The Analysis of Intensity Correlation in Laser Transceiving Systems for Formation of a Cryptographic Key

被引:1
|
作者
Aksenov, V. P. [1 ]
Dudorov, V. V. [1 ]
Kolosov, V. V. [1 ,2 ]
Pogutsa, Ch. E. [1 ]
Levitskii, M. E. [3 ]
机构
[1] Russian Acad Sci, VE Zuev Inst Atmospher Opt, Siberian Branch, Tomsk 634055, Russia
[2] Russian Acad Sci, Siberian Branch, Tomsk Sci Ctr, Tomsk 634055, Russia
[3] TOPAZ Res & Prod Co, Tomsk 634055, Russia
基金
俄罗斯科学基金会; 俄罗斯基础研究基金会;
关键词
laser radiation; confidential optical communication; cryptography; atmospheric turbulence; intensity fluctuations; reciprocity theorem;
D O I
10.1134/S1024856020060032
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The potentials for and limitations to the use of intensity fluctuations of laser beams propagating through a turbulent atmosphere for generating random data when keying in confidential optical communication systems are analyzed. The technique is based on the reciprocity theorem for optical fields. Light propagation in a system of two transceivers directed at each other, the signals from which are distorted by an atmospheric channel, is numerically simulated. An experimental setup is created; the generation of random correlated signals in this system is experimentally studied. A need for low-pass filtration of signals received is experimentally ascertained. The efficiency of this filtration is estimated. The dependences of the correlation coefficient on the geometrical parameters of the system and turbulent conditions along the propagation path are derived from the numerical simulation in a wide range of distances, aperture radii, and turbulence strength values. Theoretical results are shown to be in a good agreement with the results of laboratory experiments.
引用
收藏
页码:571 / 577
页数:7
相关论文
共 50 条
  • [1] The Analysis of Intensity Correlation in Laser Transceiving Systems for Formation of a Cryptographic Key
    V. P. Aksenov
    V. V. Dudorov
    V. V. Kolosov
    Ch. E. Pogutsa
    M. E. Levitskii
    Atmospheric and Oceanic Optics, 2020, 33 : 571 - 577
  • [2] Key Expansion in Cryptographic Systems
    Chitu, Sorin
    Vasile, Daniel Ciprian
    Tramandan, Ionut Daniel
    Svasta, Paul
    2020 IEEE 26TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME 2020), 2020, : 202 - 205
  • [3] Performance Analysis of Public key Cryptographic Systems RSA and NTRU
    Challa, Narasimham
    Pradhan, Jayaram
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (08): : 87 - 96
  • [4] A SECURITY ANALYSIS OF PUBLIC KEY CRYPTOGRAPHIC SYSTEMS USED FOR ELECTRONIC SIGNATURE
    Neacsu, Eugen
    Schiopu, Paul
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2021, 83 (01): : 135 - 146
  • [5] A security analysis of public key cryptographic systems used for electronic signature
    Neacșu, Eugen
    Șchiopu, Paul
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2021, 83 (01): : 135 - 146
  • [6] Effects analysis of imperfections on multi-antenna transceiving systems
    Li, Huiyong
    An, Qi
    Jia, Kexin
    Wu, Hao
    He, Zishu
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [7] Reliability Analysis for Cryptographic Key Management
    Xiao, Sheng
    Gong, Weibo
    Towsley, Don
    Zhang, Qingquan
    Zhu, Ting
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
  • [8] A FRAMEWORK FOR SECURE CRYPTOGRAPHIC KEY MANAGEMENT SYSTEMS
    Varalakshmi, P.
    Shajina, A. R.
    Kanimozhi, T.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 319 - 323
  • [9] Correlation Electromagnetic Analysis for Cryptographic Device
    Ding, Guo Liang
    Chu, Jie
    Yuan, Liang
    Zhao, Qiang
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 388 - 391
  • [10] Study of cryptographic key permutation choose for enhancing DES encryption intensity
    Ma, Yinhua
    Liu, Mingsheng
    Wang, Shuhai
    Zuo, Jinyu
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (03): : 68 - 69