2019
DOI: 10.1038/s41467-019-13740-y
|View full text |Cite
|
Sign up to set email alerts
|

Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips

Abstract: Protecting confidential data is a major worldwide challenge. Classical cryptography is fast and scalable, but is broken by quantum algorithms. Quantum cryptography is unclonable, but requires quantum installations that are more expensive, slower, and less scalable than classical optical networks. Here we show a perfect secrecy cryptography in classical optical channels. The system exploits correlated chaotic wavepackets, which are mixed in inexpensive and CMOS compatible silicon chips. The chips can generate 0… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(30 citation statements)
references
References 55 publications
0
27
0
Order By: Relevance
“…Nowadays, artificial intelligence is permeating the field of photonics [55,56] and viceversa [57]. Optical platforms are enabling computing functionalities with unique features, ranging from photonic Ising machines for complex optimization problems [58][59][60][61][62][63][64][65] to optical devices for cryptography [66]. We have realized a novel photonic neuromorphic computing device that is able to perform classification and feature extraction only by exploiting optical propagation in free space.…”
Section: Discussionmentioning
confidence: 99%
“…Nowadays, artificial intelligence is permeating the field of photonics [55,56] and viceversa [57]. Optical platforms are enabling computing functionalities with unique features, ranging from photonic Ising machines for complex optimization problems [58][59][60][61][62][63][64][65] to optical devices for cryptography [66]. We have realized a novel photonic neuromorphic computing device that is able to perform classification and feature extraction only by exploiting optical propagation in free space.…”
Section: Discussionmentioning
confidence: 99%
“…Manufacturing process variations are among the most technologically relevant forms of such randomness and are the primary means by which PUFs extract their chip-unique signatures [1][2][3][8][9][10]. Recently, classical time-varying PUFs have been applied in secure communications [11] and in schemes obtaining perfect secrecy cryptography [12]. In another highly demanded application, PUFs have emerged as promising security primitives for authentication and identification throughout the untrusted supply chain as illustrated in Figure 1.…”
Section: Main Textmentioning
confidence: 99%
“…In this field of research, photonics is pioneering technologies for different lines of applications, including authentication [17,18], secure communications [19][20][21], and classical equivalent schemes to quantum key distribution with perfect secrecy [22]. The main advantage of photonics PUFs is strong device unclonability: while cloning electronic PUF implementations has been reported [23], no one was ever able to replicate an optical PUF.…”
Section: Introductionmentioning
confidence: 99%
“…The issue is the local correlations that are present in the PUF response: when transformed into a binary string with conventional techniques, a certain degree of correlation remains in the key and between different keys [24]. To the best of the authors' knowledge, with the exception of the study by Di Falco et al [22], no optical PUFs has been verified against certification standards that guarantee the genuine unpredictability and uncorrelation of the keys, and no technique has been devised to address this problem controllably for optical PUFs.…”
Section: Introductionmentioning
confidence: 99%