Security in Advanced Optical Communication Networks

The increased demand of data services within the last few years has prompted a commensurate explosion in transportable bandwidth, most of which contain sensitive information, personal data, bank accounts, credit card numbers, proprietary documents, and more. As a result, there are two types of security in communications, securing user data and securing the physical network. The first is addressed with encryption algorithms, the unbreakability of which does not depends so much on the sophistication of the algorithm but on the difficulty to break it using a sequential computer; that is, it capitalizes on the inability of the attacker to use a fast supercomputer. The second is not a well addressed topic, particularly in modern fiber-optic networks. One attempt to create an unbreakable cipher-text is quantum cryptography that emanated from quantum mechanics; this method capitalizes on the no-cloning principle of particular characteristics of photons, such as polarization. In this paper, we examine the security of advanced optical networks, fiber-optic and free space optical (FSO). We describe quantum cryptography and the quantum key distribution, including the principle of teleportation, we identify vulnerabilities and we discuss detection mechanisms and countermeasure strategies against attacks on the physical network.

[1]  J. Bell On the Einstein-Podolsky-Rosen paradox , 1964 .

[2]  Gilles Brassard,et al.  Practical Quantum Oblivious Transfer , 1991, CRYPTO.

[3]  Ian Stewart,et al.  Schrödinger's catflap , 1991, Nature.

[4]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[5]  C. Crépeau Cryptographic Primitives And Quantum Theory , 1992, Workshop on Physics and Computation.

[6]  Charles H. Bennett,et al.  Quantum cryptography: uncertainty in the service of privacy. , 1992, Science.

[7]  C. Crépeau,et al.  A quantum bit commitment scheme provably unbreakable by both parties , 1993, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science.

[8]  N. Gisin,et al.  Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre over More than 1 km , 1993 .

[9]  J. Franson,et al.  Quantum Cryptography Using Polarization Feedback , 1994 .

[10]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[11]  R. Mcweeny On the Einstein-Podolsky-Rosen Paradox , 2000 .

[12]  Stamatios V. Kartalopoulos,et al.  DWDM: Networks, Devices, and Technology , 2002 .

[13]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[14]  Stamatios V. Kartalopoulos Channel Protection with Real-Time and In-Service Performance Monitoring for Next Generation Secure WDM Networks , 2007, 2007 IEEE International Conference on Communications.

[15]  Stamatios V. Kartalopoulos Quantum Cryptography For Secure Optical Networks , 2007, 2007 IEEE International Conference on Communications.