Channel Estimation Experiment for Physical Layer Cryptography in Free-space Optical Communication
M. Fujiwara,H. Takenaka,H. Endo,M. Sasaki,Toshiyuki Itoh,M. Takeoka,M. Toyoshima,O. Tsuzuki,R. Shimizu,M. Kitamura
Abstract:Recently, information networks are one of the important infrastructure for our lives as IT technology develops and spreads rapidly, and we receive many benefits from them. On the other hand, it is indispensable to protect confidential information by use of encryption techniques because cases of transmission of highly confidential information are increasing such as in online shopping or electronic application to public organizations. The security of present networks is protected by socalled “modern cryptography” such as symmetric key cryptography that ensures confidentiality of messages or public key cryptography for key establishment and authentication. The algorithms of modern cryptography are open to public, so it can be implemented regardless of physical media such as cables or radio waves. Moreover, the security of modern cryptography is based on mathematics related to the present technological level. For example, as for public key cryptography, the basis of the security is the difficulty in solving certain mathematical problem in a realistic timeline using computers, such as prime decomposition of a large composite number. It is relatively easy to ensure security by such a large amount of calculation. However, the security is threatened by the emergence of efficient decryption algorithms or quantum computers. In order to cope with such kind of threats, countermeasures such as extension of the key size or utilizing mathematical problems that are hard to solve even for quantum computers have been developed year by year. Because of the features listed above, the present cipher is implemented in various devices and systems, that is a technology to support the base of our present society. On the other hand, an authority of information theory, Wyner, proposes a cipher technique that is based on a quite different paradigm from the present cipher. The wiretap channel encoding [1][2] he proposed not only corrects errors that occur during the communication process but also realizes confidential communication without sharing a key in advance by utilizing noise occurring at an eavesdropper. In addition, security against an eavesdropper with any computational ability, that is, information theoretical security [3], is verified basing on the unpredictability of the physical phenomenon of noise. Since then, Maurer [4] and Ahlswede [5] independently proposed secret key agreement that is method of key sharing utilizing physical noise by applying the ideas of Wyner. These techniques are deemed to operate at the most bottom physical layer, although the present cipher is operated at a higher-level layer in the OSI model. Therefore, wiretap channel encoding and secret key agreement are called physical layer cryptography. It is astonishing that wiretap channel encoding [1] proposed by Wyner was already published one year before DH key sharing [6] which is a prototype of public key cryptography. However, these methods require estimating the information leaked against the eavesdropper in designing the encoding, which deteriorates convenience much compared with modern cryptography that guarantees its security by the computational cost. Hence, these encoding methods were not established as mainstream techniques to be used with current networks. However, they are valuable from the viewpoint of ensuring information security in 3-3 Channel Estimation Experiment for Physical Layer Cryptography in Free-space Optical Communication
Physics,Engineering,Computer Science