Abstract
A record-long 10,118-km fiber transmission with physical layer encryption is demonstrated utilizing a Y-00 cipher based on signal masking by quantum (shot) noise. The Y-00 cipher enables symmetric-key data encryption to ensure the security of the physical layer of optical communications. Irreducible secrecy without significant negative impact on transmission performance is achieved by the synergistic effect of combining seed-key-based high-order modulation and truly random shot noise inevitable in optical detection. This paper reports a comprehensive study of applying a phase-shift-keying (PSK) Y-00 cipher for ultra-long haul fiber transmission. Theoretical analysis shows that security-enhanced transmission over transoceanic-distance (>10,000 km) fiber is feasible when the quadrature PSK data signal is encrypted by converting to a PSK signal with 218 levels. Subsequently, 10,118-km standard single-mode fiber transmission of 48-Gbit/s line-rate dual-polarization PSK Y-00 cipher with 218 levels is experimentally demonstrated. An adequate signal quality above the Q-factor threshold of soft decision forward error correction is achieved together with sufficient signal masking by shot noise, yielding balanced transmission performance and high security in an ultra-long-haul PSK Y-00 cipher transmission system.
© 2021 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
1. Introduction
Eavesdropping is a potential security risk in the current fiber-optic transmission system. A typical attack comprises two steps: 1) fiber tapping and demodulating optical signals into digital data, and 2) cryptanalyzing the data with computational resources. The digital-layer cipher implemented in layer two or higher, such as the advanced encryption standard, prevents step 2) because of the high computational complexity involved. To achieve higher security, step 1) should be prevented as well. Such techniques are known as physical layer encryption (PLE). In PLE, a short seed key is used and data are directly hidden using unique optical encoding or scrambling techniques. Before PLE, the short seed key must be shared securely, e.g., through quantum key distribution [1] and post quantum cryptography [2]; however, it is noteworthy that such key exchange methods are beyond the scope of this study. PLE has been extensively studied as an application of chaotic lasers [3], where chaotic synchronization is utilized to achieve secrecy. Secure fiber transmissions at gigabit/second data rates were experimentally demonstrated [4–8]. Furthermore, physical layer security enhancement by exploiting optical code-division multiplexing access (CDMA) has been investigated [9,10]. Fiber transmission experiments with enhanced security have been reported [11–13].
In this study, we focused on PLE based on signal masking by quantum (shot) noise [14], originally known as AlphaEta [15] or Y-00 quantum stream cipher [16]. Low-order data signals are converted into extremely high-order intensity modulation/phase-shift-keying (PSK)/ quadrature amplitude modulation signals, e.g., 217 PSK [17], utilizing a prescribed conversion protocol with a seed key. In such cases, the correct detection of extremely high-order signals without the key is disrupted by shot noise. Signal masking by shot noise provides irreducible security because shot noise is inherently inevitable and random. The true randomness of shot noise, which is the consequence of Born’s rule, contributes to irreducibility in the strict sense of cryptology. In the Y-00 cipher system, a legitimate receiver converts extremely high-order signals back into low-order data signals using the key. Ideally, the encryption and decryption processes should not negatively affect the signal quality. This feature indicates that the system can achieve highly secure fiber transmission without sacrificing the data rate and reach.
Figure 1 shows the transmission distance and single-channel line rate of secure fiber transmission experiments with PLE based on signal masking by shot noise (AlphaEta and Y-00 cipher) [18–26], chaotic synchronization [4–8], and optical CDMA [11–13]. The maximum reach reported was 1,000 km in 1.5 and 2.5 Gbit/s cipher systems based on signal masking by shot noise [19,21]. Recently, digital coherent technologies have been introduced to the approach based on the signal masking, and a few hundred kilometer fiber transmissions at a line rate exceeding 10 Gbit/s have been demonstrated [23–25,27]. Our recent study showed that the optical signal-to-noise ratio (OSNR) penalty of the digital-coherent PSK Y-00 cipher system was less than 0.5 dB when compared with that of a noncipher conventional system [24]. This result suggests that transmission over a much longer fiber is possible. Meanwhile, the reach and line rates of cipher systems based on chaotic synchronization and optical CDMA are limited to 150 km and 32 Gbit/s, respectively. In both approaches, precise optical chromatic dispersion compensation is required for fiber transmission, which limits the reach and line rate in modern fiber-optic transmission systems without optical dispersion management. Hence, the Y-00 cipher can provide enhanced security at the physical layer in high-capacity and long-reach fiber-optic transmission systems. Moreover, the cipher occupies a bandwidth comparable with noncipher signals and is applicable to wavelength-division multiplexing systems [15,18,25,28,29].
This paper reports a digital coherent PSK Y-00 cipher system for ultra-long-haul fiber transmission exceeding 10,000 km. Comprehensive study of system design and details of our experimental demonstration of 10,118-km cipher transmission [30] are presented. In the PSK Y-00 cipher system, tradeoffs exist between the transmission reach and security. This may hinder the ultra-long-haul transmission of the cipher. We studied the tradeoffs theoretically and derived an equation that describes the relationship among the reach, number of phase levels after encryption, and quantum-noise masking number. The quantum-noise masking number, which indicates the number of phase levels covered by the shot noise after encryption, is a primary measure of security. Numerical analysis using the equation shows that the tradeoff can be mitigated by increasing the number of phase levels or the PSK order after the encryption. A transmission reach exceeding 10,000 km while maintaining sufficient signal masking by shot noise is achievable, provided that the number of phase levels is 218. We experimentally demonstrated the fiber transmission of a single-channel 48-Gbit/s line-rate digital coherent PSK Y-00 cipher with 218 levels. A record-long transmission reach of 10,118 km, which is a 10-fold increase as shown in Fig. 1, was demonstrated at a single channel net rate of 40 Gbit/s. The quantum-noise masking number reached 231, and a high symbol error ratio (SER) of 0.9965 for an eavesdropper without the key information was achieved by irreducible signal masking by shot noise. Thus the first experimental demonstration of ultra-long-haul, transoceanic-distance, physical-layer secure fiber transmission was demonstrated.
2. Operating principles
2.1 Signal masking by quantum (shot) noise
Encryption in the PSK Y-00 cipher was achieved by randomizing the phase of M-ary PSK data modulation. Figure 2 shows the operating principle when the data modulation was quadrature PSK (QPSK) with M = 4. As shown in Fig. 2(a), the basis phase of the QPSK data modulation, which is indicated by the black arrow on the I-axis, was rotated by θbasis(i) for the encryption of one symbol with identification i. The angle was between −π/4 and π/4 and was determined randomly using a seed key and pseudorandom number generators (PRNGs). The seed key must be shared securely between legitimate users before starting cipher transmission. Details of the procedure to determine the angle for each symbol θbasis(i) is shown in Section 2.3. The basis phase was rotated in a symbol-by-symbol manner, and the QPSK data modulation was converted to a high-order PSK signal. When 2m phase levels (m-bit resolution) were prepared for the phase randomization, the PSK Y-00 cipher based on the QPSK data modulation (M = 4) corresponded to a 2(m+2) PSK signal. As shown in Fig. 1(b), m was set to a large number, e.g., >12; as such, adjacent signal phase levels could not be discriminated easily because of noise. Provided that m is particularly large, the shot noise will mask adjacent phase levels, as shown in the magnified image. The masking effect by shot noise is irreducible and unchanged because the shot noise is truly random and inherently inevitable in optical detection. Masking by shot noise for secrecy is only effective for an eavesdropper who must measure the high-order PSK signals without the seed key. A legitimate receiver can subtract the symbol-by-symbol phase rotation using the seed key and detect the cipher as a QPSK signal.
A quantum-noise masking number ΓQ is introduced to quantitatively discuss the masking effect for secrecy. The masking number is defined as the number of signal phase levels covered by the shot noise and is calculated as the ratio of Δϕshot and Δθbasis which are shown in the magnified image of Fig. 2(b). A higher masking number is better for secrecy because a larger uncertainty is imposed during the signal detection of an eavesdropper. In our previous studies [17,24], the masking number of the PSK Y-00 cipher was defined assuming an ideal simultaneous phase and amplitude detection, which were considered impossible in practice. In this study, the masking number was defined assuming ideal heterodyne detection. This definition is more practical as the ideal heterodyne detection, which provides the standard quantum limit, is considered to be the best implementable strategy for signal detection. The quantum-noise masking number is expressed as
2.2 Security realized by quantum-noise masking
Signal masking by shot noise disrupts the eavesdropper’s measurement of the cipher or high-order signals, which have M·2m phase levels. The quantum-noise masking number ΓQ is related to the uncertainty of the measurement. One can estimate the SER when an eavesdropper performs an ideal heterodyne measurement of the cipher. As the purpose of this cipher system is to prevent signal interception, the SER is a security measure which indicates the difficulty of the successful interception. The SER is obtained from the masking number ΓQ as follows (see Supplement 1, Section 2 for details):
Using Eqs. (1) and (2), we calculated the SERs for various values of the optical power of the cipher per polarization PS. The order of data modulation M, signal bandwidth B, signal frequency ν0, and quantum efficiency ηq were 4 (QPSK), 12 GHz (12 Gbaud), 193.55 THz (1550 nm), and 1, respectively. Figure 3 shows the results. The right vertical axis denotes the quantum-noise masking numbers corresponding to the SERs. As PS is an optical power at the input of the fiber link, a typical power range to maintain the best transmission performance in a long-haul fiber link is approximately −10 to −3 dBm. The bit resolution of phase randomization m should be 16 or more for SER > 0.99 in the power range. In eavesdropping attacks, if long consecutive symbols should be discriminated without errors, the risk of correctly deducing the seed key by subsequent cryptanalysis would increase. The success probability of correctly discriminating l consecutive symbols is (1 − PSER_eve)l, depending not only on the masking effect, but also on the consecutive symbol length l. The symbol length required to deduce a seed key or to decipher meaningful messages is related to the mathematical encryption part, in which the symbol-by-symbol phase rotation angles are determined using the seed key. The length is typically long, and the success probability is small enough to be ignored. In the following pages, the SER an eavesdropper can reach with ideal heterodyne detection PSER_eve and the quantum-noise masking number ΓQ are mainly used for simplified assessment of security. However, as shown partly in this paragraph, the overall security of a Y-00 cipher system is also related to other factors, such as the length of a seed key and configuration of the mathematical encryption part, and is more complicated.
An important feature of the Y-00 cipher is that PSER_eve cannot be reduced because the quantum-noise masking number ΓQ is defined for an ideal heterodyne detection only in the presence of inevitable shot noise. It is assumed that an eavesdropper can tap all powers of the cipher at the input of the fiber link; any restriction will not be imposed to the interception. In the strict sense of cryptology, it is also important that shot noise is proven to be truly random, because there is no statistical weakness in the signal masking. In other words, PSER_eve defined under such conditions is a lower bound, and the security of the cipher system cannot be broken down unless the standard quantum limit of signal detection or the shot-noise limit is surpassed. Detailed discussions regarding the practical overall security are provided elsewhere [31].
2.3 Encryption and decryption
Figure 4 shows the flow of encryption process in a PSK Y-00 cipher system based on QPSK data modulation (M = 4). The inputs are binary data of plain text and seed key. The key length |K| is typically 256 bits. The seed key is extended to the key stream, which is a practically nonrepeated pseudorandom binary sequence (PRBS), using a PRNG. Subsequently, m bits are extracted to determine the phase rotation angle of a symbol. Here, i denotes the identification number of a symbol. An irregular mapper is used to convert the m-bit sequence into a rotation angle θbasis(i). The mapping is designed such that the effect of shot noise on the key stream is random [32], with which the cipher becomes robust against attacks on the seed key. In addition, bitwise exclusive OR (XOR) operation on the data bits and key stream, which is known as overlap selection keying [33], is performed. Subsequently, the data bits are mapped to the QPSK signals, where encoding for each time slot is changed based on the last two bits of the m-bit sequence. The relationship between the data bits and the phase angle of QPSK modulation, [XX] = [θdata(i)], is as follows: [11, 01, 00, 10] = [π/4, 3π/4, 5π/4, 7π/4] for the last two bits of 00; [10, 11, 01, 00] = [π/4, 3π/4, 5π/4, 7π/4] for the last two bits of 01; [00, 10, 11, 01] = [π/4, 3π/4, 5π/4, 7π/4] for the last two bits of 10; [01, 00, 10, 11] = [π/4, 3π/4, 5π/4, 7π/4] for the last two bits of 11. This cyclic shift of gray coding is necessary to hide the data bits by shot noise. Hence, a pair comprising θbasis(i) and θdata(i) is obtained for each time slot. Finally, coherent light is modulated such that the phase angle becomes θbasis(i) + θdata(i). The process described herein is the basic process. Additional randomization techniques to further enhance security, such as deliberate signal randomization and deliberate error randomization, are discussed elsewhere [34].
The summation of θbasis(i) and θdata(i) is achieved in the electrical or optical domain. The simplest approach is to combine the angles in the electrical domain. Subsequently, the phase of the light is modulated using an IQ modulator and a digital-to-analog converter (DAC) with a bit resolution of m + 2 (M = 4) or higher. The bit resolution for the phase randomization m, which is related to the security of the cipher system, is limited by the resolution of the DAC, although the setup is relatively simple. The limitation is strict at high baud rates conventionally used in modern optical transmission systems. For instance, m + 2 must be 12 or less at a baud rate of 10 Gbaud or more, whereas m = 16 is required to achieve sufficient masking by shot noise. Another approach is summation in the optical domain. The QPSK modulation and phase rotation of θbasis(i) are achieved using an IQ modulator and a phase modulator (PM), respectively. This setup will relax the requirement for the bit resolution of the DAC by 2 bits. However, we still need to achieve m = 16. Therefore, a coarse-to-fine phase randomization technique was proposed and demonstrated [17]. The phase rotation angle θbasis(i) was segmented into coarse and fine angles, θbasis_C(i) and θbasis_F(i), and two cascaded PMs were synchronously driven by two DACs. The nominal resolution became twice the bit resolution of a single DAC. We previously demonstrated a 12-Gbaud PSK Y-00 cipher with m = 16 using this technique [24].
A legitimate receiver comprises a seed key, PRNG, and mapper; hence, the θbasis(i) for each time slot is shared. At the receiver side, the phase of the light is inversely rotated by θbasis(i) in a symbol-by-symbol manner for decryption. This process is achieved in the optical or electrical domains. An optical phase modulator is used to perform inverse-phase rotation in the optical domain [15,18]. Meanwhile, an electrical decryption is achieved by multiplying exp(-jθbasis(i)) by the received phase in the digital domain after coherent detection. A self-coherent technique with a one-bit delay interferometer was first employed for decryption [35]. Recently, digital coherent detection with a free-running local oscillator (LO) was employed, where multiplying the inverse phase was incorporated straightforwardly into a standard digital signal processing (DSP) for intradyne coherent detection [24]. In both the optical and electrical approaches, timing synchronization between the received cipher and key stream is necessary. A synchronization protocol can be implemented prior to the start of communication.
3. Systematic design
3.1 Tradeoffs between masking number and transmission reach
Assuming a simple long-haul fiber link in which each constant span loss is fully compensated by an Er-doped fiber amplifier (EDFA), we theoretically investigated the quantum-noise masking number ΓQ and transmission reach in the cipher system. Figure 5 shows the model of the fiber link and power diagram. The link comprises L-km fiber spans and EDFAs, and the loss and gain are repeated regularly. The number of spans is N, and the span loss is equivalent to the amplifier gain G. When the signal power launched into each fiber span is Pin, the OSNR of the output signal OSNRout is calculated as
As the number of spans is an integer, the floor function is used. The maximum reach is obtained by multiplying Nmax by L. In the PSK Y-00 cipher system, the signal power and quantum-noise masking number are correlated as shown in Eq. (1). Hence, tradeoffs between the masking number and the maximum number of spans are obtained using Eqs. (1) and (4).
Next, we discuss the theoretical limit of the tradeoff. OSNRreq and Eb/N0, which is a bit energy to the noise power density ratio or SNR per bit, are related as follows [37]:
3.2 Numerical analysis of long-haul cipher transmission systems
Using Eq. (7), we numerically investigated the ultra-long haul transmission of the PSK Y-00 cipher. The target reach was set to 10,000 km for a transoceanic submarine cable system. The practical choices of data modulation for such a long reach were BPSK (M = 2) or QPSK (M = 4). We here chose QPSK data modulation because Eq. (7) indicated that the tradeoff was effectively mitigated for the QPSK provided that a bit resolution for the phase randomization m was fixed. Table 1 summarizes the specifications of the cipher and fiber link. Soft decision forward error correction (SD-FEC) with an overhead of 20% (r = 5/6) was employed, and a typical BER threshold of 1.8 × 10−2 was assumed [38]. The fiber link comprised a low-loss pure-silica-core fiber with a loss of 0.154 dB/km [39]. When M = 4, a SNR per bit required to achieve the BER threshold, (Eb/N0)req, is 3.42 dB (see Supplement 1, Section 3 for details). The relation between the quantum-noise masking number ΓQ and transmission reach NY-00_limit × L is calculated by substituting (Eb/N0)req and other parameters shown in Table 1 into Eq. (7). Figure 6 shows the results for various bit resolutions of phase randomization m. The right vertical axis denotes the SER of an eavesdropper PSER_eve, which is calculated using Eq. (2). The masking number on the left axis corresponds to the SER on the right one. Note that the scale of the right axis is irregular to maintain the consistency. When m = 16, a masking number exceeding 650, corresponding to PSER_eve > 0.9987, is achieved in the transmission over 10,000-km fiber. As this tradeoff is independent of the baud rate of the cipher, such secure long-reach transmission is achievable at a high baud of a few tens of gigabaud. Although linear transmission is assumed in this calculation, this theoretical investigation indicates that the tradeoff can be mitigated using phase randomization with a bit resolution m of 16 or higher. Hence, the PSK Y-00 cipher can achieve high-speed ultra-long-haul transmissions with security realized by quantum-noise masking.
4. Experiments
4.1 Back-to-back condition
First, experimental demonstrations of the encryption and decryption of the dual-polarization (DP) PSK Y-00 cipher with 218 phase levels (M = 4 and m = 16) are reported. Figure 7 shows the experimental setup. A data stream comprising a PRBS with a length of 223-1 and a pre-shared seed key were placed into a Y-00 mathematical encryption box. The prescribed process detailed in Section 2.3 was performed, and θdata(i) and θbasis(i), which correspond to 2-bit data with randomization and 16 bits for phase randomization, respectively, were obtained for each symbol. They were combined in the optical domain. First, coherent light at 1550.12 nm was modulated with an IQ modulator at 12 Gbaud by the 2-bit data corresponding to θdata(i). Subsequently, two cascaded PMs were synchronously driven for the phase rotation of θbasis(i). The nominal bit resolution of the phase randomization was 16 bits, and a PSK Y-00 cipher with nominal 218 phase levels was generated. Next, polarization-division multiplexing was emulated using a coupler and a polarization beam combiner, and a DP-PSK Y-00 cipher at a line rate of 48 Gbit/s was generated.
In a back-to-back condition, which is shown as (i) in Fig. 7, a variable optical attenuator (VOA) and an EDFA were used to adjust the OSNR at the receiver. Subsequently, the Y-00 cipher was received using a conventional intradyne coherent detection setup. A free-running LO, a polarization-diversity 90° optical hybrid circuit, and balance photodetectors were used. Digitization was achieved using a real-time oscilloscope with a bandwidth of 13 GHz. Finally, offline DSP for polarization demultiplexing, decryption, and carrier phase recovery was performed. The decryption, which is a symbol-by-symbol inverse phase rotation, is a unique process for the cipher. The phase rotation angle θbasis(i) for each symbol was obtained by placing the same seed key into the same encryption box, and exp(−jθbasis(i)) was multiplied by the detected complex amplitude of each symbol of the cipher. Timing synchronization between the transmitter and receiver for decryption was achieved by adding preamble bits in the offline processing.
Figure 8 shows the constellation diagrams and Q factors in the back-to-back condition. As shown in Fig. 8(a), the phase of the cipher was randomized, and the constellation was donut-shaped. After decryption, QPSK data modulations were recovered for both polarizations, as shown in Fig. 8(b). Figure 8(c) shows the Q factors for various OSNRs at the receiver. A measured reference curve of the noncipher DP QPSK was co-plotted. More than 1.1 million (>220) symbols were processed to measure the BER, and the Q factor was calculated from the BER using the relation Q [dB] = 20 × log10[√2erfc-1(2 × BER)]. An SD-FEC Q-threshold of 6.4 dB was achieved at an OSNR of 7.4 dB for the cipher. The Q-penalty caused by the encryption and decryption, which is the difference between the curves of the cipher and reference at the same OSNR, was approximately 0.3 dB. Although this penalty was sufficiently small, it can be ideally zero in this cipher system.
4.2 Ultra-long-haul transmission
Ultra-long-haul transmissions of the DP-PSK Y-00 cipher were demonstrated using a recirculating loop system shown as (ii) in Fig. 7. The recirculating loop system comprised two acousto–optic modulators and a 50.59 km × 5 standard SMF link with EDFAs. A mode field diameter of SMF was 9.2 μm. The average span loss was 9.6 dB. The signal power launched into each span Pin was adjusted to be consistent with the EDFA and VOA. Chromatic dispersion compensation was additionally implemented in the DSP for a long fiber transmission. Figure 9 shows the Q-factors of the decrypted QPSK signal when the transmission distance was 10,118 km (after 40 loops). The Q-factors were calculated from the measured BER. The span-launch power Pin was changed from −10 to −4 dBm. The maximum Q-factor, which is higher than the Q-threshold of the SD-FEC, was achieved at an input power Pin of −7 dBm. The effect of self-phase modulation limited the maximum input power. The inset constellation diagrams show that the DP QPSK data signals had recovered successfully after the decryption. The black solid curve in Fig. 9 shows the SER of the ideal heterodyne detection of the cipher (218 PSK) by an eavesdropper, PSER_eve. When Pin = −7 dBm, PSER_eve was 0.9965 (ΓQ = 231). This high SER at the highest optical power in the link means that detection without a seed key results in inevitable many errors even if all powers of the cipher are tapped at the input of the fiber link and are detected by an ideal heterodyne receiver without any additive noise.
For intuitive understanding of high security, we estimate the probability that an eavesdropper correctly detects symbols containing the full information of a seed key. Here we assume that an eavesdropper uses an ideal heterodyne receiver and discriminates symbols straightforwardly. As discussed in Section 2.2, the probability of discriminating l consecutive symbols without errors is (1 − PSER_eve)l. The symbol length in which the full information of a seed key is contained is the length of the seed key divided by the bit resolution of phase randomization, |K|/m. Since m is the denominator, to reduce the success probability by simply increasing m becomes less effective at some point. The value of m = 16 in this experiment is a good point of compromise. By substituting |K|/m = 16 for |K| = 256 bits into l, the probability is estimated to be 3.87 × 10−40, which is small. It is noteworthy that this probability is the higher bound guaranteed from masking by shot noise. If the cipher is tapped at the fiber link after amplification, accumulated amplified spontaneous emission noise from EDFAs will function effectively for signal masking. If only a part of the optical power is tapped, then the masking number increases. These practical factors will significantly reduce the probability in real situations, and high practical security with irreducible security bounds based on shot noise will be achieved.
Figure 10 shows the Q-factors of the cipher and reference DP QPSK as the transmission distance varied from 3,035 to 10,118 km. The signal input power Pin was set to −10 and −7 dBm. The maximum reach defined by the typical Q-threshold of the SD-FEC (6.4 dB) was 8,094 and 10,118 km for Pin of −10 and −7 dBm, respectively. When Pin was −10 dBm, the SER of the ideal heterodyne detection without a seed key PSER_eve was 0.9975, whereas the reach decreased by approximately 20%. The difference in the Q-factors between the cipher and reference was 0.4 dB on average. The Q-penalty of 0.3 dB caused by encryption and decryption, as discussed in the previous subsection, was dominant. The cipher had a large Q margin when the transmission distance was shorter. This indicates that a higher masking number or a higher PSER_eve is achievable for a shorter transmission distance by appropriately reducing the input power Pin of the cipher. The penalty for the secure transmission is small; hence, ultra-long haul transmissions (e.g., transoceanic distance transmission) with enhanced security at the physical layer can be achieved without significantly sacrificing the signal quality in the coherent PSK Y-00 cipher system.
5. Summary
The system design and experimental demonstrations of a digital coherent PSK Y-00 quantum stream cipher for security-enhanced ultra-long-haul fiber transmission were reported. A theoretical study showed that the tradeoff between transmission performance and security based on signal masking by shot noise was mitigated by increasing the number of phase levels after encryption. It was numerically demonstrated that fiber transmission exceeding 10,000 km with sufficient signal masking for secrecy was achievable provided that the PSK Y-00 cipher based on QPSK data modulation had 218 phase levels. A single-channel 48-Gbit/s DP PSK Y-00 cipher transmission over a 10,118-km standard SMF was experimentally demonstrated. A Q-factor exceeding the threshold of the SD-FEC was achieved at a span-launch optical power of −7 dBm, resulting in a single-channel net data rate of 40 Gbit/s. The PSK Y-00 cipher had 218 phase levels, and the quantum-noise masking number was 231 at the optical power. This number corresponded to an extremely high SER of 0.9965 when an eavesdropper detected all the powers of the cipher at the input of the fiber link using an ideal heterodyne receiver. Hence, transmission performance sufficient for transoceanic-distance fiber transmission and security enhancement at the physical layer were simultaneously achieved in the PSK Y-00 cipher system.
Funding
KDDI Foundation; Japan Society for the Promotion of Science (JP18K04290).
Disclosures
The authors declare no conflicts of interest.
Supplemental document
See Supplement 1 for supporting content.
References
1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,”. in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175, page 8. (1984).
2. D. Bernstein and T. Lange, “Post-quantum cryptography,” Nature 549(7671), 188–194 (2017). [CrossRef]
3. A. Uchida, “Part Two: Application of Chaotic Lasers to Optical Communication and Information Technology,” in Optical Communication with Chaotic Lasers: Applications of Nonlinear Dynamics and Synchronization, (Wiley-VCH, 2012). [CrossRef]
4. A. Argyris, D. Syvridis, L. Larger, V. A. Lodi, P. Colet, I. Fischer, J. G. Ojalvo, C. R. Mirasso, L. Pesquera, and K. A. Shore, “Chaos-based communications at high bit rates using commercial fibre-optic links,” Nature 438(7066), 343–346 (2005). [CrossRef]
5. R. Lavrov, M. Jacquot, and L. Larger, “Nonlocal Nonlinear Electro-Optic Phase Dynamics Demonstrating 10 Gb/s Chaos Communications,” IEEE J. Quantum Electron. 46(10), 1430–1435 (2010). [CrossRef]
6. H. Yin, X. Chen, H. Yue, N. Zhao, X. Qi, W. Wang, and Q. Zhao, “Experimental realization of long-haul chaotic optical secure communications,” in 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)2015, 2112–2116.
7. J. Ke, L. Yi, Z. Yang, Y. Yang, Q. Zhuge, Y. Chen, and W. Hu, “32 Gb/s chaotic optical communications by deep-learning-based chaos synchronization,” Opt. Lett. 44(23), 5776–5779 (2019). [CrossRef]
8. Y. Fu, M. Cheng, X. Jiang, Q. Yu, L. Huang, L. Deng, and D. Liu, “High-speed optical secure communication with an external noise source and an internal time-delayed feedback loop,” Photonics Res. 7(11), 1306–1313 (2019). [CrossRef]
9. T. H. Shake, “Security Performance of Optical CDMA Against Eavesdropping,” J. Lightwave Technol. 23(2), 655–670 (2005). [CrossRef]
10. S. Etemad, A. Agarwal, T. Banwell, J. Jackel, R. Menendez, and P. Toliver, “OCDM-based photonic layer ‘security’ scalable to 100 Gbits/s for existing WDM networks [Invited],” J. Opt. Netw. 6(7), 948–967 (2007). [CrossRef]
11. Z. Wang, L. Xu, J. Chang, T. Wang, and P. R. Prucnal, “Secure Optical Transmission in a Point-to-Point Link With Encrypted CDMA Codes,” IEEE Photonics Technol. Lett. 22(19), 1410–1412 (2010). [CrossRef]
12. T. Kodama, N. Nakagawa, N. Kataoka, N. Wada, G. Cincotti, X. Wang, T. Miyazaki, and K. Kitayama, “Secure 2.5 Gbit/s, 16-Ary OCDM Block-Ciphering With XOR Using a Single Multi-Port En/Decoder,” J. Lightwave Technol. 28(1), 181–187 (2010). [CrossRef]
13. Z. Gao, B. Dai, X. Wang, N. Kataoka, and N. Wada, “Rapid programmable/code-length-variable, time-domain bit-by-bit code shifting for high-speed secure optical communication,” Opt. Lett. 36(9), 1623–1625 (2011). [CrossRef]
14. G. Barbosa, E. Corndorf, P. Kumar, and H. P. Yuen, “Secure communication using mesoscopic coherent states,” Phys. Rev. Lett. 90(22), 227901 (2003). [CrossRef]
15. E. Corndorf, C. Liang, G. S. Kanter, P. Kumar, and H. P. Yuen, “Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks,” Phys. Rev. A 71(6), 062326 (2005). [CrossRef]
16. O. Hirota, M. Sohma, M. Fuse, and K. Kato, “Quantum stream cipher by Yuen 2000 protocol: Design and experiment by intensity modulation Scheme,” Phys. Rev. A 72(2), 022335 (2005). [CrossRef]
17. K. Tanizawa and F. Futami, “Digital coherent PSK Y-00 quantum stream cipher with 217 randomized phase levels,” Opt. Express 27(2), 1071–1079 (2019). [CrossRef]
18. C. Liang, G. S. Kanter, E. Corndorf, and P. Kumar, “Quantum Noise Protected Data Encryption in a WDM Network,” IEEE Photon. Technol. Lett. 17(7), 1573–1575 (2005). [CrossRef]
19. F. Futami, K. Tanizawa, and K. Kato, “Y-00 Quantum-Noise Randomized Stream Cipher Using Intensity Modulation Signals for Physical Layer Security of Optical Communications,” J. Lightwave Technol. 38(10), 2774–2781 (2020). [CrossRef]
20. G. S. Kanter, D. Reilly, and N. Smith, “Practical physical-layer encryption: The marriage of optical noise with traditional cryptography,” IEEE Commun. Mag. 47(11), 74–81 (2009). [CrossRef]
21. W. Mao, G. Gao, C. Xu, H. Liu, Y. Shen, J. Zhang, and Y. Guo, “Long Distance IM/DD Transmission with OFDM-QAM based Quantum Noise Stream Cipher,” in 18th International Conference on Optical Communications and Networks (ICOCN)2019, paper P4.9.
22. Y. Doi, S. Akutsu, M. Honda, K. Harasawa, O. Hirota, S. Kawanishi, O. Kenichi, and K. Yamashita, “360 km field transmission of 10 Gbit/s stream cipher by quantum noise for optical network,” in Proc. Opt. Fiber Comm. Conf. (OFC)2010, paper OWC4.
23. M. Yoshida, T. Hirooka, K. Kasai, and M. Nakazawa, “Single-channel 40 Gbit/s digital coherent QAM quantum noise stream cipher transmission over 480 km,” Opt. Express 24(1), 652–661 (2016). [CrossRef]
24. K. Tanizawa and F. Futami, “Single-channel 48-Gbit/s DP PSK Y-00 quantum stream cipher transmission over 400- and 800-km SSMF,” Opt. Express 27(18), 25357–25363 (2019). [CrossRef]
25. M. Yoshida, T. Kan, K. Kasai, T. Hirooka, and M. Nakazawa, “10 Tbit/s QAM Quantum Noise Stream Cipher Coherent Transmission over 160 km,” in Optical Fiber Communications Conference and Exhibition (OFC)2020, paper T3D.2.
26. Q. Yu, Y. Wang, D. Li, H. Song, Y. Fu, X. Jiang, L. Huang, M. Cheng, D. Liu, and L. Deng, “Secure 100 Gb/s IMDD Transmission Over 100 km SSMF Enabled by Quantum Noise Stream Cipher and Sparse RLS-Volterra Equalizer,” IEEE Access 8, 63585–63594 (2020). [CrossRef]
27. X. Chen, K. Tanizawa, P. Winzer, P. Dong, J. Cho, F. Futami, K. Kato, A. Melikyan, and K. W. Kim, “Experimental Demonstration of 4,294,967,296-QAM Based Y-00 Quantum Stream Cipher Template Carrying 160-Gb/s 16-QAM Signals,” Opt. Express 29(4), 5658–5664 (2021). [CrossRef]
28. F. Futami and O. Hirota, “100 Gbit/s (10 × 10 Gbit/s) Y-00 cipher transmission over 120 km for secure optical fiber communication between data centers,” OptoElectronics and Communication Conference and Australian Conference on Optical Fibre Technology (OECC/ACOFT)2014, paper MO1A2.
29. F. Futami, K. Guan, J. Gripp, K. Kato, K. Tanizawa, C. Sethumadhavan, and P. J. Winzer, “Y-00 quantum stream cipher overlay in a coherent 256-Gbit/s polarization multiplexed 16-QAM WDM system,” Opt. Express 25(26), 33338–33349 (2017). [CrossRef]
30. K. Tanizawa and F. Futami, “Security-Enhanced 10,118-km Single-Channel 40-Gbit/s Transmission Using PSK Y-00 Quantum Stream Cipher,” 46th European Conference on Optical Communications (ECOC2020), paper We1E.4.
31. O. Hirota, “Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol,” Phys. Rev. A 76(3), 032307 (2007). [CrossRef]
32. T. Shimizu, O. Hirota, and Y. Nagasako, “Running key mapping in quantum stream cipher by Yuen 2000 protocol,” Phys. Rev. A 77(3), 034305 (2008). [CrossRef]
33. O. Hirota, T. S. Usuda, and M. Fuse, “Quantum stream cipher Part III: design of keyed randomization and experiment,” Proc. SPIE 5893, 589304 (2005). [CrossRef]
34. K. Kato and O. Hirota, “Quantum stream cipher Part IV: Effects of the deliberate signal randomization and the deliberate error randomization,” Proc. SPIE 6305, 630508 (2006). [CrossRef]
35. G. S. Kanter, S. X. Wang, R. A. Lipa, and D. Reilly, “Self-Coherent Differential Phase Detection for Optical Physical-Layer Secure Communications,” in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference 2013, OSA Technical Digest (online) (Optical Society of America, 2013), paper JW2A.41.
36. I. P. Kaminow, T. Li, and A. E. Willner, Optical Fiber Telecommunications V B: Systems and Networks, (Elsevier, 2008).
37. L. Schmalen, S. T. Brink, and A. Leven, “Advances in Detection and Error Correction for Coherent Optical Communications: Regular, Irregular, and Spatially Coupled LDPC Code Designs,” in Enabbling Technologies for High Spectral-Efficiency Coherent Optical Communication Networks, (Wiley, 2016).
38. T. Mizuochi, Y. Miyata, K. Kubo, T. Sugihara, K. Onohara, and H. Yoshida, “Progress in Soft-Decision FEC,” in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference (OFC/NFOEC)2011, paper NWC2.
39. Y. Kawaguchi, Y. Tamura, T. Haruna, Y. Yamamoto, and M. Hirano, “Ultra Low-loss Pure Silica Core Fiber,” SEI Tech. Rev. 80, 50–55 (2015).