI: 10.1364/jocn.444398
|View full text |Cite
|
Sign up to set email alerts
|

LPsec: a fast and secure cryptographic system for optical connections

Abstract: The high capacity and low latency of optical connections are ideal for supporting the current and future communication services, including 5G and beyond. Although some of those services are already secured at the packet layer using standard stream ciphers, like Advanced Encryption Standard (AES) and ChaCha, secure transmission at the optical layer is still not implemented. To secure the optical layer, cryptographic methods need to be fast enough to support high-speed optical transmission and cannot introduce s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 24 publications
(33 reference statements)
0
3
0
Order By: Relevance
“…Technology is developing rapidly, and soon quantum computers will exchange quantum messages among themselves, enabling distributed quantum computing. Such quantum computers, connected by the quantum Internet, can be used for various applications ranging from quantum key distribution (QKD) [ 1 ] to specialized quantum computing tasks [ 2 ], while guaranteeing information-theoretic security governed by the laws of quantum mechanics, i.e., perfect security as compared to classical approaches [ 3 ]. However, there is a fundamental barrier to the development of distributed quantum computing: the no-cloning theorem [ 4 ], which makes perfect quantum bit (qubit)—the fundamental unit of quantum information—duplication impossible.…”
Section: Introductionmentioning
confidence: 99%
“…Technology is developing rapidly, and soon quantum computers will exchange quantum messages among themselves, enabling distributed quantum computing. Such quantum computers, connected by the quantum Internet, can be used for various applications ranging from quantum key distribution (QKD) [ 1 ] to specialized quantum computing tasks [ 2 ], while guaranteeing information-theoretic security governed by the laws of quantum mechanics, i.e., perfect security as compared to classical approaches [ 3 ]. However, there is a fundamental barrier to the development of distributed quantum computing: the no-cloning theorem [ 4 ], which makes perfect quantum bit (qubit)—the fundamental unit of quantum information—duplication impossible.…”
Section: Introductionmentioning
confidence: 99%
“…Many physically secure structures based on chaotic systems have also been proposed and investigated [19]- [23]. [19] provides a method to apply chaotic optical carriers into a system to achieve signal encryption, however, an eavesdropper may simply use a direct detection-based receiver and a filter with a suitable cut-off frequency to recover the data.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore the basic technique for physical layer security in [21] is investigated in intensity modulation and direct detection (IMDD) transmission systems only, thus the suitability of the security technique to coherent systems is also an important factor to consider as coherent optical systems are employed for high speed, long-reach optical communications where security is also vital. A technique for physical layer security in coherent optical systems is proposed in [23], however this technique has the major disadvantage that it cannot be retrofitted to existing coherent transmission systems, because the secure system is realized by introducing a cipher-based algorithm at the bit level.…”
Section: Introductionmentioning
confidence: 99%
“…Chapter 4 focuses on goal G.1 and covers physical layer cryptography. This chapter is based on the journal publication [JOCN22].…”
Section: Thesis Outlinementioning
confidence: 99%
“…The technology is developing rapidly, and soon quantum computers will exchange quantum messages among themselves, enabling distributed quantum computing. Such quantum computers, connected by quantum Internet, can be used for various applications ranging from quantum key distribution (QKD) [Ah22] to specialized quantum computing tasks [WeS18], while guaranteeing information-theoretic security governed by the laws of quantum mechanics, i.e., perfect security as compared to classical approaches [JOCN22]. However, there is a fundamental barrier: the no-cloning theorem [Wo82], which makes perfect duplication of a quantum bit (qubit) -the fundamental unit of quantum information-impossible.…”
Section: Introductionmentioning
confidence: 99%