Cargando…
Encryption in phase space for classical coherent optical communications
Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls when proper safeguards are not put into place. Encrypting data using a random phase mask is a simple yet effective way t...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10415392/ https://www.ncbi.nlm.nih.gov/pubmed/37563146 http://dx.doi.org/10.1038/s41598-023-39621-5 |
_version_ | 1785087528422866944 |
---|---|
author | Chan, Adrian Khalil, Mostafa Shahriar, Kh Arif Plant, David V. Chen, Lawrence R. Kuang, Randy |
author_facet | Chan, Adrian Khalil, Mostafa Shahriar, Kh Arif Plant, David V. Chen, Lawrence R. Kuang, Randy |
author_sort | Chan, Adrian |
collection | PubMed |
description | Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls when proper safeguards are not put into place. Encrypting data using a random phase mask is a simple yet effective way to bolster the data security at the physical layer. Since the interactions of the random phases used for such encryption heavily depend on system properties like data rate, modulation format, distance, degree of phase randomness, laser properties, etc., it is important to determine the optimum operating conditions for different scenarios. In this work, assuming that the transmitter and the receiver have a secret pre-shared key, we present a theoretical study of security in such a system through mutual information analysis. Next, we determine operating conditions which ensure security for 4-PSK, 16-PSK, and 128-QAM formats through numerical simulation. Moreover, we provide an experimental demonstration of the system using 16-QAM modulation. We then use numerical simulation to verify the efficacy of the encryption and study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data. The results demonstrate that the system is secure against a tapping attack if an attacker has no information of the phase modulator and pre-shared key. |
format | Online Article Text |
id | pubmed-10415392 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-104153922023-08-12 Encryption in phase space for classical coherent optical communications Chan, Adrian Khalil, Mostafa Shahriar, Kh Arif Plant, David V. Chen, Lawrence R. Kuang, Randy Sci Rep Article Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls when proper safeguards are not put into place. Encrypting data using a random phase mask is a simple yet effective way to bolster the data security at the physical layer. Since the interactions of the random phases used for such encryption heavily depend on system properties like data rate, modulation format, distance, degree of phase randomness, laser properties, etc., it is important to determine the optimum operating conditions for different scenarios. In this work, assuming that the transmitter and the receiver have a secret pre-shared key, we present a theoretical study of security in such a system through mutual information analysis. Next, we determine operating conditions which ensure security for 4-PSK, 16-PSK, and 128-QAM formats through numerical simulation. Moreover, we provide an experimental demonstration of the system using 16-QAM modulation. We then use numerical simulation to verify the efficacy of the encryption and study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data. The results demonstrate that the system is secure against a tapping attack if an attacker has no information of the phase modulator and pre-shared key. Nature Publishing Group UK 2023-08-10 /pmc/articles/PMC10415392/ /pubmed/37563146 http://dx.doi.org/10.1038/s41598-023-39621-5 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Chan, Adrian Khalil, Mostafa Shahriar, Kh Arif Plant, David V. Chen, Lawrence R. Kuang, Randy Encryption in phase space for classical coherent optical communications |
title | Encryption in phase space for classical coherent optical communications |
title_full | Encryption in phase space for classical coherent optical communications |
title_fullStr | Encryption in phase space for classical coherent optical communications |
title_full_unstemmed | Encryption in phase space for classical coherent optical communications |
title_short | Encryption in phase space for classical coherent optical communications |
title_sort | encryption in phase space for classical coherent optical communications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10415392/ https://www.ncbi.nlm.nih.gov/pubmed/37563146 http://dx.doi.org/10.1038/s41598-023-39621-5 |
work_keys_str_mv | AT chanadrian encryptioninphasespaceforclassicalcoherentopticalcommunications AT khalilmostafa encryptioninphasespaceforclassicalcoherentopticalcommunications AT shahriarkharif encryptioninphasespaceforclassicalcoherentopticalcommunications AT plantdavidv encryptioninphasespaceforclassicalcoherentopticalcommunications AT chenlawrencer encryptioninphasespaceforclassicalcoherentopticalcommunications AT kuangrandy encryptioninphasespaceforclassicalcoherentopticalcommunications |