TY - JOUR
T1 - Secure key generation using an ultra-long fiber laser
T2 - Transient analysis and experiment
AU - Zadok, Avi
AU - Scheuer, Jacob
AU - Sendowski, Jacob
AU - Yariv, Amnon
PY - 2008/10/13
Y1 - 2008/10/13
N2 - The secure distribution of a secret key is the weakest point of shared-key encryption protocols. While quantum key distribution schemes could theoretically provide unconditional security, their practical implementation remains technologically challenging. Here we provide an extended analysis and present an experimental support of a concept for a classical key generation system, based on establishing laser oscillation between two parties, which is realized using standard fiber-optic components. In our Ultra-long Fiber Laser (UFL) system, each user places a randomly chosen, spectrally selective mirror at his/her end of a fiber laser, with the two-mirror choice representing a key bit. We demonstrate the ability of each user to extract the mirror choice of the other using a simple analysis of the UFL signal, while an adversary can only reconstruct a small fraction of the key. The simplicity of this system renders it a promising alternative for practical key distribution in the optical domain.
AB - The secure distribution of a secret key is the weakest point of shared-key encryption protocols. While quantum key distribution schemes could theoretically provide unconditional security, their practical implementation remains technologically challenging. Here we provide an extended analysis and present an experimental support of a concept for a classical key generation system, based on establishing laser oscillation between two parties, which is realized using standard fiber-optic components. In our Ultra-long Fiber Laser (UFL) system, each user places a randomly chosen, spectrally selective mirror at his/her end of a fiber laser, with the two-mirror choice representing a key bit. We demonstrate the ability of each user to extract the mirror choice of the other using a simple analysis of the UFL signal, while an adversary can only reconstruct a small fraction of the key. The simplicity of this system renders it a promising alternative for practical key distribution in the optical domain.
UR - http://www.scopus.com/inward/record.url?scp=54249146882&partnerID=8YFLogxK
U2 - 10.1364/OE.16.016680
DO - 10.1364/OE.16.016680
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
C2 - 18852776
AN - SCOPUS:54249146882
SN - 1094-4087
VL - 16
SP - 16680
EP - 16690
JO - Optics Express
JF - Optics Express
IS - 21
ER -