This paper considers an application of the quantum stream cipher (QSC) Y-00. QSC Y-00 can provide secure long-haul and high-capacity data transmission in optical networks. Post-quantum cryptography (PQC) can provide quantum-resistant authentication and key-establishment. We propose a secure link architecture for optical communication networks using QSC Y-00 and PQC. Further, we report a field experiment using the optical fibers embedded along a railway truck between two train stations to demonstrate user authentication, key-establishment, and secure data communication with the intensity modulation-based Y-00 transceivers and PQC. Finally, we discuss the further applications of the proposed secure link architecture.
Security enhancement is a major challenge in future 6G wireless networks. In this study, we have introduced a symmetric-key encryption system, which utilizes multilevel signaling, for the security of microwave signals against wireless interception. The system achieves quantum-noise signal masking at microwave frequencies via optical-tomicrowave frequency conversion based on the homodyne process, thus providing high signal security. We show experimental demonstrations of quantum-noise randomized phase-shift keying modulation/quadrature amplitude modulation cipher generation at a frequency of ~GHz via the intensity modulation/direct detection analog intermediate frequency over fiber transmission. The proposed system simultaneously achieves microwave signal delivery over a fiber link and signal encryption based on sufficient quantum-noise signal masking for wireless communication systems.
This study demonstrates the optical fiber transmission of the Y-00 quantum stream cipher with quantum deliberate signal randomization (QDSR). QDSR is a deliberate signal randomization driven by a quantum random number generator, which substantially enhances signal masking using quantum noise to realize higher security. A 10-Gb/s line-rate dualpolarization phase-shift keying Y-00 cipher with QDSR is transmitted over a 400-km field-installed single-mode fiber link with optical amplifiers. When the phase levels after encryption and the index of QDSR are set to 216 and 0.2, respectively, the quantum noise masking number increases by a factor of more than 40 compared to that without QDSR, which enhances security. However, the transmission penalty owing to QDSR remains small.
We present a symmetric-key direct data encryption technique utilizing signal masking by quantum noise, called Y-00 quantum stream cipher. Physical encryption of phase-shift-keying (PSK) Y-00 quantum stream cipher is achieved by our proposed extremely high-order phase modulation. Two cascaded phase modulators are driven with two synchronized digital-to-analog converters for coarse-to-fine modulations, resulting in a record 217 phase levels for the quantum noise masking. Decryption of the cipher is implemented in digital signal processing after intra-dyne coherent detection with a free-running local oscillator. We experimentally demonstrate transmission of 10-Gbaud digital-coherent PSK Y-00 cipher with 217 levels over a 240-km field-installed single-mode fiber.
KEYWORDS: Transceivers, Signal detection, Interference (communication), Binary data, Signal to noise ratio, Computer security, Quantum communications, Modulation, Sensors, Signal generators
As a security parameter of Y-00 quantum stream cipher, a guessing probability by an eavesdropper for a secret key of legitimate users is discussed. Assuming that Eve employs the direct detection and Gaussian intensity distribution of each intensity level of Y-00 cipher signals are same, an analytic solution of probability of correct guessing of the secret key in a case of the ciphertext-only attack is derived. The solution is applied to experimentally measure the probabilities of our Y-00 quantum stream cipher transceiver. A very low probability of the Y-00 cipher transceiver is experimentally confirmed.
A power distribution of optical signals as the ciphertext of Y-00 quantum stream cipher transceivers should be uniform,
even when the bit sequence of plaintext is a non-uniform sequence. For examining the uniformity, we experimentally
measure powers of optical signals with 4096 intensity levels and calculate the ratio of signal numbers over and under the
average power. The ratios for various kinds of bit sequences are 0.5 with measurement error of 1%, which is an evidence
of the uniformity of the power distribution. In addition, the effectiveness of a randomization technique of overlapping
selection keying for enhancing the security against the known plaintext attack is experimentally observed.
For protecting physical layer of optical fiber communication systems, quantum stream cipher called Y-00 and Alpha-Eta is promising. So far, we demonstrated secure and high speed optical fiber communication experiments using Y-00 quantum stream cipher. Our theoretical research revealed that the randomization techniques could enhance the security performance. In this work, we fabricated a novel Y-00 transceiver for GbE where the randomization technique was implemented. The transceiver employed the optical intensity modulated Y-00 quantum stream cipher with intensity levels of 4096. An appropriately designed irregular mapping as the randomization technique was experimentally demonstrated. The transceiver was successfully applied to secure optical fiber transmission of GbE signals.
KEYWORDS: Information security, Computer security, Modulation, Receivers, Network security, Data communications, Data centers, Telecommunications, Quantum communications, Computing systems
To guarantee a security of Cloud Computing System is urgent problem. Although there are several threats in a security problem, the most serious problem is cyber attack against an optical fiber transmission among data centers. In such a network, an encryption scheme on Layer 1(physical layer) with an ultimately strong security, a small delay, and a very high speed should be employed, because a basic optical link is operated at 10 Gbit/sec/wavelength. We have developed a quantum noise randomied stream cipher so called Yuen- 2000 encryption scheme (Y-00) during a decade. This type of cipher is a completely new type random cipher in which ciphertext for a legitimate receiver and eavesdropper are different. This is a condition to break the Shannon limit in theory of cryptography. In addition, this scheme has a good balance on a security, a speed and a cost performance. To realize such an encryption, several modulation methods are candidates such as phase-modulation, intensity-modulation, quadrature amplitude modulation, and so on. Northwestern university group demonstrated a phase modulation system (α=η) in 2003. In 2005, we reported a demonstration of 1 Gbit/sec system based on intensity modulation scheme(ISK-Y00), and gave a design method for quadratic amplitude modulation (QAM-Y00) in 2005 and 2010. An intensity modulation scheme promises a real application to a secure fiber communication of current data centers. This paper presents a progress in quantum noise randomized stream cipher based on ISK-Y00, integrating our theoretical and experimental achievements in the past and recent 100 Gbit/sec(10Gbit/sec × 10 wavelengths) experiment.
Wireless communication of aviation contains high capacity confidential information and therefore such communication
requires secure high speed data communication scheme by using reliable cipher. In this report, the authors propose free
space optical communication by utilizing optical intensity-modulated Y-00 cipher for applications of secure aviation
systems including unmanned aircraft systems. Y-00 cipher transmitter and receiver with intensity levels of 4096 at data
rate of 2.5 Gbit/s are fabricated for secure free space optical communication and a free space Y-00 cipher transmission is
experimentally demonstrated.
Recently, optical fiber transmission lines have flows of huge data including confidential information. Presently, the mathematical cipher is employed in some access systems to protect eavesdropping. However, the cipher break history shows such mathematical cipher is not reliable enough. Such fact demands an urgent development of more reliable cipher and drives us to focus actively on the research and development of physical cipher. Y-00 quantum cipher is an encryption scheme combined with physical phenomena and mathematical cipher, and it provides high speed performance and a provable security. So far, we have applied Y-00 quantum cipher to point-to-point transmission systems. However, secure communication system in the multiple remote point access system from a local point is also important. In this work, we propose a secure multiple point access system using the intensity modulated Y-00 quantum cipher. A one-to-three point transmission system using Y-00 quantum cipher in the wavelength division multiplexing (WDM) scheme is experimentally demonstrated where Y-00 quantum ciphers encrypted with three different secret keys are transmitted from a local point to three users in different remote access points. For the first time to our knowledge, Y-00 cipher communications between users with the correct keys are successfully demonstrated at 2.5-Gb/s data rate while users with the different keys are not able to communicate.
KEYWORDS: Quantum key distribution, Information security, Current controlled current source, Probability theory, Quantum communications, Failure analysis
It is claimed in the many papers that a trace distance: d guarantees the universal composition security in quantum key distribution (QKD) like BB84 protocol. In this introduction paper, at first, it is explicitly explained what is the main misconception in the claim of the unconditional security for QKD theory. In general terms, the cause of the misunderstanding on the security claim is the Lemma in the paper of Renner. It suggests that the generation of the perfect random key is assured by the probability (1-d), and its failure probability is d. Thus, it concludes that the generated key provides the perfect random key sequence when the protocol is success. So the QKD provides perfect secrecy to the one time pad. This is the reason for the composition claim. However, the quantity of the trace distance (or variational distance) is not the probability for such an event. If d is not small enough, always the generated key sequence is not uniform. Now one needs the reconstruction of the evaluation of the trace distance if one wants to use it. One should first go back to the indistinguishability theory in the computational complexity based, and to clarify the meaning of the value of the variational distance. In addition, the same analysis for the information theoretic case is necessary. The recent serial papers by H.P.Yuen have given the answer on such questions.
In this paper, we show more concise description of Yuen's theory, and clarify that the upper bound theories for the trace distance by Tomamichel et al and Hayashi et al are constructed by the wrong reasoning of Renner and it is unsuitable as the security analysis. Finally, we introduce a new macroscopic quantum communication to replace Q-bit QKD.
KEYWORDS: Modulation, Quantitative analysis, Data communications, Data acquisition, Computer security, Photonics, Defense systems, Information security, Current controlled current source, Atrial fibrillation
In any communication system, all data including encrypted data by the mathematical cipher are transmitted under the strict rule of the interface frame. Attacker can easily acquire the whole data the same as the data of legitimate users including the address, routing information and so on from the transmission line by tapping.
This is very risky, especially for the secret sharing data center operations. So to hide the whole data in the transmission line is very attractive to ensure the high security level. This can be realized by Y-00 type random cipher that the ciphertext of simple mathematical cipher by PRNG is randomized by quantum noise and it gives a masking effect against the attacker's security analysis. This paper clarifies quantitative properties on the masking effect in the random cipher by Y-00 protocol, and shows the fact that a scheme by the intensity modulation may provide the greatest masking effect, even if the attacker employs the universal heterodyne receiver.
The security in the next generation optical network which realizes "Cloud Computing System Service with data center" is one of the most important problems. In such a network, the encryption in physical layer which provide super security and small delay is a preferable.
It has to be applicable, however, to very high speed data because the basic link is operated at 2.5 Gbit/sec ~ 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y00) is a completely new type of random cipher, which can exceed the Shannon limit of the symmetric key cipher.
This paper extends some theoretical results on the security for quantum stream cipher such as Y00 protocol and generalized Y00. First, the conditions to exceed the Shannon limit are summarized.
We formulate a generalized secret capacity in the sense of wire tap channel supported by secret key to clarify a cipher exceeding the Shannon limit. The generalized secret capacities for space communication and fiber communication based on the generalized Y00 are given. When the relaxation of physical constraint or device limit of the eavesdropper is allowed, we point out that a cipher scheme exceeding the Shannon limit can be realized only by the conventional optical system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.