

However, in the era of supercomputing and quantum computing, any digital encryption scheme can be decrypted in theory, as the valuable raw data can be recorded and processed offline. Such protocols often rely on prime factorization and high computational complexity algorithms. To cope with these considerable security threats, common encryption protocols are implemented in all seven layers of the open systems interconnection (OSI) model.

The optical infrastructure is prone to a major data breach, as it is exposed to various attacks such as fiber tapping, false data injection and jamming. IntroductionĪs the demand for bandwidth is scaling up to unprecedented levels, information confidentiality, integrity and availability are becoming increasingly important, particularly in sensitive applications such as financial transactions, military, medical records, and private information sharing. © 2021 Optical Society of America under the terms of the OSA Open Access Publishing Agreement 1. A transmission of 20 Gbps under negative −7.5 dB OSNR is demonstrated here, yielding error-free detection by the eligible user.

On the other hand, the authorized user decodes the signal using an inverse spectral phase mask and achieves a substantial optical processing gain via multi-homodyne coherent detection. An unauthorized user, who does not possess knowledge on the phase mask, can only obtain a noisy and distorted signal, that cannot be improved by post-processing. The secured signal’s spectrum is spread far beyond the bandwidth of a coherent receiver, thus forcing real time all-optical processing. Spectral replicas of the covert signal are carried by multiple tones of a gain switched optical frequency comb, optically coded with spectral phase mask, and concealed below EDFA’s noise.
