We propose the new secure key management scheme for SDH-based WDM AON. The problem that is to have no overhead data for security service on SDH format may be overcome easily by using the proposed key management scheme. The major advantages of the proposed architecture are that the end-to-end security service can be offered and the key management of a cryptosystem can be implemented easily. The proposed secure SDH-based WDM AON architecture have the property of tapping resistance : the key management channel can monitor any tapping attack using the cutoff wavelength of the fiber ; the encryption function of the optical cryptosystems can prevent eavesdroppers from understanding information by tapping. In addition, the proposed architecture can ensure that synchronization of key stream sequence between the optical cryptosystems is maintained perfectly and security management for APS can be performed easily. The proposed architecture can be applicable to the secure node system.
In this paper, we propose a new optical threshold generator as a key-stream generator for stream cipher systems. To implement the threshold generator optically, we use conventional twisted nematic type SLMs. This proposed system is based on the shadow casting technique for the AND operation between taps and register stages. It is also based on the proposed PMRS method for modular 2 addition. The proposed PMRS method uses the property of light's polarization on liquid crystal device (LCD) and can be implemented optically using one LCD and some mirrors. One of the major advantages of the proposed system is that there is no limitation of the number of the programmable tapping points. Therefore, this system can be used for high-security applications. Also, the proposed system can be applied for the 2D encryption system which processes large amounts of data such as 2D images. We verify the proposed system with some simulations.
We propose a new data protection method for the security system which controls the entrance of authorized persons. The basic idea is that the input image is encrypted by performing optical exclusive-OR (XOR) operations with the key bit stream that are generated by digital encryption algorithms. The gray level input image is converted to eight bit planes which are represented on a liquid crystal device (LCD). The key data represented on different LCD is reproduced to eight bit planes by lenslet arrays. The optical XOR operations between the key data and the bit planes are performed by polarization encoding method. The results of XOR operations which are detected by a CCD camera are converted to the encrypted gray level image and the image is used a an input to the joint transform correlator for comparison with reference images. We present some simulation results that verify this proposed method.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.