Network authentication by close-loop synchronized chaotic lasers
We numerically study a new hardware method for network authentication, using a pair of chaotic lasers subject to the same optical injection from a third chaotic laser, in a close-loop configuration. One laser is in the secure environment, the other is in the unsecure environment, and if their parame...
Saved in:
Published in | Optical and quantum electronics Vol. 55; no. 4 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.04.2023
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | We numerically study a new hardware method for network authentication, using a pair of chaotic lasers subject to the same optical injection from a third chaotic laser, in a close-loop configuration. One laser is in the secure environment, the other is in the unsecure environment, and if their parameters are matched (i.e., they are ‘twins’), in suitable operating conditions they synchronize and generate the same pseudo-random amplitude modulation. Access to the secure environment is authorized only if the two responses are found equal. As in other schemes based on Physical Unclonable Functions (PUFs), security relies on unavoidable small differences between nominally identical but physically separate devices: due to the strong sensitivity of chaos to laser parameter dispersion, finding a suitable laser to synchronize is a very difficult task for the Adversary, while the laser of the Authorized user can be selected as a twin of the one in the secure environment. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 0306-8919 1572-817X |
DOI: | 10.1007/s11082-023-04640-z |