Cargando…

Encryption in phase space for classical coherent optical communications

Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls when proper safeguards are not put into place. Encrypting data using a random phase mask is a simple yet effective way t...

Descripción completa

Detalles Bibliográficos
Autores principales: Chan, Adrian, Khalil, Mostafa, Shahriar, Kh Arif, Plant, David V., Chen, Lawrence R., Kuang, Randy
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10415392/
https://www.ncbi.nlm.nih.gov/pubmed/37563146
http://dx.doi.org/10.1038/s41598-023-39621-5
_version_ 1785087528422866944
author Chan, Adrian
Khalil, Mostafa
Shahriar, Kh Arif
Plant, David V.
Chen, Lawrence R.
Kuang, Randy
author_facet Chan, Adrian
Khalil, Mostafa
Shahriar, Kh Arif
Plant, David V.
Chen, Lawrence R.
Kuang, Randy
author_sort Chan, Adrian
collection PubMed
description Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls when proper safeguards are not put into place. Encrypting data using a random phase mask is a simple yet effective way to bolster the data security at the physical layer. Since the interactions of the random phases used for such encryption heavily depend on system properties like data rate, modulation format, distance, degree of phase randomness, laser properties, etc., it is important to determine the optimum operating conditions for different scenarios. In this work, assuming that the transmitter and the receiver have a secret pre-shared key, we present a theoretical study of security in such a system through mutual information analysis. Next, we determine operating conditions which ensure security for 4-PSK, 16-PSK, and 128-QAM formats through numerical simulation. Moreover, we provide an experimental demonstration of the system using 16-QAM modulation. We then use numerical simulation to verify the efficacy of the encryption and study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data. The results demonstrate that the system is secure against a tapping attack if an attacker has no information of the phase modulator and pre-shared key.
format Online
Article
Text
id pubmed-10415392
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-104153922023-08-12 Encryption in phase space for classical coherent optical communications Chan, Adrian Khalil, Mostafa Shahriar, Kh Arif Plant, David V. Chen, Lawrence R. Kuang, Randy Sci Rep Article Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls when proper safeguards are not put into place. Encrypting data using a random phase mask is a simple yet effective way to bolster the data security at the physical layer. Since the interactions of the random phases used for such encryption heavily depend on system properties like data rate, modulation format, distance, degree of phase randomness, laser properties, etc., it is important to determine the optimum operating conditions for different scenarios. In this work, assuming that the transmitter and the receiver have a secret pre-shared key, we present a theoretical study of security in such a system through mutual information analysis. Next, we determine operating conditions which ensure security for 4-PSK, 16-PSK, and 128-QAM formats through numerical simulation. Moreover, we provide an experimental demonstration of the system using 16-QAM modulation. We then use numerical simulation to verify the efficacy of the encryption and study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data. The results demonstrate that the system is secure against a tapping attack if an attacker has no information of the phase modulator and pre-shared key. Nature Publishing Group UK 2023-08-10 /pmc/articles/PMC10415392/ /pubmed/37563146 http://dx.doi.org/10.1038/s41598-023-39621-5 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Chan, Adrian
Khalil, Mostafa
Shahriar, Kh Arif
Plant, David V.
Chen, Lawrence R.
Kuang, Randy
Encryption in phase space for classical coherent optical communications
title Encryption in phase space for classical coherent optical communications
title_full Encryption in phase space for classical coherent optical communications
title_fullStr Encryption in phase space for classical coherent optical communications
title_full_unstemmed Encryption in phase space for classical coherent optical communications
title_short Encryption in phase space for classical coherent optical communications
title_sort encryption in phase space for classical coherent optical communications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10415392/
https://www.ncbi.nlm.nih.gov/pubmed/37563146
http://dx.doi.org/10.1038/s41598-023-39621-5
work_keys_str_mv AT chanadrian encryptioninphasespaceforclassicalcoherentopticalcommunications
AT khalilmostafa encryptioninphasespaceforclassicalcoherentopticalcommunications
AT shahriarkharif encryptioninphasespaceforclassicalcoherentopticalcommunications
AT plantdavidv encryptioninphasespaceforclassicalcoherentopticalcommunications
AT chenlawrencer encryptioninphasespaceforclassicalcoherentopticalcommunications
AT kuangrandy encryptioninphasespaceforclassicalcoherentopticalcommunications