Keywords

1 Introduction

Nowadays communication networks support all crucial human activities from personal communications to financial transactions, massive data management, industrial processes, energy infrastructures, health/medical data exchange, transport, etc. Military communications is another highly demanding area in terms of security. Although a lot of attention has been given to the performance of the networks, such as bandwidth and latency, security aspects become more and more crucial for obvious reasons. Since the communication systems and networks, especially those based on fiber-optic media, were not designed from the ground up taking security aspects into account, the current solutions are mainly applied at the upper network layers rather than employing a holistic new approach. Particularly in the physical layer of the networks insufficient progress in security has been made. Facing the potential threats at the lower network levels, will significantly impact the security aspects at the higher layers as well.

There are different types of threats related to the physical layer of the optical network. A first group of threats are those related to availability, targeting at performance degradation or even complete interruption of the network operation. Fiber infrastructure disasters, unintentional (e.g. natural disaster related) or intentional (malicious human actions aiming at interruption of communication links or injection jamming signals) are among the physical layer threats to be considered [1]. Electromagnetic pulse (EMP) attack is also another possible threat. Although the communication channel (optical fiber) will not be affected by EMP, all electronic/optoelectronic components related to the network operation will be damaged or malfunction depending on the strength of the electromagnetic field.

Another potential threat is related to the confidentiality, targeting at accessing data by unauthorized users for eavesdropping or even traffic monitoring/analysis. Although optical fiber is considered safer compared to wireless channels, possible means that could be used by an eavesdropper is optical fiber tapping or information extraction based on adjacent channel interference/crosstalk. Encryption and coding [2] are means for ensuring confidentiality in an optical network. Encryption is either at the optical or electronic level and it requires cryptographic key distribution/sharing between transmitter and receiver. In general, an XOR operation between the key and the data is the means for encrypting the data with the cryptographic key. There are different methods to implement optical XOR gates such as Four Wave Mixing in a SOA, cross gain modulation, cross phase modulation, etc. In the electrical domain, the most commonly used means of encryption rely on AES ciphers. These symmetrical encryption schemes are based on substitution-permutation networks and have several efficient software and hardware implementations [3]. Concerning coding, optical CDMA [4] is the most common approach, following the principles of the corresponding method used in the wireless systems. Alternative solutions based on chaos encrypted communications have been also proposed and demonstrated [5].

Key generation is based on specific software implementations or employing different types of random processes. Software based implementations rely on pseudorandom number generators whereas those obtained by statistically random physical phenomena such as thermal noise, photoelectric effect, amplified spontaneous emission [6] or other quantum phenomena are true random number sequences. Concerning key distribution, quantum technologies appear to provide the ultimate security [6,7,8,9], either in the form of DV-QKD or CV-QKD, exploiting the particle or the wavelength nature of light respectively. However, although QKD may provide an effective way to achieve unconditional security, a number of successful hacking on commercial QKD has been reported [10] as well as deficiencies in the theory behind the specific implementations [11, 12]. At the same time, Britain’s National Cyber Security Centre disclosed a document in 2016 about security risks of QKD and its inefficient cost performance, and possible future threats being yet unknown [13].

In this paper we present two different approaches targeting at the physical layer encryption. The first demonstrates a photonic implementation of the “One-Time Pad” encryption scheme based on mutually injected semiconductor lasers, operating in the chaotic regime and continuously generating synchronized ultrafast true random number sequences. These sequences are then used for encryption of the data to be transmitted [14]. The second is based on a cryptographic key generation using a novel Photonic Physical Unclonable Function device. These keys are used for scrambling the modulation parameters of transceivers included in the communication system.

2 One-Time-Pad Data Encryption Using Synchronized True Random Sequences

2.1 One-Time-Pad Encryption System

The proposed One-Time-Pad encryption system capable to operate at Gb/s rates is based on synchronized broadband chaotic analog signals that are the seed for ultrafast TRBS generation. Each user’s transceiver has access to this locally generated TRBS that is synchronized with the TRBSs generated by other users, through a background fiber network that supports broadband chaotic signal generation and synchrony. User #1 encodes the data that wishes to send with the appropriate FEC convolutional code and applies a XOR operation with the locally generated TRBS (Fig. 1). The encrypted data follows the desired transmission path in the network to reach the legitimate recipient (user #2), where the decoding process takes place. User’s #2 locally generated TRBS participates also to a XOR operation in order to provide the initially encoded data to the decoder and obtain finally the initial data. Contrariwise, the opposite communication from user #2 to user #1 is supported using the same methodology and the same TRBS generators. Convolutional coding in forward error correction (FEC) methods is included to minimize or eliminate synchronization error between analog chaotic signals that results in errors in TRBSs’ synchrony.

Fig. 1.
figure 1

One-time-pad bi-directional encryption system using synchronized ultrafast TRBS generators and FEC methods for error-free secure communications.

2.2 Optical System for the Chaos Synchronization

Each user participates in the optical network configuration with the appropriate hardware equipment; its specifications and properties can guarantee broadband chaotic signal emission, which can be potentially converted to a TRBS under a pre-determined methodology. At the same time, through the appropriate network bi-directional topology, it can guarantee very high level of chaotic signal synchronization. In the mutual optical injection topology of Fig. 2, users hold at their premises identical DFB semiconductor lasers (SLs) and photodetectors. (PDs). The SLs are interactively coupled with an identical DFB SL hub at the other edge of the network, through polarization control, optical routing and amplification. Its location can be at km distance as demonstrated by the inclusion of a 3.5 km fiber transmission spool. The SL hub offers a drive force for mutual injection and operation of the users’ SLs at the coherence collapse regime. Although the process is polarization sensitive using a polarization scrambler or polarization tracker could be a possible solution to the polarization problem.

Fig. 2.
figure 2

Optical system of mutually injected semiconductor DFB lasers for broadband and synchronized chaotic signal emission. POL: polarization controller, 1 × 2 and 1 × N: optical coupler with 2 or N equal splitting ratio inputs, ISO: optical isolator, PD: 10 GHz photoreceiver, EDFA: 25 dB-gain erbium-doped fiber amplifier, OF: optical filter with FWHM = 0.36 nm, ATT: optical attenuator, PM: inline power monitor, TRBG: true random bit generator. Black line connections are fiber-optic links; red line connections are high-frequency electrical links. (Color figure online)

2.3 True Random Bit Generation

At the next level, the synchronized photo-detected signals at each user’s premises are converted from their analog form to binary sequences in order to support one-time-pad encryption. The emerging digital sequences shall meet the criteria of randomness in order to play the role of encryption random key generators. Each measured sample is digitized under a single-bit or a multi-bit methodology via analog-to-digital (A/D) conversion. In order to obtain identical true random sequences from all users participating in the network tow conditions are required: (i) the chaotic analog signals emitted by the different users shall preserve high-quality synchronization, and (ii) these analog signals shall lead after digitization verified TRBSs. These prerequisites imply identical steps and parameterization of the post-processing procedures, as well as identical hardware modules used by all users.

2.4 One-Time-Pad Performance

Each legitimate user that coupled to the optical network, fulfilling some predetermined conditions, can generate the synchronized and random key sequences. The level of synchrony error of the users’ analog signals attained at the optical layer is translated as an error rate of the generated digital keys. The larger the cross-correlation value between the two analog signals is, the smaller the error rate between the two TRBSs will be. As it can be seen from Fig. 3, for sufficiently low error rate between the keys generated by the two users, extremely high-quality synchronization is needed. For example, and assuming FEC (1/2), the required cross correlation between the chaotic signals is in the order of 0.999. This is exactly the key point for the security of the proposed system. If an eavesdropper attempts to intervene and tap even a minor fraction of the chaotic signal shared between the legitimate users, the synchronization quality will immediately degrade and the communication between the two users will collapse.

Fig. 3.
figure 3

Error rate for the key generation vs. cross-correlation between the chaotic signals of the two users.

3 Photonic PUFs as Physical Root of Trust for OFDM-Based Optical Communication Systems

PUFs have been recently proposed as a physical root of trust that uniquely combines key storage and generation procedures. Thus, the CIA triad of security objectives (Confidentiality, Integrity, and Authentication) can be achieved by exploiting cryptographic primitives that are hardened by properties of the actual physical world. Essentially, a PUF is the physical analogue of a one-way mathematical function, based on an unclonable, non-reproducible and complex physical mechanism. Combined with their deterministic operation, PUFs are appropriate for cryptographic key generation on demand, eliminating the need for key storage (no key-at-rest property) in secure Non-Volatile Memory modules (NVM). In this way, keys cannot be found by an attacker who has accessed the device and compromised all the memory contents. Additionally, in this way, it is possible to provision keys for devices that are rapidly scaling in numbers, year after year. The basic concept behind PUFs has been materialized in various different implementations with the main differentiation being between optical/photonic PUFs as introduced in [16]. and silicon-based PUFs as introduced in [17]. The idea behind PUFs is to use unavoidable, implicit defects present in the manufacturing process of a hardware token in order to make a digital ‘fingerprint’ of the token. In general, when an extrinsic excitation (Challenge) is presented to a PUF, a corresponding output (Response) is generated. This response is determined by a complex physical function that is unique to each token or PUF instance, as shown in Fig. 4. Using the same challenge, different PUFs produce a different response. The combination of the challenge and its corresponding response lead to the creation of unique challenge–response pairs (CRPs). The uniqueness of the responses of different PUFs under the same challenge (unclonability) and the uniqueness of the responses of the same PUF under different challenge (unpredictability) have made PUFs useful for a wide variety of applications, spanning from authentication and secret key storage [17, 18], cryptographic key generation [19], software–hardware interconnection [20], and tamper detection [21] to shielding systems against code-reuse attacks [12] and cyber-hardening blockchain applications [23]. So far, the spotlight of attention has been mainly focused on silicon-cast PUFs, whose principle of operation is based on exploiting uncontrollable variations in operational parameters [17, 24]. Existing implementations include ring-oscillators [17, 25], arbiter PUFs [26], static random-access memory (SRAM) PUFs [27] to mention a few. Despite their merits in terms of integration, unclonability, and robustness, the underlying physical scrambling mechanism, in most cases, is rather simplistic, resulting to enhanced vulnerability to modelling attacks [28, 29]. The arsenal of adversaries is enhanced through various side-channel attacks [30, 31]. Emerging PUF implementations based on nanofabrication procedures [32], hold great promise, but current results are focused on providing proof of concept and do not evaluate their cryptographic performance.

Fig. 4.
figure 4

Representation of the typical PUF properties. (a) Unclonability: same challenges but different PUFs provide different responses, (b) Unpredictability: different challenges to the same PUF provide different response, (c) Robustness: time-invariant operation

Photonic PUF implementations are based on the combination of the coherent interaction of a laser beam with the randomness of a disordered physical medium (Fig. 5). The medium could be a material containing randomly positioned micro-structures that act as scatterers [16], or an optical fiber [34, 35]. A laser source illuminates a transparent, inhomogeneous medium (PUF’s token), the goal being to produce unique interference patterns (speckle) which are subsequently captured as images (responses). The recorded images undergo a post-processing procedure, via hashing algorithms, and every hashed response is mapped to a unique bit-string output. In this way unique Challenge-Response Pairs are acquired. While the physical characteristics of the PUF token, that enable the extraction of the unique responses, are permanent in nature, the information extraction from PUFs (and other noisy sources, like biometrics) is a probabilistic procedure; on a single challenge, a different response may be produced, due to the uncontrollable and random evaluation noise. In order to ensure robust operation under the effect of noise, the mapping of each image to a unique bit-string and its recovery is achieved through fuzzy extractor algorithms [36].

Fig. 5.
figure 5

Conceptual representation of a p-PUF

The fuzzy extractor scheme comprises two phases: the enrolment and the verification phase. The former corresponds to the first time that a challenge is applied whereby the output string is generated along with a set of public helper data, while the latter represents the noisy rerun of the measurement during which the same result is recreated by using the helper data produced in the enrolment phase. A simple schematic of the described procedure is depicted in Fig. 6.

Fig. 6.
figure 6

Fuzzy extraction: enrolment and reconstruction phase for the generation of PUF keys. x represents a challenge; y is the initial PUF response for challenge x during enrolment and y′ is the PUF’s response for the same challenge under the presence of noise

The security properties of the p-PUFs are based on the complexity of the underlying physical mechanism, with its complexity rendering p-PUFs more secure than their electronic counterparts. For example, a modelling attack would require partitioning the PUF token into wavelength-sized voxels and solving Maxwell’s equations for each possible arrangement [33]. We should mention here that secret keys provide security based on the fact that they are completely random (and thus unpredictable). PUF responses, have a high degree of randomness, but are usually not completely random. Fuzzy extraction algorithms, apart from accurate key reproduction, also remedy the uniformity problem by employing “randomness extractors”. Randomness extractors (i.e., universal hash functions) convert a high entropy input into a shorter, uniformly distributed output. Following this procedure, some of the source’s entropy is “sacrificed” to acquire uniformly distributed random keys. We should mention here that the public nature of the fuzzy extractor’s helper data (the pieces of information used for accurate response reproduction) poses no security risk; helper data do not contain any useful information for an adversary that could take hold of them.

3.1 PUF-Enabled Subcarrier Scrambler Module, to Cyber-Harden OFDM-Based Communications

The three primary 5G NR diverse use cases which defined by 3GPP [37] are: Ultra Reliable Low Latency Communications (URLLC), Enhanced Mobile Broadband (eMBB) and Massive Machine Type Communications (mMTC). Some potential applications for 5G networks include gaming, Virtual reality applications, Vehicle to vehicle, Internet of Things (IoT) and machine to machine communications (M2M). Some of the key requirements that need to be achieved by a modulation scheme, in order to support all the aforementioned applications are [38]:

  • Capable of handling high data rate wide bandwidth signals

  • Able to provide low latency transmissions

  • Capable of fast switching between uplink and downlink for TDD systems

  • Interworking between high and low frequency bands

  • Enable the possibility of energy efficient communications

Orthogonal Frequency Division Multiplexing (OFDM) has been an outstanding choice for 4G networks providing significant spectrum efficiency and performance improvement in frequency-selective channels. The Cyclic-Prefix (CP) OFDM is the predominant candidate for 5G networks for the cases of downlink and uplink in the sub-6 GHz frequency band and for the mmWave range [39]. A typical block diagram of an OFDM RF transceiver with the subcarrier scrambler module is depicted in Fig. 7. In the case of the OFDM transmitter, a high bit rate stream after the parallel to serial converter is driven to QAM mapper and the mapping process forms the buffered bit stream to QAM symbols. In a conventional OFDM system, the complex stream is given as input to the IFFT stage, modulating each subcarrier with QAM symbols. In this scheme, an extra stage, a PUF-based scrambler, is added performing re-distribution of the subcarriers across the frequency domain. The scrambler module performs the subcarrier scrambling operation exploiting the unique responses of the p-PUF module. The unique bit-string responses are used as seeds that feed a pseudo RNG (pseudo-Random Number Generator). Thus, a scrabbling number sequence is produced, and the subcarriers are scrabbled accordingly. A Cyclic Prefix (CP) in order to combat the multipath is added and afterwards the produced complex OFDM signal is RF up-converted, amplified by power amplifier (PA) and radiated from the antenna.

Fig. 7.
figure 7

A typical block diagram of an OFDM transceiver

At the receiver side, the reverse operations include synchronization, frequency domain estimation/equalization and de-scrambling. It must be noted that the process of the frequency estimation and equalization is not affected from the scrambling method. Under this scheme, the bit and power loading methods cannot be used. After the handshaking process, the net bit rate of the proposed system is the OFDM net bit rate. Given that the PUF response (used as seed for the pseudo-RNG) is precisely reproduced, and the pseudo-RNG algorithm is known, the de-scrambling sequence would precisely follow the scrabbling one.

The power spectrum of an (a) un-scrambled and (b) scrambled OFDM up-converted signal to 3.5 GHz carrier frequency, as well as the time traces for these two cases are shown in Figs. 8 and 9 respectively. As can be observed, the power spectra of the up-converted OFDM signals are different as well as the time traces for the two cases.

Fig. 8.
figure 8

The power spectrum of the RF up-converted of the (a) unscrambled and (b) scrambled OFDM signal

Fig. 9.
figure 9

Un-scrambled and scrambled up-converted OFDM time traces

In order to quantify the difference between the unscrambled and scrambled OFDM signals we employ the cross-correlation metric, as is depicted in Fig. 10. As can be seen, the maximum of the cross-correlation of the OFDM signal with itself is 0.97, while in the second case is 0.023. Compared with single carrier schemes, OFDM systems exhibit high peak-to-average power ratio (PAPR). The high value of PAPR is one of the detrimental aspects of OFDM systems since the OFDM signal is greatly affected by the non-linear effects of RF power amplifier (PA), causing serious in-band distortions as well as adjacent channel interference. The scrambling process doesn’t affect the PAPR distribution as depicted in Fig. 11, where complementary cumulative distribution function (CCDF) denotes that a probability distribution of the PAPR of OFDM symbols is over a certain threshold.

Fig. 10.
figure 10

Cross-correlation of the OFDM signal with itself and between the un-scrambled and scrambled up-converted OFDM signal

Fig. 11.
figure 11

CCDF curves for the scrambled and unscrambled scheme.

As can be seen from all the above graphs, the effect of the scrambling process on the basic characteristics of an OFDM signal is negligible, providing the security of the communication system.

4 Conclusion

In this paper we presented two different approaches for the physical layer encryption. The first is based in an optical implementation of the One-Time-Pad cryptographic scheme. We have shown that almost perfect synchronization between mutually injected chaotic lasers placed at the premises of two communicating users leads to the continuous generation of synchronized true random number sequences. These sequences can be used for encrypting/decrypting the data streams exchanged between the two users. The second is based on optical implementation of a Physical Unclonable Function and its application a key generator for scrambling the OFDM subcarriers in a typical 5G communication scheme.