Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Mode division multiplexing chaotic encryption scheme based on key intertwining and accompanying transmission

Open Access Open Access

Abstract

A mode division multiplexing (MDM) chaotic encryption scheme based on key intertwining and accompanying transmission is proposed in this paper. Based on the weakly coupled few-mode fiber (FMF), data and time-varying keys can be accompanied by transmission in two modes, LP01 and LP11, respectively. In order to generate a new key, the current key is XORed with all of the keys from all the preceding moments, one by one. To implement chaotic masking in the digital domain, the three chaotic sequences corresponding to the new key are adopted to encrypt the data at the constellation phase, data symbol block, and subcarrier levels. An 8.89 Gb/s encrypted 16QAM-OFDM signal transmission over 1 km weakly-coupled FMF is experimentally demonstrated. The receiver with the correct key can recover the data normally, while the BER of the illegal receiver remains around 0.5. In the case of the key transmission bit rate of 1 Gb/s, the cracking efficiency threshold of the time-varying key encryption scheme is 5.21 × 106 times that of the time-invariant key encryption scheme, which suggests that the proposed work is a promising candidate for future physical layer security.

© 2022 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

Introducing new services like the Internet of Things, the metaverse, and digital twin technologies have ushered in a new era of interconnection. The optical fiber transmission infrastructure, which serves as the primary conduit for Internet traffic, must contend with greater demands for high capacity and information security issues. Data security protocols and digital certificates are examples of upper-layer security encryption schemes. Quantum encryption, optical chaotic encryption, and digital chaotic encryption are examples of physical layer security encryption schemes emerging one after another to ensure information security. Eavesdroppers can perform brute force breaking for the upper-layer encryption techniques by copying a huge amount of data and processing them using parallel signal processing computing units. It is simple to actualize such data cracking with the rapid development of computing power, such as quantum computing. However, compared with the former, the physical layer security schemes encrypt the optical signal. The security of the data can essentially be guaranteed even if an eavesdropper manages to intercept a partial power of the optical signal in the optical fiber transmission link since it cannot understand the genuine plaintext.

The physical layer encryption schemes have a trade-off between high-security performance and strong communication capability. Quantum key distribution (QKD) generates and shares verifiably secure keys between two users via quantum mechanical properties [15], which can not only distribute keys but also realize the perception of eavesdroppers. Currently, it is considered one of the safest encryption schemes. However, compared with the transmission rate of ciphertext, the rate of keys generation is too low to support the simultaneous transmission of time-varying keys and ciphertext. Additionally, optical chaotic encryption is a security method for encryption in the optical domain that either applies broadband chaos as an optical carrier to transform the transmitted data into a noise-like signal [69] or utilizes the chaotic signal as a driving signal to perform optical phase disturbance [1012]. Based on the chaotic synchronization mechanism of a semiconductor laser, the parameters of a slave semiconductor laser in the transmitter and the receiver are matched, realizing the synchronization of encryption and decryption. However, in the actual chaotic optical system, the increase in transmission distance will introduce the accumulation of optical fiber dispersion, which makes it challenging to maintain the chaotic synchronization of high-speed optical signals and restricts the transmission distance of physical layer secure optical communication. Besides, the above schemes are incompatible with the existing optical transmission architecture. Before they are applied in the high-speed optical transmission, it is necessary to modify the communication system equipment.

Digital chaotic encryption based on digital signal processing (DSP) has attracted extensive attention from researchers in recent years [1321]. This scheme realizes the chaotic masking of data by perturbing the process of bit coding, constellation mapping, and multi-carrier modulation in DSP, which is compatible with the existing optical transmission architecture so that the strong communication capability of a high-speed optical transmission system can be maintained. An offset quadrature amplitude modulation filter bank multi-carrier (OQAM-FBMC) encryption scheme based on 7-dimensional (7D) Cellular Neural Network (CNN) was proposed in [22], in which the key space of 7D CNN can reach 101575, and the scrambling degree can be maintained at 100%. An encryption scheme based on manifold learning-assisted generative adversarial networks (MFGANs) was proposed in [23], in which the complex structures from various chaotic models were learned to achieve the sizeable key space. A novel probabilistic shaping (PS) based constellation encryption scheme was proposed in [24], where two bit-level encryption operations were firstly performed according to chaotic sequences and hash values, and the proposed PS-based encryption scheme can obtain approximately 2.4 dB gain in terms of receiver sensitivity. Chaotic compressive sensing (CS) encryption algorithm for orthogonal frequency division multiplexing passive optical network (OFDM-PON) was proposed in [25], which aimed at compressing the transmitted data and enhancing the security of data transmission. Recently, researchers have reported a secure key distribution and synchronization method by embedding the key into the synchronization header in OFDM-PON [26]. In addition, we also proposed a noise-masking secure key distribution by utilizing power dimension in our previous work [27]. These schemes have striking advantages including low implementation complexity and high system compatibility. But they use the fixed key in a chaotic system, that is, they do not support time-varying chaotic encryption and key distribution. Even if the chaotic system has a large enough key space, it still offers eavesdroppers the possibility to decipher the information.

In this paper, a mode division multiplexing (MDM) chaotic encryption scheme based on key intertwining and accompanying transmission is proposed, in which LP01 and LP11 modes are respectively used for the simultaneous transmission of ciphertext and time-varying keys in weakly coupled few-mode fiber (FMF). Each key has a connection to all the keys that came before it. Given the circumstances, it is still impossible to discern genuine key information even if the eavesdroppers simultaneously steal both the key and the ciphertext. In addition, the three chaotic sequences generated corresponding to the actual key after intertwining are used to encrypt the data at three levels of constellation phase, data symbol block, and subcarrier to realize the chaotic masking in the digital domain. An 8.89 Gb/s encrypted 16QAM-OFDM signal transmission over 1 km weakly-coupled FMF is experimentally demonstrated to verify the feasibility of the proposed scheme.

2. Principle

2.1 MDM chaotic encryption architecture

The proposed MDM chaotic encryption scheme based on key intertwining and accompanying transmission is shown in Fig. 1, which employs two nearby optical modes, LP01 and LP11. As the fundamental mode, LP01 is relatively less crosstalk introduced by other modes, making it more suitable to be used as the data bearing pipeline. Compared with the number of bits in the data part, the number of bits to be transmitted in the key part is much less. This paper uses LP11, a higher-order mode, to transmit the key. Note that the proposed scheme can be extended to multimode multiplexing systems, since the bits of transmitted key are fewer, we can still adopt one of the high order modes to transmit keys with low transmission rate, and adopt other modes to transmit the synchronous encrypted signals. The bitstream frame structures of key and data are shown in Fig. 1(b). The time consumption of transmission of the two parts is the same, and each frame corresponds one to one to realize the chaotic data encryption with a time-varying key. It is worth noting that since the number of bits of the key is less, a lower order modulation format can be used to reduce the net bit rate of the key channel utilizing interpolation or circular key sending. This can keep the frame length of the KEY consistent with that of the data and ensure the reliability of key transmission.

 figure: Fig. 1.

Fig. 1. The architecture of MDM chaotic encryption based on key intertwining and accompanying transmission.

Download Full Size | PDF

2.2 MDM chaotic encryption architecture

To be more explicit, the chaotic encryption is performed with a classical three-dimensional Chua’s circuit map, which can be formulated as [28]:

$$\begin{aligned}&\left\{ \begin{array}{l} \partial x/\partial t = a({y - x - f(x )} )\\ \partial y/\partial t = x - y + z\\ \partial z/\partial t ={-} by \end{array} \right.\\ &f(x )= dx + 0.5({c - d} )({|{x + 1} |- |{x - 1} |} ),\end{aligned}$$
where a, b, c, d are the control parameters, which are set as the constant of 10, 14.87, −1.27 and −0.65, respectively. In this condition, the chaotic system is in a chaotic state. x, y, z are variables in the range of (−3,3), (−1,1) and (−5,5), respectively, and their initial values x0, y0 and z0 are set as −1.0, 0.2 and 1.1, respectively. The 4th Runge-Kutta method is used to solve the partial differential equation in Eq. (1), and the corresponding phase diagram of Chua’s circuit map is shown in Fig. 2. It can be seen that the phase diagram of Chua’s circuit map is composed of two scrolls intertwined, showing good dynamic behavior.

 figure: Fig. 2.

Fig. 2. Phase diagram of Chua’s circuit map.

Download Full Size | PDF

The MDM chaotic encryption scheme proposed in this paper puts a forward higher requirement on the initial value sensitivity of the chaotic model. Figure 3 shows the phase diagrams for two cases where the initial values $\{{{x_0},{y_0},{z_0}} \}$ are $\{{ - 1.0,0.2,1.1} \}$ (corresponding to the yellow line) and $\{{ - 1.0 + {{10}^{ - 15}},0.2 + {{10}^{ - 15}},1.1 + {{10}^{ - 15}}} \}$ (corresponding to the blue line). It can be seen from the partially enlarged figure that when the initial value has a tiny change of 10−15, the phase trajectories of a chaotic model under these two conditions are quite different. This is also the significance of the time-varying key encryption scheme, that is, the constant change of the key over time brings about great changes in the chaotic sequence, effectively enhancing the difficulty of eavesdropping.

 figure: Fig. 3.

Fig. 3. Phase diagrams with initial values of {−1.0, 0.2, 1.1} and {−1.0 + 10−15, 0.2 + 10−15, 1.1 + 10−15}.

Download Full Size | PDF

In this paper, OFDM-based multicarrier modulation is adopted for data transmission. So, according to the three chaotic sequences x, y, z generated by the chaotic model, the data are perturbed at three levels of constellation phase, data symbol block, and subcarrier, respectively. The specific data perturbation process includes the following two steps:

Firstly, the obtained chaotic sequences x, y, and z are processed as follows:

$$\left\{ \begin{array}{l} p = \bmod (x \cdot {10^{15}},4) \cdot \pi /2\\ q = fix(\bmod (abs(y \cdot {10^{15}}),M)) + 1\\ w = fix(\bmod (abs(z \cdot {10^{15}}),N)) + 1 \end{array} \right.,$$
where p is the constellation phase disturbance factor, and its values are $\{{0,\pi /2,\pi ,3\pi /2} \}$, q is the OFDM symbol disturbance factor, and its value is an integer in the range [1, M], in which M is the number of symbols on each OFDM subcarrier. $w$ is the disturbance factor of OFDM subcarriers, whose value is an integer in the range [1, N], and N is the number of subcarriers of OFDM.

Secondly, an M-order square matrix Q is constructed, where the value of the column represented by q is set to 1 row by row. And the N-order square matrix W is constructed, where the value of the row represented by w is set to 1 column by column. The data encryption of the OFDM signal is realized according to the constellation phase disturbance factor and the constructed two disturbance matrices Q and W:

$$S^{\prime} = Q \cdot (S \cdot \exp (ip)) \cdot W.$$

The encryption processes are shown in Fig. 4. After a phase disturbance in a constellation, there will be a shift in where the points make up the constellation based on how severe the disturbance was. QAM symbol positions on the time-frequency block in OFDM are entirely jumbled after disruption of OFDM symbols and subcarriers. Note that, because the digital domain encryption doesn’t affect the key accompanying transmission scheme, other digital chaotic encryption methods can also be added or replaced to the encryption process.

 figure: Fig. 4.

Fig. 4. Schematic diagram of (a) constellation phase perturbation; (b) OFDM time-frequency scrambling.

Download Full Size | PDF

2.3 Key intertwining and accompanying transmission

In this paper, the initial values $\{{{x_0},{y_0},{z_0}} \}$ are used as the key. The decimal key is converted into a binary bit stream with a fixed length to enable the accompanying transmission of key and data. Since x, y, z in Chua's circuit map can support even a tiny change ∼10−15, it is determined that each initial value retains 16 significant digits, including the one integer digit and the 15 decimal digits. And the decimal to binary conversion is carried out according to the order of the key bits. Among them, the value of the integer digit is less than 8, which can be represented by 3 bits. Each digit on the decimal part is an integer in the range of [0, 9], which is expressed with 4 bits following the 8421BCD code, namely {0000, 0001, 0010, 0011, 0100, 0101, 0110, 0111, 1000, 1001}. In addition, an extra bit is used with the key as a sign bit, where ‘0’ is negative and ‘1’ is positive. Therefore, the key starts with the sign bit. The decimal point is eliminated during the transformation. This way, the initial decimal values {x0, y0, z0} are converted into three sets of 64-bit keys, where the 1st bit represents the sign, the 2nd to 4th bits represent the integer part, and the 5th to 64th bits represent the decimal part.

The time-varying key is transmitted with data in the proposed chaotic encryption scheme. To prevent eavesdroppers from intercepting key and data simultaneously during transmission and performing ciphertext cracking, the 5th to 64th bits (the decimal part of the initial key value) are intertwined by the stepwise XOR operation. Specifically, ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} _{5\sim 64B}}^{(i)} = {({x_0}^{(i)},{y_0}^{(i)},{z_0}^{(i)})_B}$ represents the 5th to 64th bits of the ith key transmitted in LP11 mode, which is the key loaded at the transmitter. When the perturbation is performed on data, the key is processed in two steps:

Firstly, the 1st to the 4th bits in the key remains unchanged, and the 5th to the 64th bits are XORed step by step with the corresponding bits in the previous key, establishing the intertwined association between the ith key and the previous 1st to the (i-1)th key:

$$\left\{ \begin{array}{l} {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{5\sim 64B}}{^{(1)^\prime}} = {({x_0}^{(1)},{y_0}^{(1)},{z_0}^{(1)})_B}\\ {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{5\sim 64B}}{^{(2)^\prime}} = {({x_0}^{(2)},{y_0}^{(2)},{z_0}^{(2)})_B} \oplus {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{5\sim 64B}}{^{(1)^\prime}}\\ \textrm{ } \cdots \\ {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{5\sim 64B}}{^{(i)^\prime}} = {({x_0}^{(i)},{y_0}^{(i)},{z_0}^{(i)})_B} \oplus {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{5\sim 64B}}{^{(i - 1)^\prime}} \end{array} \right..$$

Secondly, since the decimal to the binary conversion of the decimal part of keys is based on 8421BCD code, six invalid cases (1010,1011,1100,1101,1110,1111) will overflow after the above XOR operation. Therefore, we convert the obtained ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} _{5\sim 64B}}{^{(i)^\prime}} = ({x_0}^{(i)^\prime},{y_0}^{(i)^\prime},{z_0}^{(i)^\prime})_B$ to a decimal number by the following procedure:

$$\left\{ \begin{array}{l} {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{.1D}}^{(i)} = \bmod (bin2dec({{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{5\sim 8B}}{^{(i)^\prime}}),10)\\ {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{.2D}}^{(i)} = \bmod (bin2dec({{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{9\sim 12B}}{^{(i)^\prime}}),10)\\ \textrm{ } \cdots \textrm{ }\textrm{.}\\ {{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{.15D}}^{(i)} = \bmod (bin2dec({{\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} }_{61\sim 64B}}{^{(i)^\prime}}),10) \end{array} \right.$$

The above operation ensures that each number in the decimal position is an integer in the range of 0 to 9. By doing so, the current key is linked to the keys from all previous times. Since the key was not available when the ciphertext was generated, it cannot be cracked even if eavesdroppers suddenly eavesdrop on the intermediate link and obtain both the key and data information simultaneously. Figure 5 shows the key $\{{{x_0},{y_0},{z_0}} \}$ transmitted in LP11 mode and the key used after key intertwining association $\{{{x_{0real}},{y_{0real}},{z_{0real}}} \}$, as well as their difference. It can be seen that the key intercepted by the eavesdropper is completely different from the actual key.

 figure: Fig. 5.

Fig. 5. Comparison of transmitted key and the intertwined key.

Download Full Size | PDF

For the time-varying key chaotic encryption scheme, the bit length and update frequency of the keys determine the anti-cracking ability. In this paper, a parameter called cracking efficiency threshold (CET) is defined to measure the security performance of this scheme quantitatively:

$$CET = \frac{R}{n} \times {2^n},$$
where n is the bit length of a single set of the keys and 2n is the key space with a time-invariant key, R is the key transmission bit rate, and $R/n$ represents the update times of the key per unit time, that is the update frequency of the key. The unit of CET is s−1, representing the number of calculations per second to decipher the key successfully. Figure 6 shows the curve of CET as a function of R and n. It can be seen that a higher key transmission rate and a longer key bit length mean a higher cracking efficiency threshold. The values of R and n are adjustable according to the actual system requirements. One can choose larger values of n and R if the system requires higher security performance. While one can choose smaller values of n and R if the system requires higher transmission performance.

 figure: Fig. 6.

Fig. 6. Comparison of transmitted key and the intertwined key.

Download Full Size | PDF

3. Experiment and results

An experiment is conducted, as shown in Fig. 7(a), in which the key and encrypted data are transferred based on intensity modulation direct detection to test the effectiveness of the proposed MDM chaotic encryption system based on key intertwining and accompanying transmission. Specifically, at the transmitter, the key and encrypted data generated by offline DSP are fed into an arbitrary waveform generator (AWG, Tek AWG70002A) with a maximum sampling rate of 25 GSa/s for digital-to-analog conversion. Then the electrical signals are amplified by the electrical amplifiers (EAs), and injected into the Mach-Zehnder modulator (MZM) for intensity modulation. Two continuous-wave (CW) lasers with a linewidth of 100 kHz are used as the light sources, whose wavelength is 1550 nm, and optical power is 10 dBm. A mode multiplexer multiplexes two optical signals together. the applied mode multiplexer is a spatial mode multiplexer and demultiplexer based on multi-plane light conversion (MPLC) with a size of 64 × 64 × 46 mm. It can support four modes including LP01, LP11a, LP11b, and LP21. The working wavelength range of the mode multiplexer is 1530 nm to 1565 nm. The insertion loss is less than 6 dB and the average mode isolation is greater than 10 dB at the wavelength of 1550 nm. The key is loaded onto the LP11 mode, and the encrypted data is loaded onto the LP01 mode. In the transmission link, a two-mode fiber with a length of 1 km is used, which can support the transmission of LP01 and LP11 modes. At the receiver, the same MPLC-based mode demultiplexer as the transmitter is applied to demultiplex the key and encrypted data optical signals. Two variable optical attenuators (VOAs) are placed to adjust the received optical power (ROP) for subsequent optical signal detection via photodetector (PD). And a mixed signal oscilloscope (MSO, TekMSO73304DX) with a single channel maximum sampling rate of 100 GSa/s is used for analog-to-digital conversion of the detected electrical signals. The offline DSP performs data decryption and recovery reversed to the transmitter.

 figure: Fig. 7.

Fig. 7. Experimental setup (AWG: arbitrary waveform generator; EA: electrical amplifier; MZM: Mach-Zehnder modulator; VOA: variable optical attenuator; PD: photodiode; MSO: mixed signal oscilloscope).

Download Full Size | PDF

The detailed DSP processes of key and data at the transmitter and receiver are shown in Fig. 7(b-e). Both parts of the information are modulated with OFDM-based multicarrier modulation. A total of 256 subcarriers are adapted to carry the key or data, while another 256 subcarriers are used to carry the corresponding complex conjugates to fulfill the Hermitian symmetry to ensure that the output signal is a real value. The IFFT size is 1024, and 1/8 of the OFDM symbol length is added as the cyclic prefix (CP). The key adopts BPSK modulation, while the data adopts QPSK or 16QAM.

As described in principle, the bit rates of key and data are not the same during the transmission. The higher the key transmission rate, the higher the update frequency of the key, and the larger ROP required for a key signal transmitted on LP11 mode. Therefore, we fixed the sampling rate of AWG as 10 GSa/s, and the data bit rates based on QPSK-OFDM and 16QAM-OFDM are 4.44 Gb/s and 8.89 Gb/s, respectively. The minimum ROP (namely ROP threshold) required by the proposed encryption scheme is analyzed by changing the bit rate ratio of data to key. As the experimental results shown in Fig. 8, it can be seen that the key parts are the same regardless of the modulation format, so the ROP thresholds at the same key bit rate in Fig. 8(a) and (b) are consistent. As the bit rate of the key decreases, the bit rate ratio of data to key gradually increases, and the ROP threshold decreases. However, since the key bit rate is gradually reduced to below 1 Gb/s, under such a low transmission rate, the change of bit rate ratios of data to key has little effect on the ROP threshold. This also guides the selection of the key rate; that is, a larger ratio can be selected under the same ROP condition to increase the update frequency of the key and improve the system’s security.

 figure: Fig. 8.

Fig. 8. ROP thresholds for (a) QPSK-OFDM and (b) 16QAM-OFDM at various bit rate ratios of data to key.

Download Full Size | PDF

Figure 9 shows the BER curves of QPSK-OFDM and 16QAM-OFDM before and after the encryption, as well as at the illegal receiver, respectively, in which the ROP of the key signal is fixed as −18 dBm. With the increase of ROP, the BER of the unencrypted signal and the legal receiver with the correct key decrease gradually, while the BER of the illegal receiver remains around 0.5, which shows the security of the proposed encryption scheme. And it is undeniable that the encryption process also comes with a slight power penalty in the experiment, where the receiver sensitivity penalty at the BER of 1 × 10−3 is 0.6 dB and 0.9 dB for QPSK-OFDM and 16QAM-OFDM, respectively.

 figure: Fig. 9.

Fig. 9. (a) BER curves of the encrypted QPSK-OFDM, normal QPSK-OFDM, and illegal receiver; (b) BER curves of the encrypted 16QAM-OFDM, normal 16QAM-OFDM, and illegal receiver.

Download Full Size | PDF

Due to the use of key intertwining, each received set of key ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} ^{(i)}} = ({x_0}^{(i)},{y_0}^{(i)},{z_0}^{(i)})$ needs to be associated with the previous key ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} ^{(0)}}$, ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} ^{(1)}}$,…, ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} ^{(i - 1)}}$ before it can be substituted into the chaotic model as a correct key for decryption. To verify the security performance of this key intertwining scheme, we conduct security experiments on the following three conditions: (a) illegal receivers do not eavesdrop on any key information; (b) illegal receivers only eavesdrop ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} ^{(i)}}$; (c) illegal receivers eavesdrop on three sets of key ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} ^{(i)}}$, ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} ^{(i + 1)}}$, ${\mathord{\buildrel{\lower3pt\hbox{$\scriptscriptstyle\rightharpoonup$}} \over K} ^{(i + 2)}}$. The experimental results are shown in Fig. 10. It can be seen that the BER in the three cases maintains at about 0.5, which verifies that the proposed intertwining scheme exhibits good security performance. In addition, when the three initial values of the key x0, y0, z0 are changed by 10−15, respectively, the corresponding difference of the 15th digit after the decimal point of the chaotic sequence is shown in Fig. 11, which is randomly distributed within the integer range in [−9,9]. The combination of Chua’s circuit map with good initial value sensitivity and key intertwining scheme can effectively strengthen the security of digital chaotic encryption.

 figure: Fig. 10.

Fig. 10. BER curves of an illegal receiver under various possible conditions

Download Full Size | PDF

 figure: Fig. 11.

Fig. 11. When (a) x0, (b) y0, and (c) z0 is changed by 10−15, the corresponding difference of the 15th digit after the decimal point of the chaotic sequence.

Download Full Size | PDF

Finally, we compare the CET of the time-varying and time-invariant key chaotic encryption schemes at various key bit rates. The results are shown in Fig. 12. Taking the total transmission of the 1s key as the calculation standard, the bit length of the key in this paper is 192 bits, and thus the key space of the time-invariant key chaotic encryption scheme is 2192. If cracking time is limited within 1s, the CET is 2192 = 6.28 × 1057 s−1. For the time-varying key encryption scheme, according to the key transmission rate of 1 Gb/s, its CET is 109/192 × 2192 = 3.27 × 1064 s−1, which is 5.21 × 106 times of the former. With the increase of the key transmission bit rate, the CET of the time-invariant key encryption scheme remains constant, while the CET of the time-varying key encryption scheme increases linearly.

 figure: Fig. 12.

Fig. 12. The CET of time-varying and time-invariant key chaotic encryption schemes at various key bit rates.

Download Full Size | PDF

4. Conclusion

We have proposed an MDM chaotic encryption scheme based on key intertwining and accompanying transmission, where LP01 and LP11 modes are respectively adopted for the accompanying transmission of ciphertext and time-varying keys in weakly coupled FMF. The key at each moment is intertwined with the keys of all previous moments, which brings a great challenge to the illegal receivers who want to decipher the information by intercepting the key and data simultaneously. Moreover, the CET of the time-varying key encryption scheme is 5.21 × 106 times that of the time- invariant key encryption scheme in the case of the key transmission bit rate of 1 Gb/s. The feasibility of the proposed scheme is verified by an 8.89 Gb/s encrypted 16QAM-OFDM signal transmission over 1 km weakly-coupled FMF, proving that it could be an effective solution for future physical layer security.

Funding

National Key Research and Development Program of China (2018YFB1800901); National Natural Science Foundation of China (61935011, 61835005, 62171227, 61727817, U2001601, 62035018, 61875248, 61935005, 61720106015, 61975084); Jiangsu Provincial Key Research and Development Program (BE2022079, BE2022055-2); The Natural Science Foundation of the Jiangsu Higher Education Institutions of China (22KJB510031); Jiangsu team of innovation and entrepreneurship; The Startup Foundation for Introducing Talent of NUIST.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. H. K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” Nat. Photonics 8(8), 595–604 (2014). [CrossRef]  

2. B. Korzh, C. C. W. Lim, R. Houlmann, N. Gisin, M.-J. Li, D. Nolan, B. Sanguinetti, R. Thew, and H. Zbinden, “Provably secure and practical quantum key distribution over 307 km of optical fibre,” Nat. Photonics 9(3), 163–168 (2015). [CrossRef]  

3. A. Aguado, V. Lopez, J. Martinez-Mateo, T. Szyrkowiec, A. Autenrieth, M. Peev, D. Lopez, and V. Martin, “Hybrid conventional and quantum security for software defined and virtualized networks,” J. Opt. Commun. Netw. 9(10), 819–825 (2017). [CrossRef]  

4. X. Tang, A. Wonfor, R. Kumar, R. V. Penty, and I. H. White, “Quantum-safe metro networkwith low-latency reconfigurable quantum key distribution,” J. Lightwave Technol. 36(22), 5230–5236 (2018). [CrossRef]  

5. K. Wang, X. Tang, A. Wonfor, R. J. Collins, G. S. Buller, R. V. Penty, I. H. White, and X. Wang, “40Gbits−1 Data Transmission in an Installed Optical Link Encrypted Using Physical Layer Security Seeded by Quantum Key Distribution,” J. Lightwave Technol. 39(19), 6130–6141 (2021). [CrossRef]  

6. A. Argyris, D. Syvridis, L. Larger, V. Annovazzi-Lodi, P. Colet, I. Fischer, J. Garcia-Ojalvo, C. R. Mirasso, L. Pesquera, and K. A. Shore, “Chaos-based communications at high bit rates using commercial fibre-optic links,” Nature 438(7066), 343–346 (2005). [CrossRef]  

7. M. Sciamanna and K. A. Shore, “Physics and applications of laser diode chaos,” Nat. Photonics 9(3), 151–162 (2015). [CrossRef]  

8. J. Ke, L. Yi, G. Xia, and W. Hu, “Chaotic optical communications over 100-km fiber transmission at 30-Gb/s bit rate,” Opt. Lett. 43(6), 1323–1326 (2018). [CrossRef]  

9. X. Gao, M. Cheng, L. Deng, M. Zhang, S. Fu, and D. Liu, “Robust chaotic shift- keying scheme based on electro-optical hybrid feedback system,” Opt. Express 28(8), 10847–10858 (2020). [CrossRef]  

10. N. Jiang, A. Zhao, C. Xue, J. Tang, and K. Qiu, “Physical secure optical communication based on private chaotic spectral phase encryption/decryption,” Opt. Lett. 44(7), 1536–1539 (2019). [CrossRef]  

11. A. Zhao, N. Jiang, C. Chang, Y. Wang, S. Liu, and K. Qiu, “Generation and synchronization of wideband chaos in semiconductor lasers subject to constant-amplitude self-phase-modulated optical injection,” Opt. Express 28(9), 13292–13298 (2020). [CrossRef]  

12. A. Zhao, N. Jiang, S. Liu, Y. Zhang, and K. Qiu, “Physical Layer Encryption for WDM Optical Communication Systems Using Private Chaotic Phase Scrambling,” J. Lightwave Technol. 39(8), 2288–2295 (2021). [CrossRef]  

13. Y. Xiao, Y. Chen, and Z. Wang, “Secure transmission of W-band millimeter-wave based on CNN and dynamic resource allocation,” Opt. Lett. 46(22), 5583–5586 (2021). [CrossRef]  

14. Y. Xiao, Z. Wang, J. Cao, R. Deng, Y. Liu, J. He, and L. Chen, “Time–Frequency Domain Encryption With SLM Scheme for Physical-Layer Security in an OFDM-PON System,” J. Opt. Commun. Netw. 10(1), 46–51 (2018). [CrossRef]  

15. F. Wang, B. Zhu, C. Liu, K. Wang, J. Zhang, J. Ding, J. Shi, C. Wang, L. Zhao, M. Kong, Y. Wang, W. Zhou, M. Zhu, J. Yu, F. Zhao, and J. Yu, “Implementation of Digital Chaotic Encryption in THz Wireless Communication,” in Proc. Opt. Fiber Commun. Conf. (OFC)2022, Paper M3C.4. [CrossRef]  

16. Z. Zhang, Y. Luo, C. Zhang, X. Liang, M. Cui, and K. Qiu, “Constellation Shaping Chaotic Encryption Scheme With Controllable Statistical Distribution for OFDM-PON,” J. Lightwave Technol. 40(1), 14–23 (2022). [CrossRef]  

17. Y. Luo, C. Zhang, X. Liang, J. Peng, B. Liu, and K. Qiu, “Secure OFDM-PON using three-dimensional selective probabilistic shaping and chaos,” Opt. Express 30(14), 25339–25355 (2022). [CrossRef]  

18. J. Ren, B. Liu, D. Zhao, S. Han, S. Chen, Y. Mao, Y. Wu, X. Song, J. Zhao, X. Liu, and X. Xin, “Chaotic constant composition distribution matching for physical layer security in a PS-OFDM-PON,” Opt. Express 28(26), 39266–39277 (2020). [CrossRef]  

19. M. Li, J. Ren, Y. Mao, X. Song, S. Chen, S. Han, J. Zhao, Y. Wan, F. Tian, and B. Liu, “Flexible non-linear physical security coding scheme combined with chaotic neural network for OFDM-WDM-PON,” Opt. Express 29(16), 25848–25858 (2021). [CrossRef]  

20. J. Shen, B. Liu, Y. Mao, R. Ullah, J. Ren, J. Zhao, and S. Chen, “Enhancing the reliability and security of OFDM-PON using modified Lorenz chaos based on the linear properties of FFT,” J. Lightwave Technol. 39(13), 4294–4299 (2021). [CrossRef]  

21. L. Yuan, B. Liu, J. Ren, Y. Mao, Y. Bai, X. Wu, S. Chen, F. Tian, S. Zhu, and Q. Zhong, “High-security OCDM-PON system of 7-core fiber based on CFCM encryption,” Opt. Lett. 47(1), 186–189 (2022). [CrossRef]  

22. S. Chen, B. Liu, J. Ren, Y. Mao, R. Ullah, X. Song, Y. Bai, L. Jiang, S. Han, J. Zhao, Y. Wan, X. Zhu, and J. Shen, “A 7D Cellular Neural Network Based OQAM-FBMC Encryption Scheme for Seven Core Fiber,” J. Lightwave Technol. 39(22), 7191–7198 (2021). [CrossRef]  

23. X. Zhu, J. Ren, X. Zhu, Y. Mao, X. Wu, S. Zhu, Y. Wu, L. Zhao, T. Sun, R. Ullah, F. Tian, and B. Liu, “Chaotic physical security strategy based on manifold learning assisted GANs for SDM-OFDM-PON,” Opt. Lett. 47(7), 1834–1837 (2022). [CrossRef]  

24. Z. Wang, Y. Xiao, S. Wang, Y. Yan, B. Wang, Y. Chen, Z. Zhou, J. He, and L. Yang, “Probabilistic shaping based constellation encryption for physical layer security in OFDM RoF system,” Opt. Express 29(12), 17890–17901 (2021). [CrossRef]  

25. T. Wu, C. Zhang, Y. Chen, M. Cui, H. Huang, Z. Zhang, H. Wen, X. Zhao, and K. Qiu, “Compressive sensing chaotic encryption algorithms for OFDM-PON data transmission,” Opt. Express 29(3), 3669–3684 (2021). [CrossRef]  

26. X. Liang, C. Zhang, Y. Luo, M. Cui, and K. Qiu, “Secure key distribution and synchronization method in an OFDM-PON based on chaos,” Opt. Express 30(11), 18310–18319 (2022). [CrossRef]  

27. Y. Wan, J. Ren, B. Liu, Y. Mao, S. Chen, X. Wu, Y. Li, Y. Wu, L. Zhao, T. Sun, and R. Ullah, “Secure OFDM transmission scheme based on chaotic encryption and noise-masking key distribution,” Opt. Lett. 47(11), 2903–2906 (2022). [CrossRef]  

28. L. O. Chua, M. Komuro, and T. Matsumoto, “The double scroll family,” IEEE Trans. Circuits Syst. 33(11), 1072–1118 (1986). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (12)

Fig. 1.
Fig. 1. The architecture of MDM chaotic encryption based on key intertwining and accompanying transmission.
Fig. 2.
Fig. 2. Phase diagram of Chua’s circuit map.
Fig. 3.
Fig. 3. Phase diagrams with initial values of {−1.0, 0.2, 1.1} and {−1.0 + 10−15, 0.2 + 10−15, 1.1 + 10−15}.
Fig. 4.
Fig. 4. Schematic diagram of (a) constellation phase perturbation; (b) OFDM time-frequency scrambling.
Fig. 5.
Fig. 5. Comparison of transmitted key and the intertwined key.
Fig. 6.
Fig. 6. Comparison of transmitted key and the intertwined key.
Fig. 7.
Fig. 7. Experimental setup (AWG: arbitrary waveform generator; EA: electrical amplifier; MZM: Mach-Zehnder modulator; VOA: variable optical attenuator; PD: photodiode; MSO: mixed signal oscilloscope).
Fig. 8.
Fig. 8. ROP thresholds for (a) QPSK-OFDM and (b) 16QAM-OFDM at various bit rate ratios of data to key.
Fig. 9.
Fig. 9. (a) BER curves of the encrypted QPSK-OFDM, normal QPSK-OFDM, and illegal receiver; (b) BER curves of the encrypted 16QAM-OFDM, normal 16QAM-OFDM, and illegal receiver.
Fig. 10.
Fig. 10. BER curves of an illegal receiver under various possible conditions
Fig. 11.
Fig. 11. When (a) x0, (b) y0, and (c) z0 is changed by 10−15, the corresponding difference of the 15th digit after the decimal point of the chaotic sequence.
Fig. 12.
Fig. 12. The CET of time-varying and time-invariant key chaotic encryption schemes at various key bit rates.

Equations (6)

Equations on this page are rendered with MathJax. Learn more.

{ x / t = a ( y x f ( x ) ) y / t = x y + z z / t = b y f ( x ) = d x + 0.5 ( c d ) ( | x + 1 | | x 1 | ) ,
{ p = mod ( x 10 15 , 4 ) π / 2 q = f i x ( mod ( a b s ( y 10 15 ) , M ) ) + 1 w = f i x ( mod ( a b s ( z 10 15 ) , N ) ) + 1 ,
S = Q ( S exp ( i p ) ) W .
{ K 5 64 B ( 1 ) = ( x 0 ( 1 ) , y 0 ( 1 ) , z 0 ( 1 ) ) B K 5 64 B ( 2 ) = ( x 0 ( 2 ) , y 0 ( 2 ) , z 0 ( 2 ) ) B K 5 64 B ( 1 )   K 5 64 B ( i ) = ( x 0 ( i ) , y 0 ( i ) , z 0 ( i ) ) B K 5 64 B ( i 1 ) .
{ K .1 D ( i ) = mod ( b i n 2 d e c ( K 5 8 B ( i ) ) , 10 ) K .2 D ( i ) = mod ( b i n 2 d e c ( K 9 12 B ( i ) ) , 10 )     . K .15 D ( i ) = mod ( b i n 2 d e c ( K 61 64 B ( i ) ) , 10 )
C E T = R n × 2 n ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.