Skip to main content

Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy

  • Conference paper
Unconventional Computation (UC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5715))

Included in the following conference series:

Abstract

Motivated by the recent emergence of ultra-high speed (e.g., 100Gb/s) optical networks, some researchers have recently started the study of optical encryption techniques that offer secrecy of information transfer over such networks. Despite significant attention to this problem, we are not aware of attempts made to define a formal cryptographic model for the study of such schemes. In this paper we fill this gap by proposing a formal model for the investigation of symmetric encryption with Shannon secrecy over a specific type of optical networks frequently studied in the related literature, where the security is imparted through all-optical signal processing. This model is then used to formally prove the Shannon secrecy of a construction obtained by carefully combining and improving ideas appeared in the optical network literature. In our construction the key stream rate is the same as the data stream rate, which is optimal for this level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellovin, S., Blaze, M.: Cryptographic Modes of Operation for the Internet. In: 2nd NIST Workshop on Modes of Operation (2001)

    Google Scholar 

  2. Di Crescenzo, G., Menendez, R., Etemad, S.: OCDM-based Photonic Encryption with Provable Security Guarantees. In: Proceedings of Optical Fiber Communication and the National Fiber Optic Engineers Conference, OFC/NFOEC (February 2008)

    Google Scholar 

  3. Etemad, S., Agarwal, A., Banwell, T., Di Crescenzo, G., Jackel, J., Menendez, R., Toliver, P.: An Overlay Photonic Layer Security Approach Scalable to 100 Gb/s. IEEE Communications Magazine 46(8), 32–39 (2008)

    Article  Google Scholar 

  4. Etemad, S., Agarwal, A., Banwell, T., Jackel, J., Menendez, R., Toliver, P.: OCDM-Based Photonic Layer “Security” Scalable to 100 Gb/s for Existing WDM Networks. Journal of Optical Networking 6(7), 948–976 (2007)

    Article  Google Scholar 

  5. Goldberg, S., Menendez, R., Prucnal, P.: Towards a Cryptanalysis of Spectral-Phase Encoded OCDMA with Phase-Scrambling. In: Proceedings of Optical Fiber Communication and the National Fiber Optic Engineers Conference, OFC/NFOEC (April 2007)

    Google Scholar 

  6. Goldberg, S.: Towards a Cryptanalysis of Spectral-Phase Encoded OCDMA with Phase-Scrambling. TR-771-06. Princeton University, Princeton (2006)

    Google Scholar 

  7. Menendez, R., Toliver, P., Galli, S., Agarwal, A., Banwell, T., Jackel, J., Young, J., Etemad, S.: Network Applications of Cascaded Passive Code Translation for WDM-Compatible Spectrally Phase Encoded Optical CDMA. IEEE J. of Lightwave Technology 23, 3219–3231 (2005)

    Article  Google Scholar 

  8. Prucnal, P. (ed.): Optical Code Division Multiple Access: Fundamentals and Applications. CRC Press, Boca Raton (2005)

    Google Scholar 

  9. Shake, T.: Security performance of optical CDMA against eavesdropping. Journal of Lightwave Technology 23(2), 655–670 (2005)

    Article  Google Scholar 

  10. Shake, T.: Confidentiality performance of spectral-phase-encoded optical CDMA. Journal of Lightwave Technology 23(4), 1652–1666 (2005)

    Article  Google Scholar 

  11. Shannon, C.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4), 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  12. Toliver, T., Agarwal, A., Banwell, T., Menendez, R., Jackel, J., Etemad, S.: Demonstration of High Spectral Efficiency Coherent OCDM using DQPSK, FEC, and Integrated Ring Resonator-based Spectral Phase Encoder/Decoders. In: Proceedings of Optical Fiber Communication and the National Fiber Optic Engineers Conference, OFC/NFOEC 2007 (March 2007)

    Google Scholar 

  13. Vernam, G.: Secret Signaling Systems. United States Patent (July 1919)

    Google Scholar 

  14. Wang, Z., Huang, Y., Deng, Y., Chang, J., Prucnal, P.: Optical Encryption with OCDMA Code Swapping Using All-Optical XOR Logic Gate. IEEE Photonics Technology Letters 21(7) (April 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Di Crescenzo, G., Menendez, R., Etemad, S., Jackel, J. (2009). Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy. In: Calude, C.S., Costa, J.F., Dershowitz, N., Freire, E., Rozenberg, G. (eds) Unconventional Computation. UC 2009. Lecture Notes in Computer Science, vol 5715. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03745-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03745-0_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03744-3

  • Online ISBN: 978-3-642-03745-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics