Feedback phase in optically generated chaos: A secret key for cryptographic applications

被引:59
|
作者
Bogris, Adonis [1 ]
Rizomiliotis, Panagiotis [2 ]
Chlouverakis, Konstantinos E. [1 ]
Argyris, Apostolos [1 ]
Syvridis, Dimitris [1 ]
机构
[1] Univ Athens, Dept Informat & Telecommun, Opt Commun Lab, GR-15784 Athens, Greece
[2] Katholieke Univ Leuven, Dept ESAT SCD COSIC, B-3001 Heverlee, Belgium
关键词
chaos communications; cryptography; optical feedback; semiconductor lasers;
D O I
10.1109/JQE.2007.911687
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The feedback phase in a chaotic system consisting of a semiconductor laser subject to delayed optical feedback is considered for the first time as a secret key for secure chaotic communications not exclusively based on hardware uniqueness. Extensive numerical simulations illustrate that the feedback phase is of extreme importance as far as synchronization is concerned. The ability of an eavesdropper to attack the intensity-modulated message when a pseudorandom variation of the feedback phase is imposed at the transmitter's side is numerically quantified by bit-error-rate calculations. The analysis demonstrates that the eavesdropper is not able to synchronize and hence to extract the message when he is not aware of the phase variations even if he is equipped with an identical chaotic device.
引用
收藏
页码:119 / 124
页数:6
相关论文
共 50 条
  • [1] Efficient and provably secure intelligent geometrical method of secret key generation for cryptographic applications
    Pandey, Fagul
    Dash, Priyabrata
    Samanta, Debasis
    Sarma, Monalisa
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [2] From Chaos to Secret Key Agreement
    Ando, Megumi
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [3] Cryptographic Key Distribution in Optical Systems: Quantum vs. Chaos
    Guerreiro, A.
    ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 812 - 813
  • [4] Chaos-based hash function (CBHF) for cryptographic applications
    Amin, Mohamed
    Faragallah, Osama S.
    El-Latif, Ahmed A. Abd
    CHAOS SOLITONS & FRACTALS, 2009, 42 (02) : 767 - 772
  • [5] Secret Key Specification for a Variable-Length Cryptographic Cellular Automata Model
    Oliveira, Gina M. B.
    Martins, Luiz G. A.
    Ferreira, Giordano B.
    Alt, Leonardo S.
    PARALLEL PROBLEM SOLVING FROM NATURE-PPSN XI, PT II, 2010, 6239 : 381 - 390
  • [6] Synchronization of chaotic lasers by optical feedback for cryptographic applications
    AnnovazziLodi, V
    Donati, S
    Scire, A
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 1997, 33 (09) : 1449 - 1454
  • [7] Genetic Crossover Key generation mechanism for cryptographic applications
    Bevi, Ruhan
    Malarvizhi, S.
    RESEARCH JOURNAL OF BIOTECHNOLOGY, 2016, 11 (08): : 53 - 57
  • [8] Secret Key Capacity For Multipleaccess Channel With Public Feedback
    Tyagi, Himanshu
    Watanabe, Shun
    2013 51ST ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2013, : 1 - 7
  • [9] Optically generated arbitrary waveforms for radar applications
    Monsterleet, A
    Tonda-Goldstein, S
    Dolfi, D
    Huignard, JP
    Sapé, P
    Chazelas, J
    ELECTRONICS LETTERS, 2005, 41 (06) : 332 - 334
  • [10] Two-phase cryptographic key recovery system
    Gennaro, R
    Karger, P
    Matyas, S
    Peyravian, M
    Roginsky, A
    Safford, D
    Willett, M
    Zunic, N
    COMPUTERS & SECURITY, 1997, 16 (06) : 481 - 506