Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Physical layer encryption for coherent PDM system based on polarization perturbations using a digital optical polarization scrambler

Open Access Open Access

Abstract

In this paper, a security enhanced physical layer encryption scheme is proposed for coherent optical polarization division multiplexing (PDM) systems. The concept of a digital optical polarization scrambler (DOPS) is introduced to apply high speed rotation of state of polarization (RSOP) to the transmitted signal, which enables encryption based on polarization perturbations and offers superior flexibility in polarization management. By utilizing different combinations of digital polarization device matrices and adjusting their key parameters, four encryption modes are designed. The proposed encryption scheme is successfully implemented in a PDM-QPSK system at the data rate of 32 Gbps. Experimental results demonstrate that authorized users can successfully decrypt the received signal, while the eavesdroppers cannot derive useful information with a bit error rate (BER) at approximately 0.5. To enhance system security, a 5-D chaotic system is introduced with superior properties of high sensitivity to initial values and improved uniform distribution, which guarantees the large entropy and further the system’s security. This scheme can effectively prevent against brute attacks with the expanded key space of 1060.

© 2023 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

With the deployment and maturity of the fifth-generation mobile network, the global data traffic has been experiencing explosive growth due to the rapid development of various mobile internet businesses. Additionally, the surge in demand for services such as the Internet of things, virtual reality, and cloud computing has led to an increased need for connections between data centers [15]. The optical transmission system is facing enormous challenges due to the massive data transmission demand. As a result, it is of great importance to establish high-rate, large-capacity, and high-spectral-efficiency optical transmission systems in optical network [68]. To address this challenge, diverse technologies have been developed, among which coherent optical polarization division multiplexing (PDM) systems are widely used in backbone networks and trending towards application in short-distance connection systems due to their high capacity and spectral efficiency [912].

As a multiplexing method, PDM technology utilizes the polarization property of lightwave to realize the simultaneous transmission of two independent data sequences through two orthogonal polarization states of light in the same wavelength channel [1317]. The introduction of PDM technology can effectively double the total capacity of the system and improve the system's spectrum efficiency. Furthermore, PDM technology exhibits good compatibility with digital signal processing (DSP) technology and advanced systems such as orthogonal frequency division multiplexing (OFDM) [18,19]. However, most of the research on PDM has focused on channel capacity and spectrum efficiency while neglecting the security of the system. In optical transmission systems, the transmitted data can be easily eavesdropped upon, and physical disruptions can result in security degradation [20,21]. Therefore, in recent years, many researchers have proposed encryption schemes to overcome this problem.

Currently, encryption techniques in different Open System Interconnection (OSI) layers are proposed to ensure secure signal transmission in optical fiber communication systems. Among these techniques, optical physical layer encryption is widely studied due to its advantages of transparent protocol, full encryption, and low complexity [2226]. Most of these encryption methods utilize technologies to spread or scramble signal in amplitude, frequency, and phase domains [2732]. Moreover, multiple encryption schemes have been developed to exploit joint domains to further increase disturbance among diverse domains [3337]. However, the polarization domain in PDM systems is seldom explored to enhance disturbance.

In this paper, we introduce polarization perturbations to the transmitted signal by digitally rotating the state of polarization at the transmitter through DSP, which explore the polarization property to realize encryption in PDM system. Rotation of state of polarization (RSOP) is a common phenomenon in the PDM system, resulting from the random birefringence of optical fiber, leading to the unpredictable variation of the polarization state of the signal transmitted in the channel and the incorrect separation of the dual-polarization signal at the receiver. In extreme scenarios such as lightning, ultra-fast RSOP up to Mrad/s can occur in optical fiber links, resulting in a significant number of errors in the communication system [3842]. The distortion caused by RSOP is regarded as a challenge which inspires a lot of studies on RSOP model establishment and equalization technologies [4348]. However, this study artificially introduces a key-controlled high-speed RSOP which is beyond the receiver's compensation ability to prevent eavesdropping from illegal users. In order to increase the flexibility of applying RSOP, the concept of digital optical polarization scrambler (DOPS) is adopted and a series of digital polarization device matrices are operated on the input signal in the DSP at the transmitter, which results in the equivalent effect of optical polarization perturbations.

DOPS can be implemented using matrices for digital polarization devices, including digital polarization rotator (DPRO) and digital phase retarder (DPRE), similar to conventional optical polarization devices. Four encryption modes are designed by using different combinations of DPRO and DPRE and by adjusting the key parameters in the digital polarization matrix. To expand the key space, a 5-D chaotic system is introduced to accommodate the five critical parameters involved in the encryption process. By incorporating the inherent randomness and unpredictability of the chaotic system, the encryption scheme becomes more resistant to potential attacks and increases the difficulty of unauthorized decryption. To verify the feasibility and security of the encryption algorithm, an experimental PDM-QPSK transmission system with a data rate of approximately 32 Gbps is employed. The experimental results demonstrate the effectiveness and safety of the encryption scheme, providing confidence in its practical application.

2. Principles

Figure 1 illustrates the schematic diagram of a physical layer encryption scheme based on polarization perturbations of transmitted signal using digital optical polarization scrambler (DOPS) to introduce a chaotic key-controlled high-speed RSOP in a coherent optical PDM system. In the electrical domain through DSP, two pairs of I and Q signals are digitally scrambled using digital polarization device matrices. This process results in the equivalent effect of RSOP perturbations applied to the optical signals after PDM modulation and delivers extensive flexibility for designing various encryption modes.

 figure: Fig. 1.

Fig. 1. Schematic diagram of the proposed encryption scheme based on polarization perturbations of transmitted signal using DOPS in coherent PDM system. DOPS: digital optical polarization scrambler.

Download Full Size | PDF

The encryption mode and the parameters of the DOPS can be selected as the keys such as polarization rotation angle and phase delay angle, which can be fully exploited to determine RSOP speed and polarization perturbation effect. Such RSOP perturbation introduced is far beyond the ability of the state-of-the-art algorithms at the coherent receiver, making it impossible for eavesdroppers to eliminate RSOP even with the most advanced adaptive DSP approaches without keys. Additionally, to further increase the resistance against brute force attack, a five-dimensional (5-D) chaotic system is implemented to generate key sequences with high randomness and substantially expand the key space of the encryption method. After processing in the DSP, the electrical encrypted signals are modulated to two mutually orthogonal polarized optical carriers via conventional dual-polarization IQ modulator and thus the optical polarization perturbed signal is generated. Subsequently, the encrypted signals are transmitted to the receiver over the optical fiber. The encryption algorithm is reversible, allowing legitimate receivers to obtain the correct information by implementing the corresponding decryption steps in the reverse process.

2.1 Encryption based on the digital optical polarization scrambler

Conventionally, polarization adjustment is accomplished using optical polarization devices such as polarization rotator and retarder. However, in PDM systems, the signal is modulated onto two orthogonal polarization states, which enables polarization adjustment in the electrical domain by pre-polarizing the signal using DSP technology at the transmitter. By appropriately manipulating the I and Q signals on the X and Y polarizations, polarization changes can be introduced in a manner equivalent to those achieved optically. This implementation approach offers superior flexibility and control in polarization management, enabling encryption based on polarization perturbations.

Figure 2 depicts the principle of transitioning from utilizing DOPS in electrical domain to inducing polarization perturbations to optical signal. In high-speed PDM coherent optical communication systems, a dual-polarization IQ modulator is employed to modulate the electrical signal onto the optical carrier. The transfer function of the modulator for each polarization branch can be expressed as follows:

$$\begin{aligned} \quad \Psi &= \cos \left( {\frac{\pi }{{2{V_\pi }}}{V_1}(t)} \right) + \cos \left( {\frac{\pi }{{2{V_\pi }}}{V_2}(t)} \right){e^{j\frac{\pi }{2}}}\\ &= \cos \left( {\frac{\pi }{{2{V_\pi }}}({v_{RF1}}(t) + {V_{bias1}})} \right) + j\cos \left( {\frac{\pi }{{2{V_\pi }}}({v_{RF2}}(t) + {V_{bias2}})} \right) \end{aligned}$$
where Vπ is half wave voltage; vRF1(t), vRF2(t) respectively refer to the signal voltages to be input by I, Q arms; Vbias1, Vbias2 are the bias voltages of I, Q arms respectively. In conventional PDM high-order modulation, the bias voltages are often set at the null point where Vbias1 = Vbias2=-Vπ. So formula 1 can be written as:
$$\Psi = \sin \left( {\frac{\pi }{{2{V_\pi }}}{V_{RF1}}(t)} \right) + j\sin \left( {\frac{\pi }{{2{V_\pi }}}{V_{RF2}}(t)} \right)$$

 figure: Fig. 2.

Fig. 2. The principle of transitioning from utilizing DOPS in electrical domain to inducing polarization perturbations to optical signal. DOPS: Digital optical polarization scrambler; DPRO: Digital polarization rotator; DPRE: Digital polarization retarder.

Download Full Size | PDF

The input electrical signal can be represented as a vector:

$$A = \left( \begin{array}{l} {I_X} + j{Q_X}\\ {I_Y} + j{Q_Y} \end{array} \right)$$
where IX, QX, IY, QY correspond to the in-phase and quadrature components that modulate the two orthogonal polarization states of the optical carrier in a PDM system. The state of polarization (SOP) of the modulated optical signal can be written as:
$$|E \rangle = {\Psi _x}{\widehat e_x} + {\Psi _y}{\widehat e_y}$$
where ${\mathrm{\Psi }_x} = \textrm{sin}\left( {\frac{\pi }{{2{V_\pi }}} \cdot {I_X}} \right) + j\textrm{sin}\left( {\frac{\pi }{{2{V_\pi }}} \cdot {Q_X}} \right)$;${\mathrm{\Psi }_y} = \textrm{sin}\left( {\frac{\pi }{{2{V_\pi }}} \cdot {I_Y}} \right) + j\textrm{sin}\left( {\frac{\pi }{{2{V_\pi }}} \cdot {Q_Y}} \right)$;${\hat{e}_x} = \left( {\begin{array}{{c}} 1\\ 0 \end{array}} \right)$;${\hat{e}_y} = \left( {\begin{array}{{c}} 0\\ 1 \end{array}} \right)$. For the typical modulation formats in PDM systems, both amplitude and phase modulation are used to modulate the two orthogonal polarization states of the optical carrier in the electro-optical modulation process. Consequently, the amplitude ratio and phase difference in the Jones vector of the modulated signal are determined by the electrical signal vector A as:
$$|E \rangle \propto A = \left( \begin{array}{l} {I_X} + j{Q_X}\\ {I_Y} + j{Q_Y} \end{array} \right)$$

The left panel of Fig. 2 illustrates the complex plane constellation of the dual-polarization electrical signal for the PDM-QPSK modulation, and its corresponding relationship with the Stokes vectors on the Poincaré sphere in the optical domain after modulation. It can be inferred that the polarization state of the modulated signal is strongly correlated with the distribution of the applied electrical signal A.

Thus, utilizing DOPS to disturb the electrical signal vector A, perturbations can be introduced to the corresponding SOP of the modulated optical signal on the Poincaré sphere, enabling optical polarization-perturbation-based encryption.

The digital optical polarization scrambler can be represented mathematically using a matrix:

$$U = \left( \begin{array}{l} {U_{11}}\textrm{ }{U_{12}}\\ {U_{21}}\textrm{ }{U_{22}} \end{array} \right)$$

DOPS can be implemented using matrices for digital polarization devices, including DPRO and DPRE, similar to conventional optical polarization devices. The right panel of Fig. 2 shows the complex plane constellation and the corresponding distribution of Stokes vectors on the Poincaré sphere in the optical domain after modulation for polarization scrambling utilizing a digital polarization rotator. The matrix for the digital polarization rotator can be expressed as follows:

$${U_1} = \left( \begin{array}{c} \cos \theta \textrm{ } - \sin \theta \\ \sin \theta \textrm{ }\cos \theta \end{array} \right)$$
where θ is the rotation angle in the range of [0, π]. As seen from the figure, the PDM-QPSK signal's constellation on the complex plane is perturbed, and the corresponding distribution of the optical signal's polarization state is scattered around the equator and poles of the Poincaré sphere. Additionally, the digital phase retarder, as another fundamental polarization device, can be utilized to further scramble the output polarization. The matrix for the zero azimuth digital phase retarder can be expressed as follows:
$${U_2} = \left( \begin{aligned} \exp (\frac{{i\Delta }}{2}) \qquad \qquad0\\ 0 \qquad \quad\exp ( - \frac{{i\Delta }}{2}) \end{aligned} \right)$$
where Δ is the phase retardation angle in the range of [0, 2π]. For the phase retarder with an azimuth angle of µ, the corresponding matrix can be expressed as:
$${U_3} = \left( \begin{array}{c} \cos \mu \textrm{ }\sin \mu \\ - \sin \mu \textrm{ }\cos \mu \end{array} \right)\left( \begin{array}{l} \exp (\frac{{i\Delta }}{2}) \qquad 0\\ \textrm{ }0 \qquad \quad \exp ( - \frac{{i\Delta }}{2}) \end{array} \right)\left( \begin{array}{l} \cos \mu \textrm{ } - \sin \mu \\ \sin \mu \textrm{ }\cos \mu \end{array} \right)$$
where µ is in the range of [0, π].

It can be observed that U3 can be obtained by multiplying U1 and U2. Thus, by utilizing a certain number of digital polarization rotator and phase retarder matrices, DOPS has the ability to scramble SOP of the optical signal to any desired state, achieving encryption with a high degree of randomness.

2.2 Design of different encryption modes

Using the principle mentioned above, various encryption modes can be implemented by combining DPRO and DPRE, resulting in distinct polarization state trajectories of the encrypted signal in Stokes space. Four encryption modes are designed by using different combinations of DPRO and DPRE and by adjusting the key parameters in the digital polarization matrix.

  • (1) DPRO-based encryption mode

By utilizing a polarization rotation matrix with a changing rotation angle, the polarization states corresponding to the transmitted optical signal can be rotated and scrambled, which is equivalent to applying a fast RSOP to the transmitted signal.

The encrypted signal vector can be expressed as:

$$A^{\prime} = \left( \begin{array}{l} {I_X}^\prime + j{Q_X}^\prime \\ {I_Y}^\prime + j{Q_Y}^\prime \end{array} \right) = \left( \begin{array}{c} \cos \theta \textrm{ } - \sin \theta \\ \sin \theta \textrm{ }\cos \theta \end{array} \right)\left( \begin{array}{l} {I_X} + j{Q_X}\\ {I_Y} + j{Q_Y} \end{array} \right)$$
where θ increases linearly in the range of [0, π], the initial value and increasing step serve as the encryption keys. Figure 3(e) illustrates the perturbed polarization state of the encrypted signal under the rotation angle depicted in Fig. 3(a). As can be observed, the distribution of the optical signal's polarization state is scattered around the equator and poles of the Poincaré sphere after DPRO-based encryption.
  • (2) DPRE-based encryption mode

 figure: Fig. 3.

Fig. 3. Changes of the rotation angle, retardation angle and azimuth angle in different encryption modes (a-d), and corresponding perturbed polarization states for DPRO mode (e), DPRE mode (f) and DPRO-DPRE modes (g-h)

Download Full Size | PDF

If a fast-changing azimuth angle polarization retarder is used as the encryption matrix, the encrypted signal vector can be represented as follows:

$$\begin{aligned} A^{\prime} &= \left( \begin{array}{l} {I_X}^\prime + j{Q_X}^\prime \\ {I_Y}^\prime + j{Q_Y}^\prime \end{array} \right)\\& = \left( \begin{array}{c} \cos \mu \textrm{ }\sin \mu \\ - \sin \mu \textrm{ }\cos \mu \end{array} \right)\left( \begin{array}{l} \exp (\frac{{i\Delta }}{2})\textrm{ }0\\ \textrm{ }0\exp ( - \frac{{i\Delta }}{2}) \end{array} \right)\left( \begin{array}{l} \cos \mu \textrm{ } - \sin \mu \\ \sin \mu \textrm{ }\cos \mu \end{array} \right)\left( \begin{array}{l} {I_X} + j{Q_X}\\ {I_Y} + j{Q_Y} \end{array} \right) \end{aligned}$$
where azimuth angle µ changes in steps between 0 and π, and the value of phase retardation angle Δ changes periodically between 0 and 2π. Figure 3(b) depicts the changes in the two angles in this mode, and the corresponding perturbed polarization state is shown in Fig. 3(f). As can be observed, the distribution of the optical signal’s polarization state is symmetrically scattered on the Poincaré sphere after DPRE-based encryption. This DPRE-based encryption mode can also be referred to as the “eyeball mode”.
  • (3) DPRO-DPRE based encryption mode

Advanced encryption modes can be designed by combining DPRO and DPRE to achieve increased randomness in encryption. By cascading matrix U1 and matrix U2, the encrypted signal vector can be obtained in the following form:

$$A^{\prime} = \left( \begin{array}{l} {I_X}^\prime + j{Q_X}^\prime \\ {I_Y}^\prime + j{Q_Y}^\prime \end{array} \right) = \left( \begin{array}{l} \exp (\frac{{i\Delta }}{2}) \qquad 0\\ \textrm{ }0 \qquad \quad \exp ( - \frac{{i\Delta }}{2}) \end{array} \right)\left( \begin{array}{c} \cos \theta \textrm{ } - \sin \theta \\ \sin \theta \textrm{ }\cos \theta \end{array} \right)\left( \begin{array}{l} {I_X} + j{Q_X}\\ {I_Y} + j{Q_Y} \end{array} \right)$$

Different encryption modes can be further achieved by varying the methods of setting rotation angle θ and retardation angle Δ. After encryption, the distribution of the optical signal's polarization state becomes more randomized and widely distributed on the Poincaré sphere.

In one mode, θ changes periodically between [0, π], and Δ changes in steps between [0, π]. In the other mode, θ changes in steps between [0, π], while Δ first changes periodically between [0, π] and then between [-π, 0]. Figure 3(c-d) shows the changes in the two angles in these two modes, and the corresponding perturbed polarization state are shown in Fig. 3(g-h).

The modes mentioned above represent common application approaches of polarization devices in optical systems. However, since DOPS is implemented in the digital domain, it allows for more diverse options in matrix design and connection techniques. By making adjustments to various design factors, such as selecting different polarization device matrices, varying their quantities, employing different cascading methods, and optimizing key parameters, it becomes feasible to broaden the range of available encryption modes and improve the flexibility and versatility of the system.

2.3 Encryption process of different modes and the key space

For each frame of data, the signal vectors are processed with specific matrices using angles that are pre-determined based on the selected encryption mode, RSOP speed, and initial values, according to the principle explained above. Figure 4 provides a detailed illustration of the encryption process for the DPRO-DPRE-1 mode. The encryption process begins by selecting the desired encryption mode. Next, the rotation speed of RSOP is set to the desired value. After that, key parameters for encryption are determined, which may include initial values, step sizes, or specific ranges for angles. Based on these parameters, the angles required for the polarization matrices are calculated. With the calculated angles, the corresponding encryption matrices are derived. Finally, these encryption matrices are applied to the data vectors to perform the encryption operation, ensuring the desired level of data security and confidentiality.

 figure: Fig. 4.

Fig. 4. Detailed encryption process for the DPRO-DPRE-1 mode.

Download Full Size | PDF

To prevent eavesdropping through compensation of the RSOP introduced in the encryption by the transmitter, it is important for the applied RSOP speed to exceed the upper limit of compensation achievable by existing methods such as constant modulus algorithm (CMA) and Kalman filter [44]. The RSOP speed is determined by considering the angle interval and time interval between two adjacent output polarization states. The specific values for these two parameters would depend on the encryption mode, system parameters, and desired level of security. These values need to be carefully chosen to ensure a sufficiently high RSOP speed that surpasses the compensation capabilities of potential eavesdroppers.

For the dual-polarization QPSK signal, where the bit rate at the transmitting end is denoted as r, the symbol rate R for each polarization branch can be calculated as:

$$R = \frac{r}{4}$$

Assuming the mode cycle, representing the number of DOPS matrices, is denoted as N, and n represents the number of signal vectors that an encryption matrix operates on. Additionally, the number of periods of the polarization rotator in one mode cycle is denoted as m.

Supposing that the angle interval between two adjacent polarization rotation angles is uniform, we can derive the values for the angle interval a1 and time interval Δt as follows:

$${a_1} = \frac{{\pi m}}{N}$$
$$\Delta t = \frac{n}{R}$$

Then the RSOP speed is derived as:

$${V_1} = {a_1} \times \frac{R}{n} = \frac{{\pi m}}{N} \times \frac{R}{n}$$

In the designed modes, the encryption result is determined by the specific sequences of θ, Δ or µ angles. Therefore, the independent parameters mentioned above can be selected as the encryption keys. These parameters include the number of DOPS matrices N, the number of signal vectors n, the number of periods of the polarization rotator in one mode cycle m, the initial value θ1, the initial value Δ1, the initial value µ1. The key space is determined by the hardware limitations and the requirement for RSOP speed.

Let’s assume that the minimum RSOP speed required for encryption is denoted as VL, representing the maximum RSOP speed that can be compensated by the DSP at the receiver. In the DPRO-DPRE-1 encryption mode, the applied RSOP speed should satisfy the following condition:

$${V_1} = {a_1} \times \frac{R}{n} = \frac{{\pi m}}{N} \times \frac{R}{n} > {V_L}$$

Therefore, to ensure that the minimum RSOP speed requirement is met, the value of the mode cycle N should satisfy:

$$N < \frac{{\pi mR}}{{n{V_L}}}$$

For the DPRO matrix, the rotation angles within one period should be integers ranging from 2 to floor(2πR/(nVL)), where the floor function rounds down the value. Let h denote the number of possible initial values for θ1 and Δ1. The number of periods of the polarization rotator in one mode cycle, denoted as m, is an independent parameter with a value range of integers from 2 to h/2. Therefore, the key space of the DPRO-DPRE-1 mode can be expressed as follows:

$${P_1} = {h^2}(\frac{h}{2} - 1)(floor(\frac{{2\pi R}}{{n{V_L}}}) - 1)$$

Similarly, the key spaces of the other three modes can also be derived.

Taking a dual-polarization QPSK system with a transmission rate of 100 Gbps as an example, assuming that the DSP at the receiver can compensate for a maximum RSOP speed of 3 Mrad/s. Due to hardware limitations, the maximum number of possible initial values for the θ angle in the electrical domain is on the order of 104. By substituting these values into the above equation, the key space for the DPRO-DPRE-1 mode in one encryption cycle is estimated to be on the order of 1016.

2.4 Extension of key space using 5-D chaotic sequences

Based on the discussion in Section 2.3, it has been recognized that the key space of encryption using DOPS within a single mode cycle is comparatively limited and insufficient to withstand brute-force attacks from eavesdroppers. To address this issue, a 5-D chaotic system is introduced to accommodate the five critical parameters involved in the encryption process. By incorporating the inherent randomness and unpredictability of the chaotic system, the key space is significantly expanded, making it more resistant to potential attacks and increasing the difficulty of unauthorized decryption.

The Lorenz chaotic system is a widely recognized nonlinear dynamic system renowned for its chaotic behavior. It is characterized by a distinct butterfly-shaped attractor in three-dimensional space. Operating in continuous time, the Lorenz system allows for smooth and continuous evolution of its variables. It offers several advantages, including a wide range of possible trajectories, making it suitable for applications requiring real-time or continuous data encryption. Additionally, it exhibits sensitive dependence on initial conditions and lacks long-term predictability. Here, a 5-D Lorenz chaotic system is designed as an extension of the classic Lorenz system. By incorporating five variables instead of three, this enhanced system introduces increased complexity and dynamical behavior. As a result, it exhibits more intricate and unpredictable chaotic dynamics compared to the original 3-D Lorenz system. The additional dimensions provide greater freedom for chaotic trajectories to explore in a higher-dimensional space.

The equations of the extended 5-D Lorenz chaotic system are as follows:

$$\begin{array}{l} \mathrm{\dot{x}\ =\ y\ +\ m\ +\ z(}{\textrm{n}^\textrm{2}}\textrm{ - 3)}\\ \mathrm{\dot{y}\ =\ -\ x\ +\ zm\ +\ m}\\ \mathrm{\dot{z}\ =\ -\ ym\ +\ }{\textrm{n}^\textrm{2}}\textrm{ - 3}\\ \mathrm{\dot{m}\ =\ -\ x\ -\ y\ +\ }{\textrm{n}^\textrm{2}}\textrm{ - 3}\\ \mathrm{\dot{n}\ =\ -\ xz\ -\ z\ -\ m} \end{array}$$

These equations describe dynamics of the variables x, y, z, m and n as they evolve with time. The 5-D chaos systems are employed to derive the values of N, m, n, and the initial angles, which function as the encryption keys for the DOPS method, as outlined in the following expressions:

$$\begin{array}{c} \textrm{X = mod(x} \times \textrm{1}{\textrm{0}^{\textrm{15}}}\textrm{,10000)}\\ \textrm{Y = mod(y} \times \textrm{1}{\textrm{0}^{\textrm{15}}}\textrm{,10000)}\\ \textrm{Z = mod(z} \times \textrm{1}{\textrm{0}^{\textrm{15}}}\textrm{,10000)}\\ \textrm{M = mod(m} \times \textrm{1}{\textrm{0}^{\textrm{15}}}\mathrm{,2\pi )}\\ \textrm{N = mod(n} \times \textrm{1}{\textrm{0}^{\textrm{15}}}\mathrm{,\pi )} \end{array}$$

Unpredictability is a critical characteristic of a chaotic system, where the values in the output sequences exhibit random variations with time. Figure 5(a) depicts the state variables generated by the 5-D chaotic system, demonstrating the substantial changes in state values as the number of iterations increases. The autocorrelations of the x and X sequences are illustrated in Fig. 5(b), while the cross-correlations between the x and n, X and N sequences are shown in Fig. 5(c), providing evidence of the exceptional autocorrelation and cross-correlation performance of the sequences derived from the 5-D chaotic system. Consequently, the high level of randomness in the output sequences effectively guarantees the unpredictability of the 5-D chaotic system, thereby enhancing its overall security.

 figure: Fig. 5.

Fig. 5. (a) Change of state values of 5-D chaos system with time. (b) Auto-correlations of sequence x and X. (c) Cross-correlations between sequences x and n, X and N.

Download Full Size | PDF

The distribution characteristic of the chaotic sequence is an important criterion for assessing its randomness. According to Shannon's theorem, if the distribution of a random sequence is non-uniform, the amount of information decreases, and the decryption difficulty decreases accordingly. In Fig. 6(a), the distribution of the five normalized chaotic variables is presented. Here, x’ to n’ represent the sequences after being normalized to the range of 0 to 1. Figure 6(b) displays the distributions of the derived key sequences after applying a modulus operation. The distribution of the key sequences appears to be more uniform due to the incorporation of multiplication and division operations. This enhanced uniformity in the distribution of sequences contributes to the overall randomness of the 5-D chaotic system, thereby reinforcing its encryption capability.

 figure: Fig. 6.

Fig. 6. Distributions of the normalized 5-D chaotic sequences (a) and derived key sequences (b).

Download Full Size | PDF

Furthermore, the designed 5-D chaotic system demonstrates a notable sensitivity to initial values, indicating that even a slight alteration in the initial value can lead to a completely different system state after a short time. Figure 7(a) illustrates the presence of positive Lyapunov exponents (LE), signifying the system's transition to chaotic motion. Moreover, Fig. 7(b) shows that a slight perturbation of 10−12 in the initial value of the chaotic sequences results in a completely distinct sequence. This characteristic of high sensitivity to initial values endows the designed 5-D chaotic system with the potential to achieve a large key space, enhancing its security and resistance against cryptographic attacks. Moreover, by increasing the reading interval of the chaotic values, it is possible to further enhance the sensitivity to initial values, thereby increasing the key space.

 figure: Fig. 7.

Fig. 7. Lyapunov exponents (LE) of the 5-D chaotic sequences (a) and correlation coefficients of the derived key sequences with the initial disturbance of x (b).

Download Full Size | PDF

By incorporating the 5-D chaotic system, the total key space of the proposed system is expanded to 1060. This substantial increase in the key space ensures a higher level of security and significantly enhances the system's resistance against brute-force attacks and other cryptographic vulnerabilities.

3. Experimental setup and results

The experimental setup for the proposed PDM system with enhanced security using polarization perturbation through DOPS is depicted in the Fig. 8. The data is first encrypted in the electrical domain at the transmitter DSP. Thereafter, the encrypted signal is utilized to modulate the laser using a PDM-IQ modulator. At the receiver, the received optical signal is coherent-detected and then converted into an electrical signal. Subsequently, decryption and DSP equalization are conducted to recover the original data.

 figure: Fig. 8.

Fig. 8. Experimental diagram of the security enhanced PDM-QPSK system based on polarization perturbation using DOPS. ECL: External Cavity Laser; DAC: Digital-to-Analogue Converter; EA: Electrical Amplifier; PDM-IQM: Polarization Division Multiplexing I/Q Modulator; TOF: Tunable Optical Filter; VOA: Variable Optical Attenuator; ICR: Integrated Coherent Receiver; DSO: Digital Storage Oscilloscope.

Download Full Size | PDF

In the experiment, QPSK is utilized as the modulation format in the PDM system. In the off-line DSP, the PDM-QPSK signals are encrypted using the aforementioned encryption modes. Parameters in the DOPS are set as follows: the mode cycle N is 4000, the initial values of angles in the encryption matrices are 0, the number of periods of the polarization rotator in one mode cycle m is 20, and the number of signal vectors that an encryption matrix operates on n is 1. Subsequently, the four encrypted IQ signals are converted from digital to analog using an arbitrary waveform generator (AWG) and then amplified using electrical amplifiers (EA) before being loaded onto the optical carrier using a PDM-IQ modulator. An external cavity laser (ECL) laser with a center wavelength of 1550 nm is used as the light source. The symbol rate for each polarization branch is configured to be 8 Gbaud, leading to a corresponding data bit rate of 32 Gbps. At the receiver, the optical signal with a power of -8.9 dBm undergoes coherent detection using an integrated coherent receiver (ICR). The received optical signal is then converted into an electrical signal and digitized using a digital storage oscilloscope (DSO). For the authorized users, decryption is implemented using the inverse DOPS matrices in the decryption module. Equalizations are performed in the receiver DSP to compensate for impairments such as random RSOP and phase noise.

Figure 9 displays the constellation diagrams of the polarization perturbed signal and the received signal with and without decryption in the X polarization for the four encryption modes. All the applied RSOP speeds for the four encryption modes exceed the upper limit of compensation provided by the classical CMA algorithm, which is typically around 2-3 Mrad/s. This means that the RSOP speeds used in the system are beyond the compensation capability of the CMA algorithm for all four encryption modes. For the DPRO and DPRO-DPRE-1 modes, where the number of angle values per period of the polarization rotator is P = 200, the calculation for RSOP is as follows:

$${V_{DPRO}} = {V_{DPRO - DPRE - 1}} = \frac{\pi }{P} \times \frac{R}{n} = \frac{\pi }{{200}} \times \frac{{8 \times {{10}^9}}}{1} \approx 126\textrm{Mrad/s}$$

 figure: Fig. 9.

Fig. 9. Constellation diagrams of the polarization perturbed signal and the received signal with and without decryption in the X polarization for the four encryption modes.

Download Full Size | PDF

And for the DPRO and DPRO-DPRE-1 modes, the number of angle values per period of the polarization rotator is P = 4000, and the calculation for RSOP is as follows:

$${V_{DPRO}} = {V_{DPRO - DPRE - 1}} = \frac{\pi }{P} \times \frac{R}{n} = \frac{\pi }{{4000}} \times \frac{{8 \times {{10}^9}}}{1} \approx 6.3\textrm{Mrad/s}$$

As observed in the constellations in the first row, the constellation points, represented by different colors, are substantially scrambled and scattered after encryption. The second row displays the constellations that are intercepted by unauthorized users, while the third row illustrates the constellations after successful decryption has been applied. Comparison between these constellations reveals that authorized users are able to successfully decrypt the received signal, while unauthorized eavesdroppers are unable to obtain useful information, resulting in a maintained bit error rate (BER) of approximately 0.5. This indicates that the received signal can be accurately recovered, and the proposed encryption scheme effectively enhances security in high-speed PDM systems. It is important to note that at the receiving end, the utilization of the CMA algorithm is still necessary after decryption to handle the randomly changing RSOP introduced by the channel during the transmission process.

4. Conclusion

This paper proposes a physical layer encryption scheme for coherent PDM system based on polarization perturbations, where a 5-D chaotic system is utilized to generate encryption keys. The proposed scheme applies a key-controlled high-speed RSOP to the transmitted signal, leveraging the concept of digital optical polarization scrambler. Four encryption modes are designed by using different combinations of digital polarization device matrices and adjusting their key parameters. The experimental setup demonstrates successful transmission of a 32 Gb/s encrypted PDM-QPSK signal. The results indicate that the proposed scheme achieves secure transmission in the optical physical layer, protecting against unauthorized eavesdropping. By harnessing the inherent randomness and substantial entropy of the 5-D chaotic system, the proposed scheme offers robust protection against chosen-text attacks, with an expanded key space of 1060. Consequently, the proposed physical layer encryption scheme enhances the security of coherent PDM transmission.

Funding

National Natural Science Foundation of China (62001040); State Key Laboratory of Information Photonics and Optical Communications (IPOC2021ZT12); Science and Technology Foundation of State Grid Corporation of China (5700-202119188A-0-0-00); Research Innovation Fund for College Students of Beijing University of Posts and Telecommunications.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. M. Birk, P. Gerard, R. Curto, L. E. Nelson, X. Zhou, P. Magill, T. J. Schmidt, C. Malouin, B. Zhang, E. Ibragimov, S. Khatana, M. Glavanovic, R. Lofland, R. Marcoccia, R. Saunders, G. Nicholl, M. Nowell, and F. Forghieri, “Real-Time Single-Carrier Coherent 100 Gb/s PM-QPSK Field Trial,” J. Lightwave Technol. 29(4), 417–425 (2011). [CrossRef]  

2. K. Zhong, X. Zhou, J. Huo, C. Yu, C. Lu, and A. P. T. Lau, “Digital Signal Processing for Short-Reach Optical Communications: A Review of Current Technologies and Future Trends,” J. Lightwave Technol. 36(2), 377–400 (2018). [CrossRef]  

3. X. Zeng, H. Ren, M. Fu, H. Jiang, L. Yi, W. Hu, and Q. Zhuge, “Frequency-offset-tolerant optical frequency comb-based coherent transmission for intra-datacenter interconnections,” Opt. Express 29(11), 17522–17533 (2021). [CrossRef]  

4. M. Chagnon, “Optical Communications for Short Reach,” J. Lightwave Technol. 37(8), 1779–1797 (2019). [CrossRef]  

5. M. Schuster, S. Randel, C. A. Bunge, S. C. J. Lee, F. Breyer, B. Spinnler, and K. Petermann, “Spectrally Efficient Compatible Single-Sideband Modulation for OFDM Transmission With Direct Detection,” IEEE Photon. Technol. Lett. 20(9), 670–672 (2008). [CrossRef]  

6. T. Hoang, M. Sowailem, Q. Zhuge, M. Osman, A. Samani, C. Paquet, S. Paquet, I. Woods, and D. Plant, “Enabling High-Capacity Long-Reach Direct Detection Transmission With QAM-PAM Stokes Vector Modulation,” J. Lightwave Technol. 36(2), 460–467 (2018). [CrossRef]  

7. M.-F. Huang, S. Zhang, K. Mino, and Y. Aono, “Transmission of 400 G Dual-Carrier DP-16QAM and Multi-Carrier DP-QPSK Signals over Regional and Long- Haul Distances with Span Lengths Greater than 200 km,” in Optical Fiber Communication Conference, OSA Technical Digest (online) (Optical Society of America, 2014), Th4F.3.

8. D. Che, X. Chen, J. He, A. Li, and W. Shieh, “102.4-Gb/s Single-Polarization Direct-Detection Reception using Signal Carrier Interleaved Optical OFDM,” in Optical Fiber Communication Conference, OSA Technical Digest (online) (Optical Society of America, 2014), Tu3G.7. [CrossRef]  

9. Q. Liu, M. Fu, H. Jiang, H. Ren, M. Cai, X. Zeng, H. Lun, L. Yi, W. Hu, and Q. Zhuge, “Subcarrier-pairing entropy loading for digital subcarrier-multiplexing systems with colored-SNR distributions,” Opt. Express 29(18), 28852–28863 (2021). [CrossRef]  

10. J. H. Ke, Y. Gao, and J. C. Cartledge, “400 Gbit/s single-carrier and 1 Tbit/s three-carrier superchannel signals using dual polarization 16-QAM with look-up table correction and optical pulse shaping,” Opt. Express 22(1), 71–84 (2014). [CrossRef]  

11. J. Zhang, J. Yu, Z. Jia, and H. Chien, “400 G Transmission of Super-Nyquist-Filtered Signal Based on Single-Carrier 110-GBaud PDM QPSK With 100-GHz Grid,” J. Lightwave Technol. 32(19), 3239–3246 (2014). [CrossRef]  

12. Y. Zhu, M. Jiang, and F. Zhang, “Direct detection of polarization multiplexed single sideband signals with orthogonal offset carriers,” Opt. Express 26(12), 15887–15898 (2018). [CrossRef]  

13. W. Wang, D. Zou, X. Feng, Q. Sui, R. Lu, Z. Cao, and F. Li, “Optical polarization division multiplexing fiber-wireless integration system at Ka-band based on a low-cost dual-drive MZM,” Opt. Express 29(23), 37453–37463 (2021). [CrossRef]  

14. M. Shtaif, “Performance degradation in coherent polarization multiplexed systems as a result of polarization dependent loss,” Opt. Express 16(18), 13918–13932 (2008). [CrossRef]  

15. K. Kikuchi, “Performance analyses of polarization demultiplexing based on constant-modulus algorithm in digital coherent optical receivers,” Opt. Express 19(10), 9868–9880 (2011). [CrossRef]  

16. D. Che and W. Shieh, “Polarization Demultiplexing for Stokes Vector Direct Detection,” J. Lightwave Technol. 34(2), 754–760 (2016). [CrossRef]  

17. E. Silva, L. Carvalho, C. Franciscangelis, J. Diniz, A. Bordonalli, and J. Oliveira, “Spectrally-Efficient 448-Gb/s dual-carrier PDM-16QAM channel in a 75-GHz grid,” in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference 2013, OSA Technical Digest (online) (Optical Society of America, 2013), JTh2A.39.

18. P. Yang, J. Ma, and J. Zhang, “A polarization-division multiplexing SSB-OFDM system with beat interference cancellation receivers,” Opt. Commun. 416, 137–144 (2018). [CrossRef]  

19. B. J. C. Schmidt, Z. Zan, L. B. Du, and A. J. Lowery, “120 Gbit/s Over 500-km Using Single-Band Polarization-Multiplexed Self-Coherent Optical OFDM,” J. Lightwave Technol. 28(4), 328–335 (2010). [CrossRef]  

20. C. C. Santos and K. D. R. Assis, “Optical networks security: Design to avoid the jamming attacks,” in 2011 13th International Conference on Transparent Optical Networks, 2011), 1–4.

21. K. Shaneman and S. Gray, “Optical network security: technical analysis of fiber tapping mechanisms and methods for detection & prevention,” in IEEE MILCOM 2004. Military Communications Conference, 2004., 2004), 711–716 Vol. 712.

22. M. Furdek and N. Skorin-Kapov, “Physical-layer attacks in all-optical WDM networks,” in 2011 Proceedings of the 34th International Convention MIPRO, 2011), 446–451.

23. M. P. Fok, Z. Wang, Y. Deng, and P. R. Prucnal, “Optical Layer Security in Fiber-Optic Networks,” IEEE Trans.Inform.Forensic Secur. 6(3), 725–736 (2011). [CrossRef]  

24. Z. Gao, Q. Wu, S. Fu, X. Wang, Y. Wang, and Y. Qin, “Secure Optical Communication based on Orthogonal DQPSK/CSK Modulation and Symbol Overlapped Random Optical Phase Encryption,” in 26th Optoelectronics and Communications Conference, OSA Technical Digest (Optical Society of America, 2021), W4B.4. [CrossRef]  

25. Y. Huang, H. Chen, H. Huang, Q. Zhang, Z. Li, N. K. Fontaine, R. Ryf, and M. Wang, “Two-Level Optical Encryption for Secure Optical Communication,” in Optical Fiber Communication Conference (OFC) 2020, OSA Technical Digest (Optical Society of America, 2020), M4A.2. [CrossRef]  

26. A. H. Ramirez-Andrade, R. Porras-Aguilar, and K. Falaggis, “Optical encryption based on double random-phase encoding: secure versus unsecure variants,” Appl. Opt. 59(13), D118–D124 (2020). [CrossRef]  

27. R. Tang, J. Ren, J. Fang, Y. Mao, Y. Han, J. Shen, Q. Zhong, X. Wu, F. Tian, and B. Liu, “Security strategy of parallel bit interleaved FBMC/OQAM based on four-dimensional chaos,” Opt. Express 29(15), 24561–24575 (2021). [CrossRef]  

28. S. Chen, B. Liu, J. Ren, Y. Mao, R. Ullah, X. Song, Y. Bai, L. Jiang, S. Han, J. Zhao, Y. Wan, X. Zhu, and J. Shen, “A 7D Cellular Neural Network Based OQAM-FBMC Encryption Scheme for Seven Core Fiber,” J. Lightwave Technol. 39(22), 7191–7198 (2021). [CrossRef]  

29. L. Jiang, Y. Pan, A. Yi, J. Feng, W. Pan, L. Yi, W. Hu, A. Wang, Y. Wang, Y. Qin, and L. Yan, “Trading off security and practicability to explore high-speed and long-haul chaotic optical communication,” Opt. Express 29(8), 12750–12762 (2021). [CrossRef]  

30. M. Bi, X. Fu, X. Zhou, L. Zhang, G. Yang, X. Yang, S. Xiao, and W. Hu, “A Key Space Enhanced Chaotic Encryption Scheme for Physical Layer Security in OFDM-PON,” IEEE Photonics J. 9(1), 1–10 (2017). [CrossRef]  

31. A. Zhao, N. Jiang, S. Liu, Y. Zhang, and K. Qiu, “Physical Layer Encryption for WDM Optical Communication Systems Using Private Chaotic Phase Scrambling,” J. Lightwave Technol. 39(8), 2288–2295 (2021). [CrossRef]  

32. T. Wu, C. Zhang, H. Wei, and K. Qiu, “PAPR and security in OFDM-PON via optimum block dividing with dynamic key and 2D-LASM,” Opt. Express 27(20), 27946–27961 (2019). [CrossRef]  

33. L. Liu, X. Tang, X. Jiang, Z. Xu, F. Li, Z. Li, H. Huang, P. Ni, L. Chen, L. Xi, and X. Zhang, “Physical layer encryption scheme based on cellular automata and DNA encoding by hyper-chaos in a CO-OFDM system,” Opt. Express 29(12), 18976–18987 (2021). [CrossRef]  

34. J. Zhao, X. Tang, M. Ding, X. Zhang, and L. Xi, “Optical encryption scheme based on spectrum aliasing using a pair of filter banks,” in 2020 Conference on Lasers and Electro-Optics Pacific Rim (CLEO-PR), 2020), 1–2.

35. C. Yang, X. Jiang, L. Liu, X. Tang, L. Xi, and X. Zhang, “Physical-layer Security Improvement Based on 2D-SCL Map and Brownian motion in CO-OFDM System,” in 2020 Asia Communications and Photonics Conference (ACP) and International Conference on Information Photonics and Optical Communications (IPOC), 2020), 1–3.

36. X. Jiang, X. Tang, L. Xi, J. Zhao, M. Tu, and X. Zhang, “Security-Enhanced CO-OFDM Based on Dynamic DNA Encoding and Frequency Domain Scrambling,” in 2019 Asia Communications and Photonics Conference (ACP), 2019), 1–3.

37. X. Tang, Z. Xu, F. Li, Z. Li, L. Liu, C. Yang, H. Huang, L. Chen, and X. Zhang, “A Physical Layer Security-Enhanced Scheme in CO-OFDM System Based on CIJS Encryption and 3D-LSCM Chaos,” J. Lightwave Technol. 40(12), 3567–3575 (2022). [CrossRef]  

38. F. Pittalà, C. Stone, D. Clark, M. Kuschnerov, C. Xie, and A. Haddad, “Laboratory Measurements of SOP Transients due to Lightning Strikes on OPGW Cables,” in Optical Fiber Communication Conference, OSA Technical Digest (online) (Optical Society of America, 2018), M4B.5. [CrossRef]  

39. D. Charlton, S. Clarke, D. Doucet, M. O’Sullivan, D. L. Peterson, D. Wilson, G. Wellbrock, and M. Bélanger, “Field measurements of SOP transients in OPGW, with time and location correlation to lightning strikes,” Opt. Express 25(9), 9689–9696 (2017). [CrossRef]  

40. P. M. Krummrich, D. Ronnenberg, W. Schairer, D. Wienold, F. Jenau, and M. Herrmann, “Demanding response time requirements on coherent receivers due to fast polarization rotations caused by lightning events,” Opt. Express 24(11), 12442–12457 (2016). [CrossRef]  

41. S. M. Pietralunga, J. Colombelli, A. Fellegara, and M. Martinelli, “Fast polarization effects in optical aerial cables caused by lightning and impulse current,” IEEE Photon. Technol. Lett. 16(11), 2583–2585 (2004). [CrossRef]  

42. H. Jiang, Z. Zhai, X. Zeng, M. Fu, Y. Fan, L. Yi, W. Hu, and Q. Zhuge, “Ultra-fast RSOP tracking via 3 pilot tones for short-distance coherent SCM systems,” Opt. Express 29(6), 8076–8086 (2021). [CrossRef]  

43. N. Cui, Z. Zheng, X. Zhang, W. Yi, R. Guo, W. Zhang, X. Tang, H. Xu, and L. Xi, “Joint blind equalization of CD and RSOP using a time-frequency domain Kalman filter structure in Stokes vector direct detection system,” Opt. Express 27(8), 11557–11570 (2019). [CrossRef]  

44. N. Cui, X. Zhang, Z. Zheng, H. Xu, W. Zhang, X. Tang, L. Xi, Y. Fang, and L. Li, “Two-parameter-SOP and three-parameter-RSOP fiber channels: problem and solution for polarization demultiplexing using Stokes space,” Opt. Express 26(16), 21170–21183 (2018). [CrossRef]  

45. N. Cui, X. Zhang, Q. Zhang, and X. Zhang, “Narrow- or wide-band channel for a high baud rate fiber communication system: a judgment based on a temporal and spectral evolution PMD model,” Opt. Express 29(23), 38497–38511 (2021). [CrossRef]  

46. N. Cui, X. Zhang, N. Zhang, X. Tang, and L. Xi, “True Equalization of PDL in Presence of Fast RSOP,” in Optical Fiber Communication Conference (OFC) 2020, OSA Technical Digest (Optical Society of America, 2020), Th1I.3. [CrossRef]  

47. Z. Zheng, N. Cui, H. Xu, X. Zhang, W. Zhang, L. Xi, Y. Fang, and L. Li, “Window-split structured frequency domain Kalman equalization scheme for large PMD and ultra-fast RSOP in an optical coherent PDM-QPSK system,” Opt. Express 26(6), 7211–7226 (2018). [CrossRef]  

48. W. Yi, Z. Zheng, N. Cui, X. Zhang, L. Qiu, N. Zhang, L. Xi, W. Zhang, and X. Tang, “Joint equalization scheme of ultra-fast RSOP and large PMD compensation in presence of residual chromatic dispersion,” Opt. Express 27(15), 21896–21913 (2019). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (9)

Fig. 1.
Fig. 1. Schematic diagram of the proposed encryption scheme based on polarization perturbations of transmitted signal using DOPS in coherent PDM system. DOPS: digital optical polarization scrambler.
Fig. 2.
Fig. 2. The principle of transitioning from utilizing DOPS in electrical domain to inducing polarization perturbations to optical signal. DOPS: Digital optical polarization scrambler; DPRO: Digital polarization rotator; DPRE: Digital polarization retarder.
Fig. 3.
Fig. 3. Changes of the rotation angle, retardation angle and azimuth angle in different encryption modes (a-d), and corresponding perturbed polarization states for DPRO mode (e), DPRE mode (f) and DPRO-DPRE modes (g-h)
Fig. 4.
Fig. 4. Detailed encryption process for the DPRO-DPRE-1 mode.
Fig. 5.
Fig. 5. (a) Change of state values of 5-D chaos system with time. (b) Auto-correlations of sequence x and X. (c) Cross-correlations between sequences x and n, X and N.
Fig. 6.
Fig. 6. Distributions of the normalized 5-D chaotic sequences (a) and derived key sequences (b).
Fig. 7.
Fig. 7. Lyapunov exponents (LE) of the 5-D chaotic sequences (a) and correlation coefficients of the derived key sequences with the initial disturbance of x (b).
Fig. 8.
Fig. 8. Experimental diagram of the security enhanced PDM-QPSK system based on polarization perturbation using DOPS. ECL: External Cavity Laser; DAC: Digital-to-Analogue Converter; EA: Electrical Amplifier; PDM-IQM: Polarization Division Multiplexing I/Q Modulator; TOF: Tunable Optical Filter; VOA: Variable Optical Attenuator; ICR: Integrated Coherent Receiver; DSO: Digital Storage Oscilloscope.
Fig. 9.
Fig. 9. Constellation diagrams of the polarization perturbed signal and the received signal with and without decryption in the X polarization for the four encryption modes.

Equations (23)

Equations on this page are rendered with MathJax. Learn more.

Ψ = cos ( π 2 V π V 1 ( t ) ) + cos ( π 2 V π V 2 ( t ) ) e j π 2 = cos ( π 2 V π ( v R F 1 ( t ) + V b i a s 1 ) ) + j cos ( π 2 V π ( v R F 2 ( t ) + V b i a s 2 ) )
Ψ = sin ( π 2 V π V R F 1 ( t ) ) + j sin ( π 2 V π V R F 2 ( t ) )
A = ( I X + j Q X I Y + j Q Y )
| E = Ψ x e ^ x + Ψ y e ^ y
| E A = ( I X + j Q X I Y + j Q Y )
U = ( U 11   U 12 U 21   U 22 )
U 1 = ( cos θ   sin θ sin θ   cos θ )
U 2 = ( exp ( i Δ 2 ) 0 0 exp ( i Δ 2 ) )
U 3 = ( cos μ   sin μ sin μ   cos μ ) ( exp ( i Δ 2 ) 0   0 exp ( i Δ 2 ) ) ( cos μ   sin μ sin μ   cos μ )
A = ( I X + j Q X I Y + j Q Y ) = ( cos θ   sin θ sin θ   cos θ ) ( I X + j Q X I Y + j Q Y )
A = ( I X + j Q X I Y + j Q Y ) = ( cos μ   sin μ sin μ   cos μ ) ( exp ( i Δ 2 )   0   0 exp ( i Δ 2 ) ) ( cos μ   sin μ sin μ   cos μ ) ( I X + j Q X I Y + j Q Y )
A = ( I X + j Q X I Y + j Q Y ) = ( exp ( i Δ 2 ) 0   0 exp ( i Δ 2 ) ) ( cos θ   sin θ sin θ   cos θ ) ( I X + j Q X I Y + j Q Y )
R = r 4
a 1 = π m N
Δ t = n R
V 1 = a 1 × R n = π m N × R n
V 1 = a 1 × R n = π m N × R n > V L
N < π m R n V L
P 1 = h 2 ( h 2 1 ) ( f l o o r ( 2 π R n V L ) 1 )
x ˙   =   y   +   m   +   z ( n 2  - 3) y ˙   =     x   +   z m   +   m z ˙   =     y m   +   n 2  - 3 m ˙   =     x     y   +   n 2  - 3 n ˙   =     x z     z     m
X = mod(x × 1 0 15 ,10000) Y = mod(y × 1 0 15 ,10000) Z = mod(z × 1 0 15 ,10000) M = mod(m × 1 0 15 , 2 π ) N = mod(n × 1 0 15 , π )
V D P R O = V D P R O D P R E 1 = π P × R n = π 200 × 8 × 10 9 1 126 Mrad/s
V D P R O = V D P R O D P R E 1 = π P × R n = π 4000 × 8 × 10 9 1 6.3 Mrad/s
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.