Search
  • Within this site
AsiaIPEX is a one-stop-shop for players in the IP industry, facilitating IP trade and connection to the IP world. Whether you are a patent owner interested in selling your IP, or a manufacturer looking to buy technologies to upgrade your operation, you will find the portal a useful resource.
Back to search results

Polarization mode dispersion-based physical layer key generation for optical fiber link security


Technology Benefits

Highly random: Encryption is achieved through the polarization mode dispersion (PMD) of a given optical fiber which is highly random (>98%) and therefore impossible to predict. Simple, inexpensive: As the encryption method relies on a physical layer inherent within the PPOL system, it offers a low-cost easily-implemented solution.


Technology Application

For the encryption of point-to-point optical links


Detailed Technology Description

Recent advancements in the accessibility and bandwidth of optical networks have lead to the rise of optical fiber-based communications, called point-to-point optical links (PPOLs), which are used in applications ranging from ethernet systems to telecommunications and military correspondence. Like any other method of communication, optical fibers are vulnerable to a number of security threats including eavesdropping, message interception, and attacks on the network infrastructure. Though there are a number of methods that can be used to encrypt optical communications, these methods are typically impractical, complicated, time-consuming, and/or computationally demanding. Currently, there is no universal simple, efficient, and safe method for encrypting optical communications. Researchers at UCI have sought to overcome these issues by creating a novel method for PPOL encryption. The encryption here is generated from the dispersion of the polarization modes sustained within an optical fiber as this dispersion is entirely random, unique to the fiber of interest, and impossible for an outsider to predict or determine. This method will be particularly useful for resource-limited applications, where reduced cost and low-power solutions are desired.


Others

State Of Development

Currently in the development stage. PMD-based encryption has been verified; researchers are now working to optimize the key generation algorithm.


Tech ID/UC Case

29412/2018-533-0


Related Cases

2018-533-0


Country/Region

USA

For more information, please click Here
Business of IP Asia Forum
Desktop View