Share This Article:

All-Optical Cryptographic Device for Secure Communication

Abstract Full-Text HTML Download Download as PDF (Size:286KB) PP. 235-245
DOI: 10.4236/cn.2010.24034    6,153 Downloads   10,103 Views   Citations

ABSTRACT

An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a function of an encryption serial key that merge with the data stream, generating a ciphered stream. The greatest advantage of the device is real-time encrypting – data can be transmitted at the original speed without slowing down.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

F. Garzia and R. Cusani, "All-Optical Cryptographic Device for Secure Communication," Communications and Network, Vol. 2 No. 4, 2010, pp. 235-245. doi: 10.4236/cn.2010.24034.

References

[1] R. Y. Ciao, E. Garmire and C. H. Townes, “Self-Trapping of Optical Beams,” Physical Review Letters, Vol. 13, No. 15, 1964, pp. 479-482.
[2] B. Luther-Davies and Y. Xiaoping, “Waveguides and Y Junctions Formed in Self-Defocusing Dark Spatial Soliton,” Optics Letters, Vol. 17, No. 7, 1992, pp. 496-498.
[3] W. Krolikowski and Y. S. Kivshar, “Soliton-Based Optical Switching In Waveguide Arrays,” Journal of the Optical Society of America B, Vol. 13, No. 5, 1996, pp. 876-887.
[4] N. N. Akhmediev and A. Ankiewicz, “Spatial Soliton X-Junctions and Couplers,” Optics Communications, Vol. 100, No. 1-4, 1993, pp. 186-192.
[5] W. Krolikowski, X. Yang, B. Luther-Davies and J. Breslin, “Dark Soliton Steering in a Saturable Nonlinear Medium,” Optics Communications, Vol. 105, No. 3-4, 1994, pp. 219-225.
[6] A. P. Sheppard, “Devices Written by Colliding Spatial Solitons: A Coupled Mode Theory Approach,” Optics Communications, Vol. 102, No. 3-4, 1993, pp. 317-323.
[7] J. P. Gordon, “Interaction Forces among Solitons in Optical Fibers,” Optics Letters, Vol. 8, No. 11, 1983, pp. 596-598.
[8] F. Garzia, C. Sibilia, M. Bertolotti, R. Horak and J. Bajer, “Phase Properties of a Two-Soliton System in a Non Linear Planar Waveguide,” Optics Communications, Vol. 108, No. 1-3, 1994, pp. 47- 54.
[9] A. B. Aceves, J. V. Moloney and A. C. Newell, “Reflection and Transmission of Self-Focused Channels at Nonlinear Dielectric Interfaces,” Optics Letters, Vol. 13, No. 11, 1988, pp. 1002-1004.
[10] P. Varatharajah, A. B. Aceves and J. V. Moloney, “All-Optical Spatial Scanner,” Applied Physics Letters, Vol. 54, 1989, pp. 2631-2633.
[11] A .B. Aceves, et al., “Particle Aspects of Collimated Light Channel Propagation at Nonlinear Interfaces and in Waveguides,” Journal of the Optical Society of America B, Vol. 7, No. 6, 1990, pp. 963-974.
[12] F. Garzia, C. Sibilia and M. Bertolotti, “Swing Effect of Spatial Soliton,” Optics Communications, Vol. 139, No. 4-6, 1997, pp. 193-198.
[13] F. Garzia, C. Sibilia and M. Bertolotti, “High Pass Soliton Filter,” Optics Communications, Vol. 152, No. 1-3, 1998, pp. 153-160.
[14] F. Garzia, C. Sibilia, and M. Bertolotti, “All optical soliton based router”, Opt. Comm., vol. 168/1-4, pp. 277-285, 1999.
[15] H. W. Chen and T. Liu, “Nonlinear Wave and Soliton Propagation in Media with Arbitrary Inhomogeneities,” Physics of Fluids, Vol. 21, No. 3, 1978, pp. 377-380.
[16] P. K. Cow, N. L. Tsintsadze and D. D. Tsakhaya, “Emission of Ion-Sound Waves by a Langmuir Soliton Moving with Acceleration,” Soviet Physics-JETP, Vol. 55, 1982, pp. 839- 843.
[17] J. S. Aitchison, et al., “Observation of Spatial Optical Solitons in a Nonlinear Glass Waveguide,” Optics Letters, Vol. 15, No. 9, 1990, pp. 471-473.
[18] P. Refreiger and B. Javidi, “Optical Image Encryption on Input Plane and Fourier Plane Random Encoding,” Optics Letters, Vol. 20, No. 7, 1995, pp.767-769.
[19] O. Matoba and B. Javidi, “Encrypted Optical Memory System Using Three-Dimensional Key in the Fresnel Domain,” Optics Letters, Vol. 24, No. 11, 1999, pp.762-764.
[20] J. W. Han, C. S. Park, D. H. Ryu and E. S. Kin, “Optical Image Encryption Based on XOR Operations,” Optical Engineering (Bellingham), Vol. 38, No. 1, 1999, pp. 47-54.
[21] J. W. Han, S. H. Lee and E. S. Kin, “Optical Key Bit Stream Generator,” Optical Engineering (Bellingham), Vol. 38, No. 1, 1999, pp. 33-38.
[22] S. T. Liu, Q. L. Mi and B. H. Zhu, “Optical Image Encryption with Multistage and Multichannel Fractional Fourier-Domain Filtering,” Optics Letters, Vol. 26, No. 16, 2001, pp. 1242-1244.
[23] Y. Zhang, C. H. Zheng and N. Tanno, “Optical Encryption Based on Iterative Fractional Fourier Transform,” Optics Communications, Vol. 202, No. 4-6, 2002, pp. 277-285.
[24] A. Carciner, M. Montes-Usategui, S. Arcos and I. Juvells, “Vulnerability to Chosen-Cyphertext Attacks of Optical Encryption Schemes Based on Double Random Phase Keys,” Optics Letters, Vol. 30, No. 13, 2005, pp. 1644-1646.
[25] U. Gopinathan, D. S. Monaghan, T. J. Naughton and J. T. Sheridan, “A Known-Plaintext Heuristic Attack on the Fourier Plane Encryption Algorithm,” Optics Express, Vol. 14, No. 8, 2006, pp. 3181-3186.
[26] Y. Frauel, A. Castro, T. J. Naughton and B. Javidi, “Resistance of the Double Phase Encryption against Various Attacks,” Optics Express, Vol. 15, No. 16, 2007, pp. 10253-10265.
[27] P. K. Wang, L. A. Watson and C. Chatwin, “Random Phase Encoding for Optical Security,” Optical Engineering (Bellingham), Vol. 35, No. 9, 1996, pp. 2464-2469.
[28] Y. Li, K. Kreske and J. Rosen, “Security and Encryption Optical Systems Based on a Correlator with Significant Output Images,” Applied Optics, Vol. 39, No. 29, 2000, pp. 5925-5301.
[29] Z. J. Liu and S. T. Liu, “Double Image Encryption Based on Iterative Fractional Fourier Transform,” Optics Communications, Vol. 275, No. 2, 2007, pp. 324-329.
[30] B. Javidi and T. Nomura, “Securing Information by Use of Digital Olography,” Optics Letters, Vol. 25, No. 1, 2000, pp. 28-30.
[31] N. K. Nischal, J. Joseph and K. Singh, “Securing Information Using Fractional Fourier Transform in Digital Olography,” Optics Communications, Vol. 235, No. 4-6, 2004, pp. 253-259.
[32] X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao and Y. R. Wang, “Cryptosystem Based on Two Step Phase-Shifting Interferometry and the RSA Pubblic-Key Encryption Algorithm,” Journal of Optics A: Pure Applied Optics, Vol. 11, No. 8, 2009, pp. 85402-85410.
[33] Y. Zhang and B. Wang, “Optical Image Encryption Based on Interference,” Optics Express, Vol. 33, No. 21, 2008, pp. 2443-2445.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.