Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Ultra-long-haul digital coherent PSK Y-00 quantum stream cipher transmission system

Open Access Open Access

Abstract

A record-long 10,118-km fiber transmission with physical layer encryption is demonstrated utilizing a Y-00 cipher based on signal masking by quantum (shot) noise. The Y-00 cipher enables symmetric-key data encryption to ensure the security of the physical layer of optical communications. Irreducible secrecy without significant negative impact on transmission performance is achieved by the synergistic effect of combining seed-key-based high-order modulation and truly random shot noise inevitable in optical detection. This paper reports a comprehensive study of applying a phase-shift-keying (PSK) Y-00 cipher for ultra-long haul fiber transmission. Theoretical analysis shows that security-enhanced transmission over transoceanic-distance (>10,000 km) fiber is feasible when the quadrature PSK data signal is encrypted by converting to a PSK signal with 218 levels. Subsequently, 10,118-km standard single-mode fiber transmission of 48-Gbit/s line-rate dual-polarization PSK Y-00 cipher with 218 levels is experimentally demonstrated. An adequate signal quality above the Q-factor threshold of soft decision forward error correction is achieved together with sufficient signal masking by shot noise, yielding balanced transmission performance and high security in an ultra-long-haul PSK Y-00 cipher transmission system.

© 2021 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

Eavesdropping is a potential security risk in the current fiber-optic transmission system. A typical attack comprises two steps: 1) fiber tapping and demodulating optical signals into digital data, and 2) cryptanalyzing the data with computational resources. The digital-layer cipher implemented in layer two or higher, such as the advanced encryption standard, prevents step 2) because of the high computational complexity involved. To achieve higher security, step 1) should be prevented as well. Such techniques are known as physical layer encryption (PLE). In PLE, a short seed key is used and data are directly hidden using unique optical encoding or scrambling techniques. Before PLE, the short seed key must be shared securely, e.g., through quantum key distribution [1] and post quantum cryptography [2]; however, it is noteworthy that such key exchange methods are beyond the scope of this study. PLE has been extensively studied as an application of chaotic lasers [3], where chaotic synchronization is utilized to achieve secrecy. Secure fiber transmissions at gigabit/second data rates were experimentally demonstrated [48]. Furthermore, physical layer security enhancement by exploiting optical code-division multiplexing access (CDMA) has been investigated [9,10]. Fiber transmission experiments with enhanced security have been reported [1113].

In this study, we focused on PLE based on signal masking by quantum (shot) noise [14], originally known as AlphaEta [15] or Y-00 quantum stream cipher [16]. Low-order data signals are converted into extremely high-order intensity modulation/phase-shift-keying (PSK)/ quadrature amplitude modulation signals, e.g., 217 PSK [17], utilizing a prescribed conversion protocol with a seed key. In such cases, the correct detection of extremely high-order signals without the key is disrupted by shot noise. Signal masking by shot noise provides irreducible security because shot noise is inherently inevitable and random. The true randomness of shot noise, which is the consequence of Born’s rule, contributes to irreducibility in the strict sense of cryptology. In the Y-00 cipher system, a legitimate receiver converts extremely high-order signals back into low-order data signals using the key. Ideally, the encryption and decryption processes should not negatively affect the signal quality. This feature indicates that the system can achieve highly secure fiber transmission without sacrificing the data rate and reach.

 Figure 1 shows the transmission distance and single-channel line rate of secure fiber transmission experiments with PLE based on signal masking by shot noise (AlphaEta and Y-00 cipher) [1826], chaotic synchronization [48], and optical CDMA [1113]. The maximum reach reported was 1,000 km in 1.5 and 2.5 Gbit/s cipher systems based on signal masking by shot noise [19,21]. Recently, digital coherent technologies have been introduced to the approach based on the signal masking, and a few hundred kilometer fiber transmissions at a line rate exceeding 10 Gbit/s have been demonstrated [2325,27]. Our recent study showed that the optical signal-to-noise ratio (OSNR) penalty of the digital-coherent PSK Y-00 cipher system was less than 0.5 dB when compared with that of a noncipher conventional system [24]. This result suggests that transmission over a much longer fiber is possible. Meanwhile, the reach and line rates of cipher systems based on chaotic synchronization and optical CDMA are limited to 150 km and 32 Gbit/s, respectively. In both approaches, precise optical chromatic dispersion compensation is required for fiber transmission, which limits the reach and line rate in modern fiber-optic transmission systems without optical dispersion management. Hence, the Y-00 cipher can provide enhanced security at the physical layer in high-capacity and long-reach fiber-optic transmission systems. Moreover, the cipher occupies a bandwidth comparable with noncipher signals and is applicable to wavelength-division multiplexing systems [15,18,25,28,29].

 figure: Fig. 1.

Fig. 1. Transmission distances and single-channel line rates in previous experimental demonstrations of secure fiber-optic transmission with PLE.

Download Full Size | PDF

This paper reports a digital coherent PSK Y-00 cipher system for ultra-long-haul fiber transmission exceeding 10,000 km. Comprehensive study of system design and details of our experimental demonstration of 10,118-km cipher transmission [30] are presented. In the PSK Y-00 cipher system, tradeoffs exist between the transmission reach and security. This may hinder the ultra-long-haul transmission of the cipher. We studied the tradeoffs theoretically and derived an equation that describes the relationship among the reach, number of phase levels after encryption, and quantum-noise masking number. The quantum-noise masking number, which indicates the number of phase levels covered by the shot noise after encryption, is a primary measure of security. Numerical analysis using the equation shows that the tradeoff can be mitigated by increasing the number of phase levels or the PSK order after the encryption. A transmission reach exceeding 10,000 km while maintaining sufficient signal masking by shot noise is achievable, provided that the number of phase levels is 218. We experimentally demonstrated the fiber transmission of a single-channel 48-Gbit/s line-rate digital coherent PSK Y-00 cipher with 218 levels. A record-long transmission reach of 10,118 km, which is a 10-fold increase as shown in Fig. 1, was demonstrated at a single channel net rate of 40 Gbit/s. The quantum-noise masking number reached 231, and a high symbol error ratio (SER) of 0.9965 for an eavesdropper without the key information was achieved by irreducible signal masking by shot noise. Thus the first experimental demonstration of ultra-long-haul, transoceanic-distance, physical-layer secure fiber transmission was demonstrated.

2. Operating principles

2.1 Signal masking by quantum (shot) noise

Encryption in the PSK Y-00 cipher was achieved by randomizing the phase of M-ary PSK data modulation. Figure 2 shows the operating principle when the data modulation was quadrature PSK (QPSK) with M = 4. As shown in Fig. 2(a), the basis phase of the QPSK data modulation, which is indicated by the black arrow on the I-axis, was rotated by θbasis(i) for the encryption of one symbol with identification i. The angle was between −π/4 and π/4 and was determined randomly using a seed key and pseudorandom number generators (PRNGs). The seed key must be shared securely between legitimate users before starting cipher transmission. Details of the procedure to determine the angle for each symbol θbasis(i) is shown in Section 2.3. The basis phase was rotated in a symbol-by-symbol manner, and the QPSK data modulation was converted to a high-order PSK signal. When 2m phase levels (m-bit resolution) were prepared for the phase randomization, the PSK Y-00 cipher based on the QPSK data modulation (M = 4) corresponded to a 2(m+2) PSK signal. As shown in Fig. 1(b), m was set to a large number, e.g., >12; as such, adjacent signal phase levels could not be discriminated easily because of noise. Provided that m is particularly large, the shot noise will mask adjacent phase levels, as shown in the magnified image. The masking effect by shot noise is irreducible and unchanged because the shot noise is truly random and inherently inevitable in optical detection. Masking by shot noise for secrecy is only effective for an eavesdropper who must measure the high-order PSK signals without the seed key. A legitimate receiver can subtract the symbol-by-symbol phase rotation using the seed key and detect the cipher as a QPSK signal.

 figure: Fig. 2.

Fig. 2. Operating principle of PSK Y-00 cipher based on QPSK data modulation: (a) phase rotation of symbol for encryption and (b) constellation diagram after encryption.

Download Full Size | PDF

A quantum-noise masking number ΓQ is introduced to quantitatively discuss the masking effect for secrecy. The masking number is defined as the number of signal phase levels covered by the shot noise and is calculated as the ratio of Δϕshot and Δθbasis which are shown in the magnified image of Fig. 2(b). A higher masking number is better for secrecy because a larger uncertainty is imposed during the signal detection of an eavesdropper. In our previous studies [17,24], the masking number of the PSK Y-00 cipher was defined assuming an ideal simultaneous phase and amplitude detection, which were considered impossible in practice. In this study, the masking number was defined assuming ideal heterodyne detection. This definition is more practical as the ideal heterodyne detection, which provides the standard quantum limit, is considered to be the best implementable strategy for signal detection. The quantum-noise masking number is expressed as

$${{\mathrm{\Gamma }_\textrm{Q}} = \frac{{\mathrm{\Delta }{\phi _{\textrm{shot}}}}}{{\mathrm{\Delta }{\theta _{\textrm{basis}}}}} = \frac{{M\cdot {2^m}}}{{2\pi }}\sqrt {\frac{{2h{\nu _0}B}}{{{\eta _\textrm{q}}{P_\textrm{S}}}}} ,}$$
where h, ν0, B, ηq, and PS are the Planck constant, signal frequency, electrical signal bandwidth, quantum efficiency of the PD, and optical power of the signal, respectively (see Supplement 1, Section 1 for details). The signal bandwidth B is typically set to the baud rate of the signal. The masking number is proportional to 2m and inversely proportional to the square root of the signal optical power PS. We typically define the masking number ΓQ by substituting the optical power of the cipher at the input of a fiber link into PS. The quantum efficiency ηq is set to 1, assuming an ideal PD. These conditions are considered to be the best case scenario for an eavesdropper, where all powers of the cipher are tapped at the highest signal-to-noise ratio (SNR) in the link and then detected by an ideal receiver without additive noise. In a long-haul fiber transmission system, the optical power launched into a fiber span should be high to maintain high signal quality. Hence, a high bit resolution m is crucial for achieving a high masking number.

2.2 Security realized by quantum-noise masking

Signal masking by shot noise disrupts the eavesdropper’s measurement of the cipher or high-order signals, which have M·2m phase levels. The quantum-noise masking number ΓQ is related to the uncertainty of the measurement. One can estimate the SER when an eavesdropper performs an ideal heterodyne measurement of the cipher. As the purpose of this cipher system is to prevent signal interception, the SER is a security measure which indicates the difficulty of the successful interception. The SER is obtained from the masking number ΓQ as follows (see Supplement 1, Section 2 for details):

$${{P_{\textrm{SER}\_\textrm{eve}}} = erfc\left( {\frac{1}{{\sqrt 2 {\mathrm{\Gamma }_\textrm{Q}}}}} \right)}$$
This relation indicates that a higher SER, which is favorable for high security, is achieved with a higher masking number.

Using Eqs. (1) and (2), we calculated the SERs for various values of the optical power of the cipher per polarization PS. The order of data modulation M, signal bandwidth B, signal frequency ν0, and quantum efficiency ηq were 4 (QPSK), 12 GHz (12 Gbaud), 193.55 THz (1550 nm), and 1, respectively. Figure 3 shows the results. The right vertical axis denotes the quantum-noise masking numbers corresponding to the SERs. As PS is an optical power at the input of the fiber link, a typical power range to maintain the best transmission performance in a long-haul fiber link is approximately −10 to −3 dBm. The bit resolution of phase randomization m should be 16 or more for SER > 0.99 in the power range. In eavesdropping attacks, if long consecutive symbols should be discriminated without errors, the risk of correctly deducing the seed key by subsequent cryptanalysis would increase. The success probability of correctly discriminating l consecutive symbols is (1 − PSER_eve)l, depending not only on the masking effect, but also on the consecutive symbol length l. The symbol length required to deduce a seed key or to decipher meaningful messages is related to the mathematical encryption part, in which the symbol-by-symbol phase rotation angles are determined using the seed key. The length is typically long, and the success probability is small enough to be ignored. In the following pages, the SER an eavesdropper can reach with ideal heterodyne detection PSER_eve and the quantum-noise masking number ΓQ are mainly used for simplified assessment of security. However, as shown partly in this paragraph, the overall security of a Y-00 cipher system is also related to other factors, such as the length of a seed key and configuration of the mathematical encryption part, and is more complicated.

 figure: Fig. 3.

Fig. 3. SER of detection of PSK Y-00 cipher at line rate per polarization of 24 Gbit/s (M = 4 and B = 12 GHz) without seed key for various optical powers.

Download Full Size | PDF

An important feature of the Y-00 cipher is that PSER_eve cannot be reduced because the quantum-noise masking number ΓQ is defined for an ideal heterodyne detection only in the presence of inevitable shot noise. It is assumed that an eavesdropper can tap all powers of the cipher at the input of the fiber link; any restriction will not be imposed to the interception. In the strict sense of cryptology, it is also important that shot noise is proven to be truly random, because there is no statistical weakness in the signal masking. In other words, PSER_eve defined under such conditions is a lower bound, and the security of the cipher system cannot be broken down unless the standard quantum limit of signal detection or the shot-noise limit is surpassed. Detailed discussions regarding the practical overall security are provided elsewhere [31].

2.3 Encryption and decryption

 Figure 4 shows the flow of encryption process in a PSK Y-00 cipher system based on QPSK data modulation (M = 4). The inputs are binary data of plain text and seed key. The key length |K| is typically 256 bits. The seed key is extended to the key stream, which is a practically nonrepeated pseudorandom binary sequence (PRBS), using a PRNG. Subsequently, m bits are extracted to determine the phase rotation angle of a symbol. Here, i denotes the identification number of a symbol. An irregular mapper is used to convert the m-bit sequence into a rotation angle θbasis(i). The mapping is designed such that the effect of shot noise on the key stream is random [32], with which the cipher becomes robust against attacks on the seed key. In addition, bitwise exclusive OR (XOR) operation on the data bits and key stream, which is known as overlap selection keying [33], is performed. Subsequently, the data bits are mapped to the QPSK signals, where encoding for each time slot is changed based on the last two bits of the m-bit sequence. The relationship between the data bits and the phase angle of QPSK modulation, [XX] = [θdata(i)], is as follows: [11, 01, 00, 10] = [π/4, 3π/4, 5π/4, 7π/4] for the last two bits of 00; [10, 11, 01, 00] = [π/4, 3π/4, 5π/4, 7π/4] for the last two bits of 01; [00, 10, 11, 01] = [π/4, 3π/4, 5π/4, 7π/4] for the last two bits of 10; [01, 00, 10, 11] = [π/4, 3π/4, 5π/4, 7π/4] for the last two bits of 11. This cyclic shift of gray coding is necessary to hide the data bits by shot noise. Hence, a pair comprising θbasis(i) and θdata(i) is obtained for each time slot. Finally, coherent light is modulated such that the phase angle becomes θbasis(i) + θdata(i). The process described herein is the basic process. Additional randomization techniques to further enhance security, such as deliberate signal randomization and deliberate error randomization, are discussed elsewhere [34].

 figure: Fig. 4.

Fig. 4. Signal processing for the encryption in a PSK Y-00 cipher system based on QPSK data modulation.

Download Full Size | PDF

The summation of θbasis(i) and θdata(i) is achieved in the electrical or optical domain. The simplest approach is to combine the angles in the electrical domain. Subsequently, the phase of the light is modulated using an IQ modulator and a digital-to-analog converter (DAC) with a bit resolution of m + 2 (M = 4) or higher. The bit resolution for the phase randomization m, which is related to the security of the cipher system, is limited by the resolution of the DAC, although the setup is relatively simple. The limitation is strict at high baud rates conventionally used in modern optical transmission systems. For instance, m + 2 must be 12 or less at a baud rate of 10 Gbaud or more, whereas m = 16 is required to achieve sufficient masking by shot noise. Another approach is summation in the optical domain. The QPSK modulation and phase rotation of θbasis(i) are achieved using an IQ modulator and a phase modulator (PM), respectively. This setup will relax the requirement for the bit resolution of the DAC by 2 bits. However, we still need to achieve m = 16. Therefore, a coarse-to-fine phase randomization technique was proposed and demonstrated [17]. The phase rotation angle θbasis(i) was segmented into coarse and fine angles, θbasis_C(i) and θbasis_F(i), and two cascaded PMs were synchronously driven by two DACs. The nominal resolution became twice the bit resolution of a single DAC. We previously demonstrated a 12-Gbaud PSK Y-00 cipher with m = 16 using this technique [24].

A legitimate receiver comprises a seed key, PRNG, and mapper; hence, the θbasis(i) for each time slot is shared. At the receiver side, the phase of the light is inversely rotated by θbasis(i) in a symbol-by-symbol manner for decryption. This process is achieved in the optical or electrical domains. An optical phase modulator is used to perform inverse-phase rotation in the optical domain [15,18]. Meanwhile, an electrical decryption is achieved by multiplying exp(-jθbasis(i)) by the received phase in the digital domain after coherent detection. A self-coherent technique with a one-bit delay interferometer was first employed for decryption [35]. Recently, digital coherent detection with a free-running local oscillator (LO) was employed, where multiplying the inverse phase was incorporated straightforwardly into a standard digital signal processing (DSP) for intradyne coherent detection [24]. In both the optical and electrical approaches, timing synchronization between the received cipher and key stream is necessary. A synchronization protocol can be implemented prior to the start of communication.

3. Systematic design

3.1 Tradeoffs between masking number and transmission reach

Assuming a simple long-haul fiber link in which each constant span loss is fully compensated by an Er-doped fiber amplifier (EDFA), we theoretically investigated the quantum-noise masking number ΓQ and transmission reach in the cipher system. Figure 5 shows the model of the fiber link and power diagram. The link comprises L-km fiber spans and EDFAs, and the loss and gain are repeated regularly. The number of spans is N, and the span loss is equivalent to the amplifier gain G. When the signal power launched into each fiber span is Pin, the OSNR of the output signal OSNRout is calculated as

$${{OSNR}_{\textrm{out}} \approx \frac{{{P_{\textrm{in}}}}}{{N2{n_{\textrm{sp}}}h{\nu _0}\Delta {\nu _{\textrm{noise}}}G}},}$$
where nsp is the spontaneous emission factor or population inversion factor of the EDFA, and Δνnoise is the noise bandwidth of the OSNR [36]. Δνnoise is typically set at 12.5 GHz. Provided that an OSNR required for adequate signal quality is OSNRreq, the achievable maximum number of spans Nmax can be obtained from Eq. (3) as follows:
$${N_{\textrm{max}}} = \left\lfloor {\frac{{{P_{\textrm{in}}}}}{{OSN{R_{\textrm{req}}} \cdot 2{n_{\textrm{sp}}}h{\nu_0}\varDelta {\nu_{\textrm{noise}}}G}}} \right\rfloor$$

 figure: Fig. 5.

Fig. 5. Simple model of optical fiber link.

Download Full Size | PDF

As the number of spans is an integer, the floor function is used. The maximum reach is obtained by multiplying Nmax by L. In the PSK Y-00 cipher system, the signal power and quantum-noise masking number are correlated as shown in Eq. (1). Hence, tradeoffs between the masking number and the maximum number of spans are obtained using Eqs. (1) and (4).

$${N_{\textrm{Y - 00}\_\textrm{max}}} { = \left\lfloor {\frac{{{M^2} \cdot {2^{2m}} \cdot B}}{{2{\pi^2} \cdot OSN{R_{\textrm{req}}} \cdot {n_{\textrm{sp}}}{\eta_\textrm{q}}\varDelta {\nu_{\textrm{noise}}}G}} \cdot \frac{1}{{\mathrm{\Gamma }_\textrm{Q}^{2}}}} \right\rfloor }$$
In this study, Pin = 2PS is used, provided that a polarization multiplexing technique is employed, and that the quantum-noise masking number is defined at the input of the fiber link. This equation indicates the tradeoff between the masking number ΓQ and reach (the maximum number of spans NY-00_max), provided that the cipher specification (M, m, and B) and fiber link setup (OSNRreq, nsp, and G) are fixed. The value of OSNRreq is determined theoretically for an ideal receiver and is measured experimentally for a practical one with imperfect implementation. Thus, Eq. (5) is useful both for estimating theoretical limit of the cipher transmission system and for designing a practical system.

Next, we discuss the theoretical limit of the tradeoff. OSNRreq and Eb/N0, which is a bit energy to the noise power density ratio or SNR per bit, are related as follows [37]:

$${{OSNR}_{\textrm{req}} = {{\left( {\frac{{{E_\textrm{b}}}}{{{N_0}}}} \right)}_{\textrm{req}}}\cdot \frac{{{{\log }_2}M\cdot r{R_\textrm{S}}}}{{\Delta {\nu _{\textrm{noise}}}}}}$$
Here, r and RS are the code rate and signal baud rate, respectively. (Eb/N0)req is determined when the order of the data modulation M and the target bit error ratio (BER), which is set to an FEC threshold, are provided. Hence, using Eqs. (5) and (6), the theoretical limit of the number of spans NY-00_limit is obtained as follows:
$${N_{\textrm{Y - 00}\_\textrm{limit}}} { = \left\lfloor {\frac{{{M^2} \cdot {2^{2m}}}}{{2{\pi^2}{{\left( {\frac{{{E_\textrm{b}}}}{{{N_0}}}} \right)}_{\textrm{req}}}{{\log }_2}M \cdot r{n_{\textrm{sp}}}{\eta_\textrm{q}}G}} \cdot \frac{1}{{\mathrm{\Gamma }_\textrm{Q}^{2}}}} \right\rfloor }$$
Here, B = RS is used as the signal bandwidth B of the heterodyne is equivalent to the baud rate of the signal RS. This theoretical limit of the tradeoff is determined when the cipher specification (M, m, and r) and fiber link setup (nsp, and G) are provided. The tradeoff is independent of the baud rate of the cipher Rs, indicating that the cipher system is scalable to a high baud rate without sacrificing security. We assume here that the nonlinear effects of fiber transmission are negligible. The span-launch optical power increases with the baud rate, and nonlinear effects must be considered to achieve a high baud rate in practice. Similarly, the optical power increases with the order of data modulation M because a high (Eb/N0)req is required, and the nonlinear effects should be taken into account.

3.2 Numerical analysis of long-haul cipher transmission systems

 figure: Fig. 6.

Fig. 6. Theoretical tradeoff between quantum-noise masking number and transmission reach in the transmission system of PSK Y-00 cipher based on QPSK data modulation (M = 4).

Download Full Size | PDF

Using Eq. (7), we numerically investigated the ultra-long haul transmission of the PSK Y-00 cipher. The target reach was set to 10,000 km for a transoceanic submarine cable system. The practical choices of data modulation for such a long reach were BPSK (M = 2) or QPSK (M = 4). We here chose QPSK data modulation because Eq. (7) indicated that the tradeoff was effectively mitigated for the QPSK provided that a bit resolution for the phase randomization m was fixed. Table 1 summarizes the specifications of the cipher and fiber link. Soft decision forward error correction (SD-FEC) with an overhead of 20% (r = 5/6) was employed, and a typical BER threshold of 1.8 × 10−2 was assumed [38]. The fiber link comprised a low-loss pure-silica-core fiber with a loss of 0.154 dB/km [39]. When M = 4, a SNR per bit required to achieve the BER threshold, (Eb/N0)req, is 3.42 dB (see Supplement 1, Section 3 for details). The relation between the quantum-noise masking number ΓQ and transmission reach NY-00_limit × L is calculated by substituting (Eb/N0)req and other parameters shown in Table 1 into Eq. (7). Figure 6 shows the results for various bit resolutions of phase randomization m. The right vertical axis denotes the SER of an eavesdropper PSER_eve, which is calculated using Eq. (2). The masking number on the left axis corresponds to the SER on the right one. Note that the scale of the right axis is irregular to maintain the consistency. When m = 16, a masking number exceeding 650, corresponding to PSER_eve > 0.9987, is achieved in the transmission over 10,000-km fiber. As this tradeoff is independent of the baud rate of the cipher, such secure long-reach transmission is achievable at a high baud of a few tens of gigabaud. Although linear transmission is assumed in this calculation, this theoretical investigation indicates that the tradeoff can be mitigated using phase randomization with a bit resolution m of 16 or higher. Hence, the PSK Y-00 cipher can achieve high-speed ultra-long-haul transmissions with security realized by quantum-noise masking.

Tables Icon

Table 1. Parameters of Numerical Analysis of Ultra-long-haul Cipher Transmission

4. Experiments

4.1 Back-to-back condition

First, experimental demonstrations of the encryption and decryption of the dual-polarization (DP) PSK Y-00 cipher with 218 phase levels (M = 4 and m = 16) are reported. Figure 7 shows the experimental setup. A data stream comprising a PRBS with a length of 223-1 and a pre-shared seed key were placed into a Y-00 mathematical encryption box. The prescribed process detailed in Section 2.3 was performed, and θdata(i) and θbasis(i), which correspond to 2-bit data with randomization and 16 bits for phase randomization, respectively, were obtained for each symbol. They were combined in the optical domain. First, coherent light at 1550.12 nm was modulated with an IQ modulator at 12 Gbaud by the 2-bit data corresponding to θdata(i). Subsequently, two cascaded PMs were synchronously driven for the phase rotation of θbasis(i). The nominal bit resolution of the phase randomization was 16 bits, and a PSK Y-00 cipher with nominal 218 phase levels was generated. Next, polarization-division multiplexing was emulated using a coupler and a polarization beam combiner, and a DP-PSK Y-00 cipher at a line rate of 48 Gbit/s was generated.

 figure: Fig. 7.

Fig. 7. Experimental setup of 48-Gbit/s (line rate) DP PSK Y-00 cipher transmission.

Download Full Size | PDF

In a back-to-back condition, which is shown as (i) in Fig. 7, a variable optical attenuator (VOA) and an EDFA were used to adjust the OSNR at the receiver. Subsequently, the Y-00 cipher was received using a conventional intradyne coherent detection setup. A free-running LO, a polarization-diversity 90° optical hybrid circuit, and balance photodetectors were used. Digitization was achieved using a real-time oscilloscope with a bandwidth of 13 GHz. Finally, offline DSP for polarization demultiplexing, decryption, and carrier phase recovery was performed. The decryption, which is a symbol-by-symbol inverse phase rotation, is a unique process for the cipher. The phase rotation angle θbasis(i) for each symbol was obtained by placing the same seed key into the same encryption box, and exp(−jθbasis(i)) was multiplied by the detected complex amplitude of each symbol of the cipher. Timing synchronization between the transmitter and receiver for decryption was achieved by adding preamble bits in the offline processing.

 Figure 8 shows the constellation diagrams and Q factors in the back-to-back condition. As shown in Fig. 8(a), the phase of the cipher was randomized, and the constellation was donut-shaped. After decryption, QPSK data modulations were recovered for both polarizations, as shown in Fig. 8(b). Figure 8(c) shows the Q factors for various OSNRs at the receiver. A measured reference curve of the noncipher DP QPSK was co-plotted. More than 1.1 million (>220) symbols were processed to measure the BER, and the Q factor was calculated from the BER using the relation Q [dB] = 20 × log10[√2erfc-1(2 × BER)]. An SD-FEC Q-threshold of 6.4 dB was achieved at an OSNR of 7.4 dB for the cipher. The Q-penalty caused by the encryption and decryption, which is the difference between the curves of the cipher and reference at the same OSNR, was approximately 0.3 dB. Although this penalty was sufficiently small, it can be ideally zero in this cipher system.

 figure: Fig. 8.

Fig. 8. Experimental results of encryption and decryption of 48-Gbit/s DP PSK Y-00 cipher: (a) constellation diagram of the cipher, (b) constellation diagram of decrypted QPSK, (c) Q-value characteristics.

Download Full Size | PDF

4.2 Ultra-long-haul transmission

Ultra-long-haul transmissions of the DP-PSK Y-00 cipher were demonstrated using a recirculating loop system shown as (ii) in Fig. 7. The recirculating loop system comprised two acousto–optic modulators and a 50.59 km × 5 standard SMF link with EDFAs. A mode field diameter of SMF was 9.2 μm. The average span loss was 9.6 dB. The signal power launched into each span Pin was adjusted to be consistent with the EDFA and VOA. Chromatic dispersion compensation was additionally implemented in the DSP for a long fiber transmission. Figure 9 shows the Q-factors of the decrypted QPSK signal when the transmission distance was 10,118 km (after 40 loops). The Q-factors were calculated from the measured BER. The span-launch power Pin was changed from −10 to −4 dBm. The maximum Q-factor, which is higher than the Q-threshold of the SD-FEC, was achieved at an input power Pin of −7 dBm. The effect of self-phase modulation limited the maximum input power. The inset constellation diagrams show that the DP QPSK data signals had recovered successfully after the decryption. The black solid curve in Fig. 9 shows the SER of the ideal heterodyne detection of the cipher (218 PSK) by an eavesdropper, PSER_eve. When Pin = −7 dBm, PSER_eve was 0.9965 (ΓQ = 231). This high SER at the highest optical power in the link means that detection without a seed key results in inevitable many errors even if all powers of the cipher are tapped at the input of the fiber link and are detected by an ideal heterodyne receiver without any additive noise.

 figure: Fig. 9.

Fig. 9. Q-factors and SER of ideal heterodyne detection of cipher PSER_eve for various input powers Pin and transmission distance of 10,118 km.

Download Full Size | PDF

For intuitive understanding of high security, we estimate the probability that an eavesdropper correctly detects symbols containing the full information of a seed key. Here we assume that an eavesdropper uses an ideal heterodyne receiver and discriminates symbols straightforwardly. As discussed in Section 2.2, the probability of discriminating l consecutive symbols without errors is (1 − PSER_eve)l. The symbol length in which the full information of a seed key is contained is the length of the seed key divided by the bit resolution of phase randomization, |K|/m. Since m is the denominator, to reduce the success probability by simply increasing m becomes less effective at some point. The value of m = 16 in this experiment is a good point of compromise. By substituting |K|/m = 16 for |K| = 256 bits into l, the probability is estimated to be 3.87 × 10−40, which is small. It is noteworthy that this probability is the higher bound guaranteed from masking by shot noise. If the cipher is tapped at the fiber link after amplification, accumulated amplified spontaneous emission noise from EDFAs will function effectively for signal masking. If only a part of the optical power is tapped, then the masking number increases. These practical factors will significantly reduce the probability in real situations, and high practical security with irreducible security bounds based on shot noise will be achieved.

 Figure 10 shows the Q-factors of the cipher and reference DP QPSK as the transmission distance varied from 3,035 to 10,118 km. The signal input power Pin was set to −10 and −7 dBm. The maximum reach defined by the typical Q-threshold of the SD-FEC (6.4 dB) was 8,094 and 10,118 km for Pin of −10 and −7 dBm, respectively. When Pin was −10 dBm, the SER of the ideal heterodyne detection without a seed key PSER_eve was 0.9975, whereas the reach decreased by approximately 20%. The difference in the Q-factors between the cipher and reference was 0.4 dB on average. The Q-penalty of 0.3 dB caused by encryption and decryption, as discussed in the previous subsection, was dominant. The cipher had a large Q margin when the transmission distance was shorter. This indicates that a higher masking number or a higher PSER_eve is achievable for a shorter transmission distance by appropriately reducing the input power Pin of the cipher. The penalty for the secure transmission is small; hence, ultra-long haul transmissions (e.g., transoceanic distance transmission) with enhanced security at the physical layer can be achieved without significantly sacrificing the signal quality in the coherent PSK Y-00 cipher system.

 figure: Fig. 10.

Fig. 10. Q-factors of cipher and DP-QPSK reference signal for various transmission distances.

Download Full Size | PDF

5. Summary

The system design and experimental demonstrations of a digital coherent PSK Y-00 quantum stream cipher for security-enhanced ultra-long-haul fiber transmission were reported. A theoretical study showed that the tradeoff between transmission performance and security based on signal masking by shot noise was mitigated by increasing the number of phase levels after encryption. It was numerically demonstrated that fiber transmission exceeding 10,000 km with sufficient signal masking for secrecy was achievable provided that the PSK Y-00 cipher based on QPSK data modulation had 218 phase levels. A single-channel 48-Gbit/s DP PSK Y-00 cipher transmission over a 10,118-km standard SMF was experimentally demonstrated. A Q-factor exceeding the threshold of the SD-FEC was achieved at a span-launch optical power of −7 dBm, resulting in a single-channel net data rate of 40 Gbit/s. The PSK Y-00 cipher had 218 phase levels, and the quantum-noise masking number was 231 at the optical power. This number corresponded to an extremely high SER of 0.9965 when an eavesdropper detected all the powers of the cipher at the input of the fiber link using an ideal heterodyne receiver. Hence, transmission performance sufficient for transoceanic-distance fiber transmission and security enhancement at the physical layer were simultaneously achieved in the PSK Y-00 cipher system.

Funding

KDDI Foundation; Japan Society for the Promotion of Science (JP18K04290).

Disclosures

The authors declare no conflicts of interest.

Supplemental document

See Supplement 1 for supporting content.

References

1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,”. in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175, page 8. (1984).

2. D. Bernstein and T. Lange, “Post-quantum cryptography,” Nature 549(7671), 188–194 (2017). [CrossRef]  

3. A. Uchida, “Part Two: Application of Chaotic Lasers to Optical Communication and Information Technology,” in Optical Communication with Chaotic Lasers: Applications of Nonlinear Dynamics and Synchronization, (Wiley-VCH, 2012). [CrossRef]  

4. A. Argyris, D. Syvridis, L. Larger, V. A. Lodi, P. Colet, I. Fischer, J. G. Ojalvo, C. R. Mirasso, L. Pesquera, and K. A. Shore, “Chaos-based communications at high bit rates using commercial fibre-optic links,” Nature 438(7066), 343–346 (2005). [CrossRef]  

5. R. Lavrov, M. Jacquot, and L. Larger, “Nonlocal Nonlinear Electro-Optic Phase Dynamics Demonstrating 10 Gb/s Chaos Communications,” IEEE J. Quantum Electron. 46(10), 1430–1435 (2010). [CrossRef]  

6. H. Yin, X. Chen, H. Yue, N. Zhao, X. Qi, W. Wang, and Q. Zhao, “Experimental realization of long-haul chaotic optical secure communications,” in 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)2015, 2112–2116.

7. J. Ke, L. Yi, Z. Yang, Y. Yang, Q. Zhuge, Y. Chen, and W. Hu, “32 Gb/s chaotic optical communications by deep-learning-based chaos synchronization,” Opt. Lett. 44(23), 5776–5779 (2019). [CrossRef]  

8. Y. Fu, M. Cheng, X. Jiang, Q. Yu, L. Huang, L. Deng, and D. Liu, “High-speed optical secure communication with an external noise source and an internal time-delayed feedback loop,” Photonics Res. 7(11), 1306–1313 (2019). [CrossRef]  

9. T. H. Shake, “Security Performance of Optical CDMA Against Eavesdropping,” J. Lightwave Technol. 23(2), 655–670 (2005). [CrossRef]  

10. S. Etemad, A. Agarwal, T. Banwell, J. Jackel, R. Menendez, and P. Toliver, “OCDM-based photonic layer ‘security’ scalable to 100 Gbits/s for existing WDM networks [Invited],” J. Opt. Netw. 6(7), 948–967 (2007). [CrossRef]  

11. Z. Wang, L. Xu, J. Chang, T. Wang, and P. R. Prucnal, “Secure Optical Transmission in a Point-to-Point Link With Encrypted CDMA Codes,” IEEE Photonics Technol. Lett. 22(19), 1410–1412 (2010). [CrossRef]  

12. T. Kodama, N. Nakagawa, N. Kataoka, N. Wada, G. Cincotti, X. Wang, T. Miyazaki, and K. Kitayama, “Secure 2.5 Gbit/s, 16-Ary OCDM Block-Ciphering With XOR Using a Single Multi-Port En/Decoder,” J. Lightwave Technol. 28(1), 181–187 (2010). [CrossRef]  

13. Z. Gao, B. Dai, X. Wang, N. Kataoka, and N. Wada, “Rapid programmable/code-length-variable, time-domain bit-by-bit code shifting for high-speed secure optical communication,” Opt. Lett. 36(9), 1623–1625 (2011). [CrossRef]  

14. G. Barbosa, E. Corndorf, P. Kumar, and H. P. Yuen, “Secure communication using mesoscopic coherent states,” Phys. Rev. Lett. 90(22), 227901 (2003). [CrossRef]  

15. E. Corndorf, C. Liang, G. S. Kanter, P. Kumar, and H. P. Yuen, “Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks,” Phys. Rev. A 71(6), 062326 (2005). [CrossRef]  

16. O. Hirota, M. Sohma, M. Fuse, and K. Kato, “Quantum stream cipher by Yuen 2000 protocol: Design and experiment by intensity modulation Scheme,” Phys. Rev. A 72(2), 022335 (2005). [CrossRef]  

17. K. Tanizawa and F. Futami, “Digital coherent PSK Y-00 quantum stream cipher with 217 randomized phase levels,” Opt. Express 27(2), 1071–1079 (2019). [CrossRef]  

18. C. Liang, G. S. Kanter, E. Corndorf, and P. Kumar, “Quantum Noise Protected Data Encryption in a WDM Network,” IEEE Photon. Technol. Lett. 17(7), 1573–1575 (2005). [CrossRef]  

19. F. Futami, K. Tanizawa, and K. Kato, “Y-00 Quantum-Noise Randomized Stream Cipher Using Intensity Modulation Signals for Physical Layer Security of Optical Communications,” J. Lightwave Technol. 38(10), 2774–2781 (2020). [CrossRef]  

20. G. S. Kanter, D. Reilly, and N. Smith, “Practical physical-layer encryption: The marriage of optical noise with traditional cryptography,” IEEE Commun. Mag. 47(11), 74–81 (2009). [CrossRef]  

21. W. Mao, G. Gao, C. Xu, H. Liu, Y. Shen, J. Zhang, and Y. Guo, “Long Distance IM/DD Transmission with OFDM-QAM based Quantum Noise Stream Cipher,” in 18th International Conference on Optical Communications and Networks (ICOCN)2019, paper P4.9.

22. Y. Doi, S. Akutsu, M. Honda, K. Harasawa, O. Hirota, S. Kawanishi, O. Kenichi, and K. Yamashita, “360 km field transmission of 10 Gbit/s stream cipher by quantum noise for optical network,” in Proc. Opt. Fiber Comm. Conf. (OFC)2010, paper OWC4.

23. M. Yoshida, T. Hirooka, K. Kasai, and M. Nakazawa, “Single-channel 40 Gbit/s digital coherent QAM quantum noise stream cipher transmission over 480 km,” Opt. Express 24(1), 652–661 (2016). [CrossRef]  

24. K. Tanizawa and F. Futami, “Single-channel 48-Gbit/s DP PSK Y-00 quantum stream cipher transmission over 400- and 800-km SSMF,” Opt. Express 27(18), 25357–25363 (2019). [CrossRef]  

25. M. Yoshida, T. Kan, K. Kasai, T. Hirooka, and M. Nakazawa, “10 Tbit/s QAM Quantum Noise Stream Cipher Coherent Transmission over 160 km,” in Optical Fiber Communications Conference and Exhibition (OFC)2020, paper T3D.2.

26. Q. Yu, Y. Wang, D. Li, H. Song, Y. Fu, X. Jiang, L. Huang, M. Cheng, D. Liu, and L. Deng, “Secure 100 Gb/s IMDD Transmission Over 100 km SSMF Enabled by Quantum Noise Stream Cipher and Sparse RLS-Volterra Equalizer,” IEEE Access 8, 63585–63594 (2020). [CrossRef]  

27. X. Chen, K. Tanizawa, P. Winzer, P. Dong, J. Cho, F. Futami, K. Kato, A. Melikyan, and K. W. Kim, “Experimental Demonstration of 4,294,967,296-QAM Based Y-00 Quantum Stream Cipher Template Carrying 160-Gb/s 16-QAM Signals,” Opt. Express 29(4), 5658–5664 (2021). [CrossRef]  

28. F. Futami and O. Hirota, “100 Gbit/s (10 × 10 Gbit/s) Y-00 cipher transmission over 120 km for secure optical fiber communication between data centers,” OptoElectronics and Communication Conference and Australian Conference on Optical Fibre Technology (OECC/ACOFT)2014, paper MO1A2.

29. F. Futami, K. Guan, J. Gripp, K. Kato, K. Tanizawa, C. Sethumadhavan, and P. J. Winzer, “Y-00 quantum stream cipher overlay in a coherent 256-Gbit/s polarization multiplexed 16-QAM WDM system,” Opt. Express 25(26), 33338–33349 (2017). [CrossRef]  

30. K. Tanizawa and F. Futami, “Security-Enhanced 10,118-km Single-Channel 40-Gbit/s Transmission Using PSK Y-00 Quantum Stream Cipher,” 46th European Conference on Optical Communications (ECOC2020), paper We1E.4.

31. O. Hirota, “Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol,” Phys. Rev. A 76(3), 032307 (2007). [CrossRef]  

32. T. Shimizu, O. Hirota, and Y. Nagasako, “Running key mapping in quantum stream cipher by Yuen 2000 protocol,” Phys. Rev. A 77(3), 034305 (2008). [CrossRef]  

33. O. Hirota, T. S. Usuda, and M. Fuse, “Quantum stream cipher Part III: design of keyed randomization and experiment,” Proc. SPIE 5893, 589304 (2005). [CrossRef]  

34. K. Kato and O. Hirota, “Quantum stream cipher Part IV: Effects of the deliberate signal randomization and the deliberate error randomization,” Proc. SPIE 6305, 630508 (2006). [CrossRef]  

35. G. S. Kanter, S. X. Wang, R. A. Lipa, and D. Reilly, “Self-Coherent Differential Phase Detection for Optical Physical-Layer Secure Communications,” in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference 2013, OSA Technical Digest (online) (Optical Society of America, 2013), paper JW2A.41.

36. I. P. Kaminow, T. Li, and A. E. Willner, Optical Fiber Telecommunications V B: Systems and Networks, (Elsevier, 2008).

37. L. Schmalen, S. T. Brink, and A. Leven, “Advances in Detection and Error Correction for Coherent Optical Communications: Regular, Irregular, and Spatially Coupled LDPC Code Designs,” in Enabbling Technologies for High Spectral-Efficiency Coherent Optical Communication Networks, (Wiley, 2016).

38. T. Mizuochi, Y. Miyata, K. Kubo, T. Sugihara, K. Onohara, and H. Yoshida, “Progress in Soft-Decision FEC,” in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference (OFC/NFOEC)2011, paper NWC2.

39. Y. Kawaguchi, Y. Tamura, T. Haruna, Y. Yamamoto, and M. Hirano, “Ultra Low-loss Pure Silica Core Fiber,” SEI Tech. Rev. 80, 50–55 (2015).

Supplementary Material (1)

NameDescription
Supplement 1       Details of the derivation of formula

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (10)

Fig. 1.
Fig. 1. Transmission distances and single-channel line rates in previous experimental demonstrations of secure fiber-optic transmission with PLE.
Fig. 2.
Fig. 2. Operating principle of PSK Y-00 cipher based on QPSK data modulation: (a) phase rotation of symbol for encryption and (b) constellation diagram after encryption.
Fig. 3.
Fig. 3. SER of detection of PSK Y-00 cipher at line rate per polarization of 24 Gbit/s (M = 4 and B = 12 GHz) without seed key for various optical powers.
Fig. 4.
Fig. 4. Signal processing for the encryption in a PSK Y-00 cipher system based on QPSK data modulation.
Fig. 5.
Fig. 5. Simple model of optical fiber link.
Fig. 6.
Fig. 6. Theoretical tradeoff between quantum-noise masking number and transmission reach in the transmission system of PSK Y-00 cipher based on QPSK data modulation (M = 4).
Fig. 7.
Fig. 7. Experimental setup of 48-Gbit/s (line rate) DP PSK Y-00 cipher transmission.
Fig. 8.
Fig. 8. Experimental results of encryption and decryption of 48-Gbit/s DP PSK Y-00 cipher: (a) constellation diagram of the cipher, (b) constellation diagram of decrypted QPSK, (c) Q-value characteristics.
Fig. 9.
Fig. 9. Q-factors and SER of ideal heterodyne detection of cipher PSER_eve for various input powers Pin and transmission distance of 10,118 km.
Fig. 10.
Fig. 10. Q-factors of cipher and DP-QPSK reference signal for various transmission distances.

Tables (1)

Tables Icon

Table 1. Parameters of Numerical Analysis of Ultra-long-haul Cipher Transmission

Equations (7)

Equations on this page are rendered with MathJax. Learn more.

Γ Q = Δ ϕ shot Δ θ basis = M 2 m 2 π 2 h ν 0 B η q P S ,
P SER _ eve = e r f c ( 1 2 Γ Q )
O S N R out P in N 2 n sp h ν 0 Δ ν noise G ,
N max = P in O S N R req 2 n sp h ν 0 Δ ν noise G
N Y - 00 _ max = M 2 2 2 m B 2 π 2 O S N R req n sp η q Δ ν noise G 1 Γ Q 2
O S N R req = ( E b N 0 ) req log 2 M r R S Δ ν noise
N Y - 00 _ limit = M 2 2 2 m 2 π 2 ( E b N 0 ) req log 2 M r n sp η q G 1 Γ Q 2
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.