Chaos-synchronization of semiconductor laser systems in an open-loop configuration: the short cavity regime and its potential for secure communication systems

Author(s):  
M. Peil ◽  
T. Heil ◽  
L. Fischer ◽  
W. Elsafler ◽  
J.M. Buldu
Author(s):  
Imran Khan ◽  
Dominique Elser ◽  
Thomas Dirmeier ◽  
Christoph Marquardt ◽  
Gerd Leuchs

Quantum communication offers long-term security especially, but not only, relevant to government and industrial users. It is worth noting that, for the first time in the history of cryptographic encoding, we are currently in the situation that secure communication can be based on the fundamental laws of physics (information theoretical security) rather than on algorithmic security relying on the complexity of algorithms, which is periodically endangered as standard computer technology advances. On a fundamental level, the security of quantum key distribution (QKD) relies on the non-orthogonality of the quantum states used. So even coherent states are well suited for this task, the quantum states that largely describe the light generated by laser systems. Depending on whether one uses detectors resolving single or multiple photon states or detectors measuring the field quadratures, one speaks of, respectively, a discrete- or a continuous-variable description. Continuous-variable QKD with coherent states uses a technology that is very similar to the one employed in classical coherent communication systems, the backbone of today’s Internet connections. Here, we review recent developments in this field in two connected regimes: (i) improving QKD equipment by implementing front-end telecom devices and (ii) research into satellite QKD for bridging long distances by building upon existing optical satellite links. This article is part of the themed issue ‘Quantum technology for the 21st century’.


2020 ◽  
Vol 47 (10) ◽  
pp. 1001003
Author(s):  
孙宇川 Sun Yuchuan ◽  
毛晓鑫 Mao Xiaoxin ◽  
王安帮 Wang Anbang

2013 ◽  
Vol 2013 ◽  
pp. 1-14 ◽  
Author(s):  
Cheng-Hsiung Yang

A new symplectic chaos synchronization of chaotic systems with uncertain chaotic parameters is studied. The traditional chaos synchronizations are special cases of the symplectic chaos synchronization. A sufficient condition is given for the asymptotical stability of the null solution of error dynamics and a parameter difference. The symplectic chaos synchronization with uncertain chaotic parameters may be applied to the design of secure communication systems. Finally, numerical results are studied for symplectic chaos synchronized from two identical Lorenz-Stenflo systems in three different cases.


2013 ◽  
Vol 462-463 ◽  
pp. 706-711
Author(s):  
Guo Hua Li

Analyzing the problem of the existed chaotic masking secure communication, given a new chaotic communication method with the separation between chaos synchronization control signal and chaos modulated signal. A chaotic pilot signal is used independently to synchronize the chaos of the communication transceiver, it is a better solution for the original chaotic communication systems in which the information signal is much smaller than the chaotic modulation signal and anti-noise performance is poor. The circuit simulation based on Sprott system I was built to verify the new method of chaotic communication. Simulation results show that it is more flexible to achieve synchronization between communication terminals, more accurate for chaos synchronization, high performance of anti-noise, and the strength of the information signal is no affected by the chaotic signal.


Author(s):  
W. Kinzel ◽  
A. Englert ◽  
I. Kanter

Chaos synchronization, in particular isochronal synchronization of two chaotic trajectories to each other, may be used to build a means of secure communication over a public channel. In this paper, we give an overview of coupling schemes of Bernoulli units deduced from chaotic laser systems, different ways to transmit information by chaos synchronization and the advantage of bidirectional over unidirectional coupling with respect to secure communication. We present the protocol for using dynamical private commutative filters for tap-proof transmission of information that maps the task of a passive attacker to the class of non-deterministic polynomial time-complete problems.


Optik ◽  
2016 ◽  
Vol 127 (22) ◽  
pp. 10930-10947 ◽  
Author(s):  
Thang Manh Hoang ◽  
Sanjay K. Palit ◽  
Sayan Mukherjee ◽  
Santo Banerjee

Sign in / Sign up

Export Citation Format

Share Document