CN  Vol.2 No.4 , November 2010
All-Optical Cryptographic Device for Secure Communication
Abstract: An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a function of an encryption serial key that merge with the data stream, generating a ciphered stream. The greatest advantage of the device is real-time encrypting – data can be transmitted at the original speed without slowing down.
Cite this paper: nullF. Garzia and R. Cusani, "All-Optical Cryptographic Device for Secure Communication," Communications and Network, Vol. 2 No. 4, 2010, pp. 235-245. doi: 10.4236/cn.2010.24034.

[1]   R. Y. Ciao, E. Garmire and C. H. Townes, “Self-Trapping of Optical Beams,” Physical Review Letters, Vol. 13, No. 15, 1964, pp. 479-482.

[2]   B. Luther-Davies and Y. Xiaoping, “Waveguides and Y Junctions Formed in Self-Defocusing Dark Spatial Soliton,” Optics Letters, Vol. 17, No. 7, 1992, pp. 496-498.

[3]   W. Krolikowski and Y. S. Kivshar, “Soliton-Based Optical Switching In Waveguide Arrays,” Journal of the Optical Society of America B, Vol. 13, No. 5, 1996, pp. 876-887.

[4]   N. N. Akhmediev and A. Ankiewicz, “Spatial Soliton X-Junctions and Couplers,” Optics Communications, Vol. 100, No. 1-4, 1993, pp. 186-192.

[5]   W. Krolikowski, X. Yang, B. Luther-Davies and J. Breslin, “Dark Soliton Steering in a Saturable Nonlinear Medium,” Optics Communications, Vol. 105, No. 3-4, 1994, pp. 219-225.

[6]   A. P. Sheppard, “Devices Written by Colliding Spatial Solitons: A Coupled Mode Theory Approach,” Optics Communications, Vol. 102, No. 3-4, 1993, pp. 317-323.

[7]   J. P. Gordon, “Interaction Forces among Solitons in Optical Fibers,” Optics Letters, Vol. 8, No. 11, 1983, pp. 596-598.

[8]   F. Garzia, C. Sibilia, M. Bertolotti, R. Horak and J. Bajer, “Phase Properties of a Two-Soliton System in a Non Linear Planar Waveguide,” Optics Communications, Vol. 108, No. 1-3, 1994, pp. 47- 54.

[9]   A. B. Aceves, J. V. Moloney and A. C. Newell, “Reflection and Transmission of Self-Focused Channels at Nonlinear Dielectric Interfaces,” Optics Letters, Vol. 13, No. 11, 1988, pp. 1002-1004.

[10]   P. Varatharajah, A. B. Aceves and J. V. Moloney, “All-Optical Spatial Scanner,” Applied Physics Letters, Vol. 54, 1989, pp. 2631-2633.

[11]   A .B. Aceves, et al., “Particle Aspects of Collimated Light Channel Propagation at Nonlinear Interfaces and in Waveguides,” Journal of the Optical Society of America B, Vol. 7, No. 6, 1990, pp. 963-974.

[12]   F. Garzia, C. Sibilia and M. Bertolotti, “Swing Effect of Spatial Soliton,” Optics Communications, Vol. 139, No. 4-6, 1997, pp. 193-198.

[13]   F. Garzia, C. Sibilia and M. Bertolotti, “High Pass Soliton Filter,” Optics Communications, Vol. 152, No. 1-3, 1998, pp. 153-160.

[14]   F. Garzia, C. Sibilia, and M. Bertolotti, “All optical soliton based router”, Opt. Comm., vol. 168/1-4, pp. 277-285, 1999.

[15]   H. W. Chen and T. Liu, “Nonlinear Wave and Soliton Propagation in Media with Arbitrary Inhomogeneities,” Physics of Fluids, Vol. 21, No. 3, 1978, pp. 377-380.

[16]   P. K. Cow, N. L. Tsintsadze and D. D. Tsakhaya, “Emission of Ion-Sound Waves by a Langmuir Soliton Moving with Acceleration,” Soviet Physics-JETP, Vol. 55, 1982, pp. 839- 843.

[17]   J. S. Aitchison, et al., “Observation of Spatial Optical Solitons in a Nonlinear Glass Waveguide,” Optics Letters, Vol. 15, No. 9, 1990, pp. 471-473.

[18]   P. Refreiger and B. Javidi, “Optical Image Encryption on Input Plane and Fourier Plane Random Encoding,” Optics Letters, Vol. 20, No. 7, 1995, pp.767-769.

[19]   O. Matoba and B. Javidi, “Encrypted Optical Memory System Using Three-Dimensional Key in the Fresnel Domain,” Optics Letters, Vol. 24, No. 11, 1999, pp.762-764.

[20]   J. W. Han, C. S. Park, D. H. Ryu and E. S. Kin, “Optical Image Encryption Based on XOR Operations,” Optical Engineering (Bellingham), Vol. 38, No. 1, 1999, pp. 47-54.

[21]   J. W. Han, S. H. Lee and E. S. Kin, “Optical Key Bit Stream Generator,” Optical Engineering (Bellingham), Vol. 38, No. 1, 1999, pp. 33-38.

[22]   S. T. Liu, Q. L. Mi and B. H. Zhu, “Optical Image Encryption with Multistage and Multichannel Fractional Fourier-Domain Filtering,” Optics Letters, Vol. 26, No. 16, 2001, pp. 1242-1244.

[23]   Y. Zhang, C. H. Zheng and N. Tanno, “Optical Encryption Based on Iterative Fractional Fourier Transform,” Optics Communications, Vol. 202, No. 4-6, 2002, pp. 277-285.

[24]   A. Carciner, M. Montes-Usategui, S. Arcos and I. Juvells, “Vulnerability to Chosen-Cyphertext Attacks of Optical Encryption Schemes Based on Double Random Phase Keys,” Optics Letters, Vol. 30, No. 13, 2005, pp. 1644-1646.

[25]   U. Gopinathan, D. S. Monaghan, T. J. Naughton and J. T. Sheridan, “A Known-Plaintext Heuristic Attack on the Fourier Plane Encryption Algorithm,” Optics Express, Vol. 14, No. 8, 2006, pp. 3181-3186.

[26]   Y. Frauel, A. Castro, T. J. Naughton and B. Javidi, “Resistance of the Double Phase Encryption against Various Attacks,” Optics Express, Vol. 15, No. 16, 2007, pp. 10253-10265.

[27]   P. K. Wang, L. A. Watson and C. Chatwin, “Random Phase Encoding for Optical Security,” Optical Engineering (Bellingham), Vol. 35, No. 9, 1996, pp. 2464-2469.

[28]   Y. Li, K. Kreske and J. Rosen, “Security and Encryption Optical Systems Based on a Correlator with Significant Output Images,” Applied Optics, Vol. 39, No. 29, 2000, pp. 5925-5301.

[29]   Z. J. Liu and S. T. Liu, “Double Image Encryption Based on Iterative Fractional Fourier Transform,” Optics Communications, Vol. 275, No. 2, 2007, pp. 324-329.

[30]   B. Javidi and T. Nomura, “Securing Information by Use of Digital Olography,” Optics Letters, Vol. 25, No. 1, 2000, pp. 28-30.

[31]   N. K. Nischal, J. Joseph and K. Singh, “Securing Information Using Fractional Fourier Transform in Digital Olography,” Optics Communications, Vol. 235, No. 4-6, 2004, pp. 253-259.

[32]   X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao and Y. R. Wang, “Cryptosystem Based on Two Step Phase-Shifting Interferometry and the RSA Pubblic-Key Encryption Algorithm,” Journal of Optics A: Pure Applied Optics, Vol. 11, No. 8, 2009, pp. 85402-85410.

[33]   Y. Zhang and B. Wang, “Optical Image Encryption Based on Interference,” Optics Express, Vol. 33, No. 21, 2008, pp. 2443-2445.