Abstract

We propose and experimentally demonstrate a method for generating and sharing a secret key using phase fluctuations in fiber optical links. The obtained key can be readily used to support secure communication between the parties. The security of our approach is based on a fundamental asymmetry associated with the optical physical layer: the sophistication of tools needed by an eavesdropping adversary to subvert the key establishment is significantly greater and more costly than the complexity needed by the legitimate parties to implement the scheme. In this sense, the method is similar to the classical asymmetric algorithms (Diffie-Hellman, RSA, etc.).

Highlights

  • Secret key distribution has always been a challenging problem in secure communications

  • Physical layer secret key establishment has been successfully demonstrated in the wireless domain [1, 2], where the channel reciprocity properties of the wireless fading channel provide the basis for key establishment

  • All hardware implementations of even flawless key distribution techniques, such as quantum cryptography, have a number of vulnerabilities connected with particular hardware realization, which may not distinguish between correct system operation and a smart intrusion into the system

Read more

Summary

Introduction

Secret key distribution has always been a challenging problem in secure communications. Physical layer secret key establishment has been successfully demonstrated in the wireless domain [1, 2], where the channel reciprocity properties of the wireless fading channel provide the basis for key establishment These approaches are not applicable to large metro and long-haul networks, where the transmission medium is necessarily an optical fiber. Most of them, as will be discussed later, use naive assumptions that an adversary does not know a secret parameter or a code, used by the legitimate users; or even the assumption that Eve cannot implement a “complicated” method of data extraction used in the system These methods do not exploit any asymmetries associated with the physical layer itself. Having these two properties combined in the same system makes it advantageous with respect to previous approaches and efficient in terms of amount of work that legitimate parties must use in order to impose serious complications for an eavesdropping adversary

Method overview
Previous approaches to securing classical optical communications
Potential applications
Phase fluctuations in fiber optical networks
Security discussions
Phase measurements by the adversary
Active intrusion attack
Other considerations
Experimental setup
Key extraction
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.