TY - GEN
T1 - Cloaking data in optical networks
AU - Klein, Avi
AU - Shahal, Shir
AU - Masri, Gilad
AU - Duadi, Hamootal
AU - Fridman, Moti
N1 - Publisher Copyright: © 2018 SPIE.
PY - 2018
Y1 - 2018
N2 - Modern networks implement multi-layer encryption architecture to increase network security, stability, and robustness. We developed a new paradigm for optical encryption based on the strengths of optics over electronics and according to temporal optics principles. We developed a highly efficient all-optical encryption scheme for modern networks. Our temporal encryption scheme exploits the strength of optics over electronics. Specifically, we utilize dispersion together with nonlinear interaction for mixing neighboring bits with a private key. Our system encrypts the entire network traffic without any latency, encrypt the signal itself, exploit only one non-linear interaction, it is energetically efficient with low ecologic footprint, and can be added to current networks without replacing the hardware such as the lasers, the transmitters, the routers, the amplifiers or the receivers. Our method can replace current slow encryption methods or can be added to increase the security of existing systems. In this paper, we elaborate on the theoretical models of the system and how we evaluate the encryption strength with this numerical tools.
AB - Modern networks implement multi-layer encryption architecture to increase network security, stability, and robustness. We developed a new paradigm for optical encryption based on the strengths of optics over electronics and according to temporal optics principles. We developed a highly efficient all-optical encryption scheme for modern networks. Our temporal encryption scheme exploits the strength of optics over electronics. Specifically, we utilize dispersion together with nonlinear interaction for mixing neighboring bits with a private key. Our system encrypts the entire network traffic without any latency, encrypt the signal itself, exploit only one non-linear interaction, it is energetically efficient with low ecologic footprint, and can be added to current networks without replacing the hardware such as the lasers, the transmitters, the routers, the amplifiers or the receivers. Our method can replace current slow encryption methods or can be added to increase the security of existing systems. In this paper, we elaborate on the theoretical models of the system and how we evaluate the encryption strength with this numerical tools.
UR - http://www.scopus.com/inward/record.url?scp=85047818550&partnerID=8YFLogxK
U2 - https://doi.org/10.1117/12.2286774
DO - https://doi.org/10.1117/12.2286774
M3 - منشور من مؤتمر
T3 - Proceedings of SPIE - The International Society for Optical Engineering
BT - Broadband Access Communication Technologies XII
A2 - Tsukamoto, Katsutoshi
A2 - Dingel, Benjamin B.
A2 - Mikroulis, Spiros
PB - SPIE
T2 - Broadband Access Communication Technologies XII 2018
Y2 - 29 January 2018 through 31 January 2018
ER -