Professional Documents
Culture Documents
Double All-Optical Encryption of M-QAM Signals Based On Spectrally Sliced Encoding Keys
Double All-Optical Encryption of M-QAM Signals Based On Spectrally Sliced Encoding Keys
1. INTRODUCTION
With the constant need for optical network security to address the vulnerability of high amount of data [1, 2],
cryptographic techniques were pushed to go beyond the electronic domain and implemented on
physical/photonic layer [3-5]. The possibility to encrypt data in optical domain has attracted more attention
recently due to its compatibility with transparent optical networks (TON) where no O-E-O conversions are
implemented. It is also worth to mention that all-optical cryptographic methods were brought not only to replace,
but also to work together with the electronic-based encoding, which potentially increases data security by setting
multiple-barriers for stolen data interpretation [1].
Several techniques applied in optical domain have been presented for encrypting of the optical signal, such as
spectral phase-encoding (SPE) [3] and electro-optical chaos [4]. Chaotic encryption, for instance, is very
challenging as it depends on the synchronization of transmitter and receivers in the presence of transmission
impairments and dynamic effects in an optical link. The SPE approach has shown effective protection on optical
CDMA (OCDMA) channels, but may not be suitable for systems with high number of WDM channels. On the
other side, the encoding of spectrum slices have been a technique showing a high potential for optical encryption
of WDM signals with different modulation formats, [5, 6].
The cryptographic method to be presented here is also based on encoding of spectrum slices the optical signal.
Herewith, we extend our previous analyses [5, 6] by doubling the encoding-decoding stages applied on spectral
slices obtained by optical band-pass filters (OBPFs) having identical 3-dB bandwidths. Encoding is done by
independently applying a precise amount of phase-shift and delay making to each slice, which makes the signal
data meaningless until the signal recovery is applied. The original signal can only be recovered back at the
decoder where phases and delays are brought back to the reference basis. To the best of our knowledge, this is
the first time that double-cyphering scheme is investigated and considered as an effective encryption scheme. To
simulate a realistic scenario, an M-QAM signal with bit rate of 200 Gb/s is transmitted over an optical link with
cascaded optical amplifiers. The integrity of the optical data that undergoes successive encoding and decoding is
verified by bit-error-rate (BER) evaluation, while the effectiveness of the technique is shown on constellation
diagram plots.
This work is organized as follows. In Section 2, we explain the principles of the investigated cyphering
technique and describe two double-encoding schemes. The sensitivity analysis and performance and for the
double-encoding schemes, are shown in Sections 3 and 4, respectively. Finally, conclusions are presented in
Section 5.
(identically as in OE), where each portion i undergoes time delay, τmax - τι, and phase-shift ϕmax – ϕι (where τmax
and ϕmax stand for maximum τi and ϕi of Ke, respectively). A mathematical description for this proposal is
presented in [6].
3. SENSITIVITY PERFORMANCE
The analysis presented here is based on encryption/ decryption of 200 Gb/s 16-QAM signal at a frequency
carrier of fc = 193.1 THz, passed through slices of Nyquist optical filter with a roll-off of 0.1. Nevertheless, the
investigated technique could also be applied to signals with other bit rates and modulation formats as in our
previous work [5, 6]. To investigate the sensitivity performance, we initially simulated the single-encoding
L
(a) OE OD
L1 L2 L3
(b)
b) OE1 OE2 OD2 OD1
L
(c)
c) OE1 OE2 OD2 OD1
Figure 2. Block diagrams for (a) single-encoding and double-encoding in (b) different and (c) same
lightpaths nodes.
2
ICTON 2015 Tu.A1.3
Figure 3: (a) Spectrum for the sliced 16-QAM 200 Gbps signal; and (b) its sensitivity performance.
situation illustrated in Fig. 2(a). The input signal is encrypted by the 7-slice key K1= {7; 160°, 140°, 10°, 110°,
70°, 90°, 180°; 50 ps, 35 ps, 20 ps, 40 ps, 30 ps, 40 ps, 10 ps}. The STDF is characterized by attenuation of
0.2 dB/km, chromatic dispersion of 17 ps/(nm·km) at 193.1 THz, a dispersion slope of 0.080 ps/(nm2·km),
a nonlinear parameter of 2.0 (W·km)-1 and l = 70 km. The applied DCF parameters are: attenuation of
0.6 dB/km, chromatic dispersion of -90 ps/(nm·km) at 193.1 THz, dispersion slope of 0.080 ps/(nm2·km), and
length lDCF = 13.2 km. The EDFA gain is set to compensate the losses in the STDF and DCF and has a noise
figure of 4.0 dB. The encoder and decoder OBPFs profiles follow a 5th order Gaussian shape. Figure 3(a) shows
the spectrum for the sliced signal, whereas Fig. 3(b) plots the sensitivity performance for the cases where Nl = 0
(back-to-back configuration) and Nl = 5 (350 km of propagation). As we can see, the BER performance of the
encrypted signal is very similar to the one where no encoding is applied (uncoded signal) for the back-to-back
case, while a ~1-dB penalty is observed after 350 km of signal propagation. It is also noted that good BER
performances require and OSNR of at least 22 dB, and such value is utilized in the remaining of our
investigation.
4. DOUBLE-ENCODING RESULTS
Let us now consider these two cases where signals receive double encodings, starting from the scheme illustrated
in Fig. 2(b). We now have that OE1 and OE2 are separated by L1 = 70 km and keys Ke1 = K1 and Ke2 = {7; 160°,
50°, 130°, 10°, 50°, 160°, 80°; 5 ps, 50 ps, 15 ps, 45 ps, 35 ps, 10 ps, 30 ps} are implemented in a serial manner.
Also, OD2 is placed at distance L2 = 210 km after OE2 and, as in a single encoding scenario, OE1 is located
350 km away from the transmitter. The constellation diagrams for the signals after (a) OE1, (b) OE2, (c) OD1,
and (d) OD2 are presented in Fig. 4. The BERs at the output of OE1 and OE2 are 7.4×10-1, 8.2×10-1, respectively,
and indicate that keys Ka and Kb meet appropriate cyphering strengths; this feature is confirmed by the blurred
constellations seen in Fig. 4(a) and (b). After OD2, BERd becomes 7.5×10-1, which is approximately the same
value obtained at the output of OE1. This result is expected since OD2 removes the encoding impressed by OE2
and lets only the OE1 stage encryption to be turned on. At the output of OD1, BERd = 7.4×10-4 is below our
BERFEC = 2×10-3 limit, indicating a rather good performance for the decoded signal (definite constellation points
of Fig. 4(d)).
Finally, we investigate the case sketched in Fig. 2(c) where two encoders, OE1 and OE2, are in the transmitter
site but their spectral slices are detuned by ∆f = |fck,2 – fck,1|. The receiver site, where both OD1 and OD2 are
placed, is again 350 km apart from the transmitter side. Encryption keys are Ke1 = K1 and Ke2 = {7; 175°,75°,
105°, 180°, 40°, 120°, 125°; 5 ps, 50 ps, 15 ps, 5 ps, 40 ps, 10 ps,30 ps}. A detuning sweep revealed that the
Figure 4. Constellation diagrams for 16-QAM signals after (a) OE1, (b) OE2, (c) OD2,
and (d) OD1 of Fig. 2(b).
3
ICTON 2015 Tu.A1.3
Figure 5: (a) Spectral slices after the detuned encoding stages. Constellation diagrams for 16-QAM signals
after (a) OE1, (b) OE2, (c) OD2, and (d) OD1 of Fig. 2(c).
optimum value ∆f for this situation is ~4 GHz. The resulting 14 spectral slices are presented in Fig. 5(a). The
same figure shows the constellation diagrams for the 200 Gb/s 16-QAM signal after (a) OE1 (b) OE2, (c) OD2,
and (d) OD1. The BERs after each one of these devices are of, respectively, 7.5×10-1, 8.1×10-1, 7.5×10-1, 1×10-3,
which suggest the effectiveness of slice detuning as a simple method for providing narrower spectral slices and
longer cryptographic keys.
Finally, we should note that eavesdroppers need to know the exact decoding parameters of slices that carry
approximately 90% of the signal power, as we explained in the earlier robustness analysis [6]. Due to the
detuning case considered here, the number of spectral slices has increased from 7 to 14. That means that
intruders need now to discover twice many parameters as compared to a single-encoding case (because the
number of spectral slices that contain the aforementioned 90% of signal power also doubles from 5 to 10). Since
the values of τi and ϕi vary continuously, the considered double-encoding scheme drastically enhances
communication security, without requiring the use of OBPFs with narrower bandwidths. We would also like to
outline that transmission of encrypted optical signals still falls within a generic engineering framework analysed
in [7] since it introduces a negative margin that cannot be overcome without proper decryption.
5. CONCLUSIONS
We investigated the application of double-encoding schemes, based on spectrally sliced cyphering keys applied
to 16-QAM with bit rate of 200 Gb/s signals. It was found that two optical encoders located at different nodes
along a given lightpath can be effectively used in metro/regional optical networks. It was also verified that two
optical encoders with a detuning between their spectral slices can be cascaded to double the encryption key
length and to enhance communication security without the need for more sophisticated OBPFs.
ACKNOWLEDGEMENTS
This work is supported by CNPq and FAPESP under grants 574017/2008-9, 08/57857-2, 310644/2011-9, and
311137/2014-8. Authors would like to thank VPIPhotonicsTM for providing academic licenses of the simulation
software tools utilized in this work.
REFERENCES
[1] K. Kitayama et al.: Security in photonic networks: Threats and security enhancement, J. Lightwave
Technol., vol. 29, pp. 3210-3222, Nov. 2011.
[2] M. Medard, D. Marquis, and S.R. Chinn: Attack detection methods for all-optical networks,
in Proc. NDSS 98, San Diego, 1998.
[3] L. Kocarev, S. Lian: Chaos-Based Cryptography, Berlin: Springer, 2011.
[4] J. Goedgebuer et al.: Optical communication with synchronized hyperchaos generated electrooptically,
IEEE Journal of Quantum Electronics, vol. 38, no. 9, pp. 1178-1183, 2002.
[5] M.L.F. Abbade et al.: All-optical phase and delay spectral encoding of signals with advanced modulation
formats, in Proc. ICTON 2014, pp. 1-4, Jun. 2014, paper Tu.B1.4.
[6] M.L.F. Abbade et al.: All-optical cryptography of M-QAM formats based on spectrally sliced encryption
keys, Applied Optics, 2015, to be published.
[7] M. Cvijetic: Optical Transmission Systems Engineering, Artech House, 2003.