Author
Djordjevic, Ivan B.Affiliation
ECE Dept., College of Engineering, University of ArizonaIssue Date
2021-01-22Keywords
Atmospheric modelingCoherence time
Computational security
Encryption
Information theoretic security
Laser beams
Physical-layer security
Post-quantum cryptography
Protocols
Quantum key distribution (QKD)
Relays
Telescopes
Metadata
Show full item recordCitation
Djordjevic, I. B. (2021). Atmospheric Turbulence-Controlled Cryptosystems. IEEE Photonics Journal, 13(1), 1-9.Journal
IEEE Photonics JournalRights
© The Author(s). This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.Collection Information
This item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at repository@u.library.arizona.edu.Abstract
To overcome the limitations of QKD, post-quantum cryptography, and computational security-based cryptography protocols in this paper, an atmospheric turbulence-controlled cryptosystem is proposed. The proposed encryption scheme employs the traditional scheme to utilize the atmospheric turbulence as the common source of randomness only in the initialization stage to determine the common parameters to be used in the proposed encryption scheme. To overcome low secret-key rates of traditional scheme, dictated by the long coherence time Tc of turbulence channel, the proposed encryption scheme updates the parameters of gamma-gamma distribution, used to generate irradiance samples for cumulative distribution function-based determination of the key, every Tc seconds and as such the final key is shaped by the atmospheric turbulence channel. We also describe a scheme that randomly selects one of several available paths in which the simultaneously measured irradiance samples, after interleaving, are used to generate the raw key. The secret-key rates of the proposed schemes are orders of magnitude higher compared to corresponding traditional QKD and source type physical-layer security schemes and are comparable with the state-of-the-art optical communication data rates.Note
Open access journalISSN
1943-0655EISSN
1943-0647Version
Final published versionSponsors
NSFae974a485f413a2113503eed53cd6c53
10.1109/jphot.2021.3053860
Scopus Count
Collections
Except where otherwise noted, this item's license is described as © The Author(s). This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.