ultrafast optical processing & information security · ultrafast optical processing &...

31
Lightwave Communications Laboratory Princeton University 1/31 Ultrafast Optical Processing & Information Security Paul Prucnal February 23, 2011 Wednesday July 27 th , 3:30pm - 4:00pm Double Tree Hotel, 4355 US Route 1, Princeton, NJ

Upload: others

Post on 25-Jan-2020

24 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 1/31

Ultrafast Optical Processing & Information Security

Paul Prucnal

February 23, 2011

Wednesday July 27th, 3:30pm - 4:00pm

Double Tree Hotel, 4355 US Route 1, Princeton, NJ

Page 2: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 2/31

Interception

P. R. Prucnal “Optical code dividsion multiple access,” Taylor & Francis, 2006

Information security has many challenges….

Page 3: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 3/31

Interception

P. R. Prucnal “Optical code dividsion multiple access,” Taylor & Francis, 2006

Information security has many challenges….

…some of which have been addressed using ultrafast optical signal processing.

Page 4: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 4/31

Optical Fibers

4

Total internal reflection

governed by Snell’s Law

with Dn~1%

Page 5: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 5/31

Group Velocity Dispersion

Different spectral components of

light travel at different velocities

spreading the pulse.

propagation

“Red-shift” “Blue-shift”

Dispersion limits the maximum bit rate due to inter-symbol interference.

Page 6: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 6/31

Evolution of Fiber Optic Transmission Capacity

(normalized for a 1,000 km transmission distance)

D J Richardson Science 2010;330:327-328

Dispersion limits maximum

bit rate due to inter-symbol

interference

Page 7: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 7/31

Devices for Dispersion Compensation

“Standard” single mode fiber “Dispersion compensating fiber”

Compact “Fiber Bragg Grating”

Refractive

index gratings

made by

exposure to

uv light

Page 8: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 8/31

Interception

Hiding optical signals

in plain sight

Physical Layer Security using Optical Signal Processing

Page 9: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 9/31

Steganography: Hiding Signals in Plain Sight

The origins of steganography are rooted in ancient Greece:

Messages were carved in wood and hidden by covering with wax.

Herodotus tells of tattooing a message on a slave's shaved head, which was then

hidden covered by hair regrowth. Not ultrafast processing!

Spread spectrum is used in wireless military communications to hide signals below noise.

Rock concert pass written in invisible (UV-sensitive) ink

The existence of a message may itself be sensitive information.

Page 10: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 10/31

Temporal Hiding

Dispersion

Compensation

- D

Dispersive

Medium

+D

time

In optically dispersive media:

• Pulse spreading reduces its amplitude.

• The power at each frequency and the spectrum remain unchanged.

• Negative dispersion restores the pulse to its original shape.

Page 11: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 11/31

Dispersion

Compensation

- D

Dispersive

Medium

+D

Dispersive media:

• Single mode optical fiber

• Fiber Bragg gratings

time

Optical amplifier noise

Temporal Hiding

In optically dispersive media:

• Pulse spreading reduces its amplitude.

• The power at each frequency and the spectrum remain unchanged.

• Negative dispersion restores the pulse to its original shape.

Page 12: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 12/31

Private Channel Alone

Before Spreading After Spreading After Compression

Public channel without and with the stealth signal

Low-power stealth channel

hidden under ASE noise

Temporal Hiding using Chirped Fiber Bragg Gratings

Page 13: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 13/31

Interception

Physical Layer Security using Optical Signal Processing

Security by

Obscurity

Page 14: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 14/31

Hiding via Frequency Hopping

Frequency-hopping optical CDMA network• Private and public channels overlap both temporally & spectrally.

• Use in conjunction with dispersive spreading

• To detect the private channel, need both the correct decoder and

dispersion compensation.

λ1

λ2

λ3

λ4

Code 1

Fiber Bragg Grating Encoder

FB

G

λ1

λ2

λ3

λ4

Decoder and Optical Thresholding

Codes

1+2

Highly Nonlinear

Fiber Loop Thresholder

FB

G

Picosecond laser pulse One data bit

Page 15: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 15/31

Codes 1 + 2

“obscure” each other

User 1

User 2

OCDMA

Decoder 1

Optical

Thresholder

Multiaccess Interference Rejection for Scaling OCDMA

2.5 Gbit/sec

Carrier-hopping prime codes (4,17)

K=4log217=16.3

OCDMA Encoders

out

HDFDSF

in

PCATT

Code 1 recovered

Page 16: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 16/31

Eavesdropping on Optical CDMA

Eve’s difficulty in guessing Alice’s code sequence increases with code cardinality.

The amount of information Eve requires to have the same detection performance as Alice is called the “effective key length.”

T

eff

OOK NwK 2logw = # wavelengths, NT = number of chips

Requires very large code sets to be effective.

Eve

Multi-access interference

“obscures” signal

Alice

User 1

User 2

User N

……

OCDMA

CodersBrute force

decoding

S

1 100

700

7 w

K

NT=128

Page 17: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Princeton UniversityLightwave Communications Research Laboratory

Interception

Physical Layer Security using Optical Signal Processing

Ultrafast

Encryption

Page 18: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Princeton UniversityLightwave Communications Research Laboratory

All-Optical Data Encryption

Electronic

Encryption

Encoding

Decoding Decryption

Receiver

SEED

DATA

KEY Generation

KEY Generation

QKD

Transmitter

Trusted area

All-optical encryption eliminates the electromagnetic signature

and enables encryption at any line rate.

Page 19: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Princeton UniversityLightwave Communications Research Laboratory

All-Optical Data Encryption

Optical

Encryption

Encoding

Decoding Decryption

Receiver

SEED

DATA

KEY Generation

KEY Generation

QKD

Transmitter

Trusted area

All-optical encryption eliminates the electromagnetic signature

and enables encryption at any line rate.

Page 20: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 20/31

Optical Logic: Optical Nonlinearity

2

0

2

0

0

for ,

( )

i

Ai A A

z

A A e

z A z

D

D

t

Δ

leading edge

of pulse

Pulse Intensity & Phase Shift

“Self phae modulation” for pulses of high intensity in optical fiber

Pulses experience an intensity-dependent phase shift.

Page 21: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 21/31

Evolution of Fiber Optic Transmission Capacity

D J Richardson Science 2010;330:327-328

Optical nonlinearity limits maximum bit rate

due to inter-channel crosstalk

(normalized for a 1,000 km transmission distance)

Page 22: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Princeton UniversityLightwave Communications Research Laboratory

Nonlinear Fiber-Based Optical Encryption

Encoded

data out

Nonlinear Fiber based

XOR Gate

HNLF

50:50

KEYDATA

input

50:50

Code 1 Code 2

Encoder 1 Encoder 2

Code

Swapping

1 0 0 1 0 1

0 0 1 0 1 1

1 0 1 1 1 0

Data

When Key

is all zero

Key

When Data

is all zero

XOR Output

Encoded

Data Out

with code

swappingOUTPUT

Page 23: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 23/31

Interception

Physical Layer Security using Optical Signal Processing

Communicating

through

jamming

Page 24: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 24/31

Iraq Ground Scanner – IED Jammer

Page 25: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 25/31

Jamming Cancellation Box

Page 26: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 26/31

Modulation is proportional to

the received interference

Modulation is inversely

proportional to the transmitted

jamming signal

Mach Zehnder Electro-Optic Modulator

Page 27: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 27/31

Modulation is proportional to

the received interference

Modulation is inversely

proportional to the transmitted

jamming signal

Mach Zehnder Electro-Optic Modulator

Page 28: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 28/31

Modulation is proportional to

the received interference

Modulation is inversely

proportional to the transmitted

jamming signal

Mach Zehnder Electro-Optic Modulator

Page 29: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 29/31

Modulation is proportional to

the received interference

Modulation is inversely

proportional to the transmitted

jamming signal

Mach Zehnder Electro-Optic Modulator

Page 30: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 30/31

Narrowband and Broadband Cancellation

Narrowband

Measurement

Broadband

Measurement

Narrowband

Cancellation

Broadband

Cancellation(min)

(max)

~80 dB

cancellation

Min: ~45 dB

cancellation

Max: ~70 dB

cancellation

Narrowband

Cancellation

Broadband

Cancellation(min)

(max

)

Page 31: Ultrafast Optical Processing & Information Security · Ultrafast Optical Processing & Information Security Function Approach Optical Technology Hide optical signals Temporal spreading

Lightwave Communications Laboratory

Princeton University 31/31

Ultrafast Optical Processing & Information Security

Function Approach Optical Technology

Hide optical signals Temporal spreading FBG

Spectral spreading ps laser

Reduce intercept

probability

Optical CDMA FBG + all-optical thresholder

Ultrafast data

encryption

AND logic Soltion interactions

XOR 2-input nonlinear fiber switch

Broadband jamming

cancellation

Translate RF signal

to optical domain

Electrooptic counter-phase

modulators

Multipath

compensation

Optical FIR filter

Identification,

decisions, learning

Hybrid spike

processing

SOA integrator + FIR +

thresholder