The Analysis of Intensity Correlation in Laser Transceiving Systems for Formation of a Cryptographic Key

被引:1
|
作者
Aksenov, V. P. [1 ]
Dudorov, V. V. [1 ]
Kolosov, V. V. [1 ,2 ]
Pogutsa, Ch. E. [1 ]
Levitskii, M. E. [3 ]
机构
[1] Russian Acad Sci, VE Zuev Inst Atmospher Opt, Siberian Branch, Tomsk 634055, Russia
[2] Russian Acad Sci, Siberian Branch, Tomsk Sci Ctr, Tomsk 634055, Russia
[3] TOPAZ Res & Prod Co, Tomsk 634055, Russia
基金
俄罗斯科学基金会; 俄罗斯基础研究基金会;
关键词
laser radiation; confidential optical communication; cryptography; atmospheric turbulence; intensity fluctuations; reciprocity theorem;
D O I
10.1134/S1024856020060032
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The potentials for and limitations to the use of intensity fluctuations of laser beams propagating through a turbulent atmosphere for generating random data when keying in confidential optical communication systems are analyzed. The technique is based on the reciprocity theorem for optical fields. Light propagation in a system of two transceivers directed at each other, the signals from which are distorted by an atmospheric channel, is numerically simulated. An experimental setup is created; the generation of random correlated signals in this system is experimentally studied. A need for low-pass filtration of signals received is experimentally ascertained. The efficiency of this filtration is estimated. The dependences of the correlation coefficient on the geometrical parameters of the system and turbulent conditions along the propagation path are derived from the numerical simulation in a wide range of distances, aperture radii, and turbulence strength values. Theoretical results are shown to be in a good agreement with the results of laboratory experiments.
引用
收藏
页码:571 / 577
页数:7
相关论文
共 50 条
  • [31] Enhancing identity trust in cryptographic key management systems for dynamic environments
    Kayem, Anne V. D. M.
    Martin, Patrick
    Akl, Selim G.
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 79 - 94
  • [32] Key Life Cycle and Estimation of Time for Revocation of Keys in Cryptographic Systems
    Pal, Om
    Alam, Bashir
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 1028 - 1038
  • [33] Key derivation algorithms for monotone access structures in cryptographic file systems
    Srivatsa, Mudhakar
    Liu, Ling
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 347 - +
  • [34] Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution
    Sabri, Khair Eddin
    Khedri, Ridha
    FUNDAMENTA INFORMATICAE, 2011, 112 (04) : 305 - 335
  • [35] Defense frontier analysis of quantum cryptographic systems
    Slutsky, B
    Rao, R
    Sun, PC
    Tancevski, L
    Fainman, S
    APPLIED OPTICS, 1998, 37 (14): : 2869 - 2878
  • [36] Theoretical analysis of the image with a local intensity minimum during hot image formation in high-power laser systems
    Li, Dong
    Zhao, Jianlin
    Peng, Tao
    Cai, Zhaobin
    APPLIED OPTICS, 2009, 48 (32) : 6229 - 6233
  • [37] MEASUREMENT OF INTENSITY CORRELATION FUNCTIONS IN LASER LIGHT
    MATHIEU, E
    KELLER, H
    ZEITSCHRIFT FUR ANGEWANDTE MATHEMATIK UND PHYSIK, 1969, 20 (04): : 571 - &
  • [38] RECOVERY OF LASER INTENSITY FROM CORRELATION DATA
    BLOUNT, EI
    KLAUDER, JR
    JOURNAL OF APPLIED PHYSICS, 1969, 40 (07) : 2874 - &
  • [39] Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
    Anagreh, Mohammad Fawaz
    Hilal, Anwer Mustafa
    Ahmed, Tarig Mohamed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (01) : 151 - 154
  • [40] Investigating The Impact Of Epilepsy On EEG-based Cryptographic Key Generation Systems
    Nguyen, Dang
    Tran, Dat
    Sharma, Dharmendra
    Ma, Wanli
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 177 - 185