Encryption in phase space for classical coherent optical communications
Encryption in phase space for classical coherent optical communications"
- Select a language for the TTS:
- UK English Female
- UK English Male
- US English Female
- US English Male
- Australian Female
- Australian Male
- Language selected: (auto detect) - EN
Play all audios:
ABSTRACT Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls
when proper safeguards are not put into place. Encrypting data using a random phase mask is a simple yet effective way to bolster the data security at the physical layer. Since the
interactions of the random phases used for such encryption heavily depend on system properties like data rate, modulation format, distance, degree of phase randomness, laser properties,
etc., it is important to determine the optimum operating conditions for different scenarios. In this work, assuming that the transmitter and the receiver have a secret pre-shared key, we
present a theoretical study of security in such a system through mutual information analysis. Next, we determine operating conditions which ensure security for 4-PSK, 16-PSK, and 128-QAM
formats through numerical simulation. Moreover, we provide an experimental demonstration of the system using 16-QAM modulation. We then use numerical simulation to verify the efficacy of the
encryption and study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data. The results demonstrate that the system is secure
against a tapping attack if an attacker has no information of the phase modulator and pre-shared key. SIMILAR CONTENT BEING VIEWED BY OTHERS DEVICE-COMPATIBLE ULTRA-HIGH-ORDER QUANTUM NOISE
STREAM CIPHER BASED ON DELTA-SIGMA MODULATOR AND OPTICAL CHAOS Article Open access 07 February 2024 PHASE ENCODED QUANTUM KEY DISTRIBUTION UP TO 380 KM IN STANDARD TELECOM GRADE FIBER
ENABLED BY BASELINE ERROR OPTIMIZATION Article Open access 22 September 2023 DESIGN AND ANALYSIS OF OPTICAL ENCRYPTION FOR OPTICAL TRANSPORT NETWORKS WITH A RATE OF 100GBPS BASED ON
MACH–ZEHNDER INTERFEROMETERS Article Open access 10 April 2025 INTRODUCTION With increasing demand for faster, more affordable, and smaller form factor solutions in optical communications,
the security of the optical network becomes essential in protecting the immense amount of information that is transmitted. Currently, optical networks are mainly secured by protocols at the
second layer of the OSI model and above, relying on a software-based solution to secure communication1. However, security threats at the physical and optical layer cannot be ignored as
eavesdroppers can have unfettered access to the optical layer and potentially compromise data transmitted. With the major development in recent years with quantum computers, ciphertexts are
potentially vulnerable and can be cracked in significantly shorter periods of time. By utilizing an optical layer encryption, security can be increased and resist attacks at these layers.
Applying an optical layer encryption in the system will allow for low latency, protocol agnostic, enhanced security and transparent end-to-end communication can be achieved. Various methods
have been proposed and implemented for enhanced security in the physical layer of the system including optical code division multiple access (O-CDMA)2, optical chaos signal generation3,
optical steganography4, and XOR encryption5. These methods have shown vulnerabilities against attacks such as optical chaos signal generation and optical steganography being vulnerable to
time-delay identification and post-processing statistical methods. The security performance of O-CDMA has been investigated thoroughly but remains an open issue and is highly dependent on
system design and implementation6. Similarly, alternative secure communication systems have been presented for key distribution using quantum mechanics such as Quantum Key Distribution (QKD)
which is based on the theoretically secure BB84 protocol7. One common layout is continuous-variable QKD (CV-QKD) which is based on using an amplitude such that the on-state is at a level
that prevents an eavesdropper, Eve, from discriminating the signal and allowing Alice and Bob to detect an eavesdropper by comparing measurements and the variance of the distribution8.
Gaussian Modulated Coherent State CV-QKD has demonstrated its capability of reaching a secure key rate of 7.04 Mbps over 25 km of fiber9. These systems can be used in parallel with
conventional data communications through Dense Wavelength Division Multiplexing (DWDM) technique to achieve both data transmission and secure key distribution10. Another common and more
recent layout is twin-field QKD (TF-QKD)11 which can overcome the PLOB-repeaterless bound12. Recently, this system has demonstrated its capability of reaching over 800 km at a secret key
rate of 0.014 bps by utilizing a four-phase twin-field protocol and high-quality set-up13. These systems, although scientifically secure with its proven security against general attacks and
information-theoretic security, are not recommended by major entities such as the National Security Agency (NSA)14. This is because security models are unable to encompass all features of a
real-world component in preparation and detection, and can only provide a guidance where each specific set-up must undergo a thorough study15. More work must be accomplished in this field
before it can be adapted for commercial use. Nevertheless, QKD, on its own, is only capable of distributing keys used for digital data encryption and its current limitations prevent it from
being used for direct quantum encryption for high-speed coherent optical transmission10,16. An alternative approach is to use an encryption scheme where high speed classical equipment is
used to generate a noisy signal which masks the original data. But since such encryptions in classical systems lack mathematically provable security, it is extremely important to design the
encryption scheme such that any attempt to eavesdrop on the system would fail under reasonable and practical assumptions. Here, we present the design, simulation, security analysis, and
preliminary experimental results of an optical layer security design that imposes a mask of noisy phases on the data to make it obscure for an eavesdropper. From here on, we refer to this as
Encryption in Phase Space (EPS). EPS exploits phase-shifting operators to encrypt the optical signals. EPS is a symmetric encryption scheme which is adapted for classical communication
system from the asymmetric encryption presented by Kuang and Bettenburg in 202017, also known as Coherent-based Two-Field QKD (CTF-QKD), which was developed as an alternative to the QKD
protocol by utilizing a public key envelope. EPS is intended to be used after key distribution between Alice and Bob using techniques such as CTF-QKD. Therefore, asymmetric encryption will
be used to establish the shared key while the symmetric encryption scheme will be used for data encryption after the secret key has been shared between the two users. In terms of the
infrastructure of the system, EPS is also similar to PSK-Y0018 and QAM-QNSC (Quantum Noise Stream Cipher)19 with the exception that these encryption schemes rely on the quantum noise
existing in the continuous light of a laser and hence operate as a quantum system whereas EPS uses classical equipment commercially used in high-speed networks to generate the noise required
for encryption. EPS can be regarded as a general case of PSK-Y00 or QAM-QNSC. PSK-Y00 uses equal sliced basis phases driven by the PSK, whereas EPS uses truly random phases not limited to
equally sliced phases. In PSK-Y00 or QAM-QNSC, phase and/or amplitude modulation of coherent light is used as the base of signal transmission and encryption on it is performed by using phase
fluctuation (quantum fluctuation) of light18,19. First, legitimate users share a secret key and use it to generate a pseudo-random bitstream using the same pseudo-random number generator
(PRNG). Next, they perform conventional optical communications in which additional noise arising from the uncertainty principle of the electromagnetic field itself is used to further mask
the data. This additional noise is a theoretical consequence of the laser light theory by Glauber and Sudarshan20,21. Hence, the Y-00 protocol combines mathematical noise encryption (through
the secret shared key and PRNG) and physical noise encryption (using quantum fluctuations of light). On the other hand, EPS does not use physical quantum shot noise for achieving security.
The two legitimate users share a secret key generated by a PRNG which is used to drive a phase modulator to generate the phase noise to mask the data. Like CTF-QKD, EPS generates an envelope
based on the pre-shared secret, then performs a standard modulation scheme to encode data at the transmission side. The authorized receiver will then remove the envelope based on the same
pre-shared secret before coherent detection or through digital signal processing (DSP) after detection. This allows the transmission to be performed in one-direction, from Alice to Bob, to
maintain the confidentiality and integrity of the system. Confidentiality and integrity are maintained by leveraging a deterministic pseudorandom number generator (PRNG) driven phase
encoding to generate an envelope at Alice transmission (Tx) to encrypt the data that she will send to Bob receiver (Rx). Generating an envelope will provide security in an existing
infrastructure while having minimal impact on the performance of the optical communication system. The security of this system follows the same encryption that has been described in detail
in22, where an attacker will obtain nondeterministic results from an invisible tap while Alice and Bob are able to operate deterministically. This contrasts with QKD where Alice and Bob are
not able to perform normal operation while Bob is able to detect attacks. While the principle of using such mathematical encryption is not new, this work shows that by choosing appropriate
system and signal parameters, it is possible to prevent eavesdropping using mathematical encryption only for the envelope while allowing the legitimate receiver to decode the data from the
envelop. In other words, this work specifies the optimum operating conditions which prevent eavesdropping while allowing the authorized receiver to unmask the data. METHODS ENCRYPTION IN
PHASE SPACE (EPS) AND SECURITY ANALYSIS EPS is based on applying phase-shifting operators to coherent states. A phase-shifting operator is applied to the coherent state at the transmitter
and is shown as, $$\begin{array}{c}\widehat{U}\left(\varphi \left(t\right)\right)\left|\alpha \right.\rangle =\left|\alpha {e}^{i\varphi \left(t\right)}\right.\rangle ,\end{array}$$ (1)
where _Û(φ(t))_ is the phase-shifting operator driven by a PRNG seeded with a pre-shared key. Leveraging the fact that phase-shifting operators are unitary, the conjugate transpose can be
applied to reverse the phase shifted operation at the receiver by using the same PRNG with the pre-shared key between both the transmitter and receiver operator, $$ \hat{U}\left( {\varphi
\left( t \right)} \right)^{\dag } \hat{U}\left( {\varphi \left( t \right)} \right)|\left. \alpha \right\rangle = |\left. \alpha \right\rangle $$ (2) By applying the operator’s conjugate
transpose, the identity operation is obtained for \(\hat{U}\left( {\varphi \left( t \right)} \right)^{\dag } \hat{U}\left( {\varphi \left( t \right)} \right) = \hat{I}\) since _Û(φ(t))_ is a
unitary operator. Therefore, the original coherent state can be recovered. In the aspect of our technology, the phase-shifting operator and conjugate transpose operator can be applied by a
PM or in DSP at the receiver. The basis of EPS can be related to the operation of CV-QKD. CV-QKD operates by the quadrature of the electric field in the optical phase space by transmitting
coherent states from Bob to Alice by randomly selecting between the “off” (\(\left|0\right.\rangle \)) or “on” state (\(\left|1\right.\rangle \)). The random selection is typically achieved
by modulating the phase to impose the \(\left|0\right.\rangle \) with 0 degrees or \(\left|1\right.\rangle \) state with 180 degrees. The amplitude is tuned to a level where the probability
distributions of both states overlap. The variance from the measurement will be used to determine whether tampering occurs. In contrast to CV-QKD where the global reference phase is static,
EPS leverages the phase space where the reference space of the in-phase and quadrature operator of the coherent state is manipulated with the phase-shifting operator, making the global
reference space dynamic. This dynamically changes in time through phase modulation, which is driven by a PRNG, and decryption can easily be accomplished through a pre-shared key. That is,
for EPS, the “static” global phase can only be established between the trusted transmitter and receiver with the pre-shared key. In detection, if the expected BER increases then it can be
determined that an eavesdropper was present. Furthermore, even with an “invisible” tap with little disruptions on the trusted communications, the encryption will result in the eavesdropper
obtaining random data with a high BER around 0.5 or leaving the maximum uncertainty to the eavesdropper. This EPS will secure the optical line by applying different phase shifts to the
coherent state preventing an eavesdropper from obtaining any information of the coherent state, creating a noncoherent channel. This is achieved when an eavesdropper taps the fiber. The
tapped signal that an eavesdropper will have to decrypt is \(\left|\alpha {e}^{i\varphi (t)}\right.\rangle \), where the coherent state is masked by the phase shifted operation. With a
time-varying phase shift, the coherent state will remain random, masked, and secure against an attack. Additionally, in practice, there will be differences between the receiver’s Local
Oscillator (LO) and the eavesdropper’s LO, which will increase measurement error. Therefore, it is more exact to describe the tapped signal that an eavesdropper will have to decrypt as
\(\left|\alpha {e}^{i(\varphi \left(t\right)+\Delta {\varphi }_{p}+\Delta {\varphi }_{LO})}\right.\rangle \). It is also important to touch on the generator that will determine _φ(t)_.
_φ(t)_ can be driven by a PRNG component such as the deterministic Pseudo-Quantum RNG (PQRNG). The deterministic PRNG unit must have good randomness to prevent correlation of future values
and a long secret to increase the difficulty of decoding. One class of PRNGs that fit these requirements is PQRNG such as the one described in23. The PQRNGs in23 can be generated by
supplying random numbers to select specific permutation matrices in the quantum permutation pad. Utilizing the novel quantum permutation pads, the PQRNG is capable of holding over 100,000
bits of entropy with 64 8-bit permutation matrices through the pre-shared secret to deterministically drive the phase-shifting operator, providing added security to the system. The entropy
of this PQRNG can quickly be scaled to increase the security by increasing the bits of the system and number of permutation matrices. The PQRNG is seeded with a pre-shared secret of up to 16
kB supplied by a telco operator. This method will prevent an eavesdropper from decrypting the phase randomization both physically and digitally and maintain the confidentiality of the data
over the fiber optical layer. Other PRNGs such as a genuine QRNG can be used, however require a large set of random numbers pre-shared between Alice and Bob and used repeatedly between a
synchronized EPS encryption and decryption. Another alternative to apply a genuine QRNG is to send the generated values over another channel to drive the encryption, similar to chaotic phase
scrambling24. Deterministic PRNGs are used in this study to simplify the synchronization between encryption and decryption. Finally, EPS’s security can be described through the calculation
of mutual information similar to a noncoherent channel where the phase information is unable to be transmitted over the channel. The description below will extend the work performed in25
with the addition of our EPS implementation. The EPS system will be assumed to follow a noncoherent channel as the phases will be completely randomized through a uniformly distributed
deterministic PRNG. Noncoherent channels can be used to model EPS as they are AWGN channels which have introduced random phase rotations26. The random phase rotations in the EPS case are a
result of the phase-shifting operators applied onto the optical signal. Randomization is achieved through the phase modulator (PM) driven by a PRNG. This noncoherent channel will provide a
lower bound of information leakage that Eve will be able to obtain in the ideal situation. Indeed, a complete analysis will be performed in the future to identify realistic cases with
limited number of phase slices, maximum phase shifts applied, and limiting the tapping power. Without the encryption, data travels through a coherent channel containing information from
phase or amplitude or both, depending on the modulation format. Based on the SNR, a malicious party can obtain information and will be explained from the following model. The channel will
have a complex-valued input, $$\begin{array}{c}X={X}_{\parallel }\cdot {e}^{j{X}_{\sphericalangle }}, {X}_{\parallel }\epsilon \left[0,\infty \right), {X}_{\sphericalangle }\in \left[-\pi
,\pi \right),\end{array}$$ (3) and a complex-valued output, $$\begin{array}{c}Y={Y}_{\parallel }\cdot {e}^{j{Y}_{\sphericalangle }}, {Y}_{\parallel }\epsilon \left[0,\infty \right),
{Y}_{\sphericalangle }\in \left[-\pi ,\pi \right).\end{array}$$ (4) For a partially coherent the continuous-time form can be described by,
$$\begin{array}{c}Y\left(t\right)=X\left(t\right)\cdot {e}^{j\Theta \left(\mathrm{t}\right)}\cdot {e}^{j\varphi \left(t\right)}+N\left(t\right),\end{array}$$ (5) where _ϴ(t)_ is the phase
noise process, _φ(t)_ is the phase space randomization and _N(t)_ is the complex-valued additive white gaussian noise (AWGN) process with a variance of _2σ__n__2_. An ideal interleaver and
de-interleaver can convert (3) into the discrete-time form following the form, $$ \begin{aligned} Y_{i} & = \left( {X_{i} + N_{i} } \right) \cdot e^{{j\Theta _{i} }} \cdot e^{{j\varphi
_{i} }} \\ & = X_{i} \cdot e^{{j(\Theta _{{\text{i}}} + \varphi _{i} )}} + N_{i} \prime , \\ \end{aligned} $$ (6) where \({N}_{i}{\prime}\sim {N}_{\mathbb{C}}\left(0, 2{\sigma
}_{n}^{2}\right)\). Polar decomposition of mutual information for an AWGN channel with Gaussian input, phase noise, and encryption can be calculated through the equations presented in25. The
mutual information _I(X;Y)_ is described as, $$\begin{array}{c}I\left(X;Y\right)=\\ I\left({X}_{\parallel };{Y}_{\parallel }\right)+I\left({X}_{\sphericalangle };{Y}_{\sphericalangle
}|{X}_{\parallel }\right)+I\left({X}_{\parallel };{Y}_{\sphericalangle }|{Y}_{\parallel }\right)+I\left({X}_{\sphericalangle };{Y}_{\parallel }|{X}_{\parallel },{Y}_{\sphericalangle
}\right)\end{array}$$ (7) where the terms on the right side of the equation from left to right represents the Amplitude term, Phase term, Mixed term I, and Mixed term II. Mixed term I is the
amount of information about the input amplitude that can be drawn from the output phase given the output amplitude. Mixed term II is the amount of information about the input phase that can
be observed from the output amplitude given the input amplitude and output phase. This polar decomposition represents the information that is sent in each component and can be related to
the total amount of information that attainable by the receiving party or a malicious party in a coherent channel. The polar decomposition of the mutual information was plotted in 1(a) by
Goebel et al_._ for 16-QAM25. EPS can easily be integrated for standard data modulation formats. As the phase is completely randomized through the pseudo-random selection of phases and is
uniformly distributed, the output phase y∢ will contain no information resulting in the Phase term and Mixed term I to equal zero. Since y∢ carries no information, the Phase term will also
have no mutual information available resulting in the Phase term to be zero. Mixed term I tends toward zero because it becomes a continuous concentric ring with an infinite number of phases.
Mixed term II will also be assumed to equal zero due to \(p\left({y}_{\parallel }|{x}_{\parallel },{y}_{\sphericalangle }\right)=p({y}_{\parallel }|x,{y}_{\sphericalangle })\). Therefore,
the mutual information only contains the Amplitude term, _I(X; Y)_ = _I(X_‖_; Y_‖_)_. Indeed, this scenario is ideal and in practice, a finite number of phase levels would be chosen where
the Phase term would have some value as long as the variance is small, and the Mixed term II would have a negligible small value. This will be the mutual information that travels through the
fiber and also the maximum information that Eve can obtain if she taps 100% of the power. The ideal polar decomposition of mutual information for Eve with EPS applied to 16-QAM is shown in
Fig. 1b. As expected, the maximum and ideal mutual information that Eve can obtain from a noncoherent channel is significantly reduced compared to Fig. 1a and in a realistic scenario where
Eve would only tap a small amount of power, the Amplitude term that she would obtain would be even smaller. On the other hand, Bob can convert the noncoherent channel back to a coherent
channel by applying the decryption using the pre-shared secret and obtaining the modulation output phase y∢. Doing so will allow Bob to recover the Phase term, Mixed term I, and Mixed term
II. Therefore, his mutual information will consist of all the mutual information terms shown in (7) and in the ideal situation will be the same as Fig. 1a once decryption is performed. These
findings can also be extended to Phase Shift Keying (PSK) modulation formats where no amplitude information would be present resulting in a mutual information approaching zero in the ideal
case. To summarize, this initial mutual information study with the idea assumption and cases have provided a lower bound and guidance in the leakage of information with the conclusions
listed: * 1. Bob is able to recover all mutual information terms through decryption with knowledge of the pre-shared key. * 2. PSK modulation formats provide the lowest amount of information
leakage as the phase slices increase. * 3. PAM formats provide the least security as the amplitude term remains through encryption. * 4. QAM is a mixture of both amplitude and phase
modulation which results some information leakage, mainly due to the amplitude modulation. * 5. Eve still obtains cipher bits and is required to know the pre-shared key in order to obtain
all information. A more comprehensive study will be performed in the future to accurately quantify the security the EPS in a standalone paper. Nevertheless, the results shown in this mutual
information description of EPS operating over the optical fiber demonstrates that a malicious party will only be able to obtain a minimal amount of information for QAM modulation formats and
negligible amounts of information for PSK modulation formats. SETUP FOR SIMULATIONS AND EXPERIMENTS The EPS system schematic is shown in Fig. 2. There are two main sections: the
transmitter, where phase encryption and data encoding occur, and receiver, where phase decryption and data decoding occur. The first section, Alice Tx, generates a coherent light which is
encrypted by a PM and driven by a deterministic PRNG seeded with the pre-shared secret. This PM acts as a phase-shifting operator which randomizes the phase of each coherent state. A
pre-shared key is required to allow both users to encrypt and decrypt their data. This requirement may offer telco operators the advantage to control their data security over the
infrastructure layer and avoid any possible security backdoor set by optical transceivers. Alice’s data will then be encoded into the phase randomized coherent light through an IQ-MZM using
the modulation of their choice. Alice’s encrypted data or optical cipher signal is then sent to Bob. Bob will receive Alice’s optical cipher signal and perform coherent detection. Decryption
will be performed in DSP where the pre-shared key will be used to remove the effect of Alice’s phase-shifting operator. This step is performed by applying the conjugate transpose of the
initial phase shift digitally to the detected signal. Finally, typical DSP algorithms used in coherent receivers can be performed to obtain Alice’s encoded data. In essence, the major
difference between the system presented in Fig. 2 and a conventional coherent optical communication system is the addition of an optical layer encryption at Alice’s transmitter and an
additional decryption step at Bob DSP. Next, the communication from Alice to Bob is described in detail. Firstly, Alice creates a coherent state, \(|{\alpha }_{b}\rangle =\left|\sqrt{\mu
}\rangle \right.\), where _μ_ is the signal intensity. She will then apply phase randomization to the optical signal resulting in \(|{\alpha }_{b}\rangle =\left|\sqrt{\mu }{e}^{i{\varphi
}_{b}}\rangle \right.\) where _φ__b_ is the phase randomization applied through a PM driven by a deterministic PRNG. Furthermore, this PRNG unit will be used by both Alice and Bob together
to generate the same randomized pattern to allow for seamless encryption at Alice and decryption at Bob. The phase randomized state will act as an envelope where Alice will then encode her
information using their desired standard modulation format, resulting in the output coherent state \(|{\alpha }_{b}{\prime}\rangle =\left|\sqrt{{\mu }_{b}}{e}^{i({\varphi }_{b}+{\varphi
}_{a})}\rangle \right.\), where _φ__b_ is the phase randomization and _φ__a_ and \({\mu }_{b}\) represent the phase and intensity of the modulated data that Alice sends to Bob. The optical
signal will then be sent to Bob, where he will perform coherent detection and obtain an optical power that is incident at the photodetectors given as, $$\begin{array}{c}P=\mu b+\nu
+2\sqrt{{\mu }_{b}\nu \mathrm{cos}\left({\varphi }_{a}+{\varphi }_{b}\right)} ,\end{array}$$ (8) where ν is the LO intensity at Bob Rx. The rate of the PRNG is the same as that of the
modulated signal. The signal driving the PM, i.e. mod(t), contains a block of 104 symbols containing only zeros at its overhead. Hence, after the PM, for the overhead portion, \({P}_{out}
(t)={P}_{in} (t)\) which is a constant amplitude CW light. When the output from the PM gets modulated by the IQ modulator, that overhead portion takes the form of the standard modulation
format used by Alice while the rest of the IQ modulator output becomes the standard format signal mixed with phase noise coming from the non-overhead section of the PM output. At the
receiver, before any decryption, the received signal is demodulated for its standard format. Now, only that part of the received signal remains in standard format (QPSK, 16-QAM etc.) which
was mixed with the overhead block of the encryption key. As a result, when demodulation is done without decryption, only for that standard-format section of the received signal, we obtain a
low BER while the rest of the demodulated signal gives a BER of 0.5. In this way, the instant of signal sample where decryption should start is identified. In contrast to17, in (8), the
envelope remains at the detection and will be removed digitally. This can be achieved because Bob and Alice have a pre-shared key to apply the phase-shifting operation digitally. Only
Alice’s encoded information will then remain. On the receiver side, Bob first captures the data using an analog-to-digital converter (ADC). Then the captured data is then decrypted by Bob
offline and the signal quality is improved through signal processing algorithms in the digital domain on a computer, offline. The data rates reported in this work denote the date rate of
signal propagation through the optical fiber. Typical DSP algorithms include but are not limited to DC blocking, resampling, QI compensation, dispersion compensation, nonlinear compensation,
timing recovery, adaptive equalizer, frequency offset estimation, and carrier phase estimation. For the purposes of simplicity in simulation and experiment, a single polarization was used.
It should be possible to adapt the proposed method in PDM systems since the polarization of the signal should not affect the phase noise used for encryption. For each polarization, different
encrypting phase noises can be used. The system schematic of a typical attack on the optical fiber where an eavesdropper taps the EPS system is shown in Fig. 3. In essence, we will be
simulating the most desirable attack by Eve where she is next to Alice and has access to her output port. An eavesdropper receiver would receive a power equation like (8). This received
signal will be lower in quality and be weaker in power due to Eve only being able to tap a small portion of the transmitted power. Single polarization simulations will be performed for
simplicity; however, this system is not limited to single polarization but can also be extended to dual polarization. Simulation system layout parameters are listed in Table 1. The PM
component has a phase deviation parameter, which sets the maximum phase shift applied to the optical signal. The PM phase deviation is the phase shift induced to the signal by the phase
modulator. If _P__in__(t)_ is the optical signal fed to the PM from the CW laser, _mod(t)_ is the signal driving the PM’s electrical input, then the optical output signal _P__out__(t)_ from
the PM can be expressed as follows26: $${P}_{out}\left(t\right)={P}_{in}\left(t\right)exp\left(j\times \Delta {\Phi }_{enc}\times mod\left(t\right)\right), $$ (9) where \(\Delta {\Phi
}_{enc}\) represents the phase angle deviation. Moreover, we vary another parameter for the PM called period which is defined as the number of symbols for which \(\Delta {\Phi }_{enc}\times
mod\left(t\right)\) remains constant in the encryption key. System security is maximized by selecting phases between zero and the phase deviation. Furthermore, coherent state phases were
randomized with a MATLAB component. A period parameter was used to set the length of bits for which a phase would remain constant. Our algorithm uses a constant period that changes the
phases after a pre-defined number of bits, this period can also be randomized to further improve security and prevent Eve from determining Bob’s secret key; however, for each modulation
format, a minimum period value is required at a specific transmission rate due to the BER. Unless otherwise stated, the phase deviation will be set to 90 deg, the period will be set to 1024,
and 5 sets of simulations will be performed per analysis with averages and standard deviations shown. The optical signal’s power generated at both transmitter (Alice’s CW laser) and
receiver (Bob’s LO) will be matched. Lastly, we assume Kerckhoff’s principle18 for Eve which states that the eavesdropper has the same receiver system as Bob, has an available tapping port
at Alice’s output, and all information of the system but not the information related to the randomized phase pattern (period value, PRNG seed). RESULTS Various simulations are performed to
determine the performance and system security: * 1. CW power analysis * 2. PM phase deviation and period parameter analysis * 3. CW laser linewidth Simulations were performed using
OptiSystem 18 for PSK and QAM modulation formats (QPSK, 16-PSK, and 128-QAM). For test cases involving an Eve tap, it will be assumed to be “invisible” and ideal where only a maximum of 10%
power can be tapped and with no coupling loss. These results demonstrate one random pattern used, however, a more detailed investigation for different random patterns can be found in18. When
Eve taps the optical fiber, a finite optical power will be siphoned off. The variance of Δ \(({\varphi }_{b}+{\varphi }_{a})\) will increase for the tapped signal for Eve and the remaining
data signal for Bob. Of course, the tapped signal comes with bigger Δ \(({\varphi }_{b}+{\varphi }_{a})\) and variance than the signal to Bob. Therefore, we will assume that Eve can only tap
a maximum of 10% for all simulations. CW POWER ANALYSIS Figure 4 shows the simulated BER results when varying the CW power of both Alice and Eve, which is the power emitted by Alice’s laser
which is represented by the “CW” block in Fig. 3. As stated above, a window of operation must be defined, where Eve is unable to determine the correct bits. For QPSK with a period of 1024
and phase deviation of 90 deg, all CW power tested can be used to obtain a BER below \({10}^{-4}\). For 16-PSK with a period of 1024 and phase deviation of 70 deg, a CW power of 7 dBm or
greater is required to obtain a BER below \({10}^{-2}\). Similarly for 128-QAM with a period of 1024 and phase deviation of 90 deg, a CW power of 6 dBm or greater is required to obtain a BER
near \({10}^{-2}\). Results for other modulation formats exhibited similar performance where more complex formats required working ranges at stronger input power. In Fig. 5, we demonstrate
the security of EPS with the initial constellation diagrams. In Fig. 5(a,b), we simulate a tapping attack with detections at Bob and Eve when no encryption at Alice is applied. Without
encryption, the eavesdropper will clearly be able to obtain a relatively low BER value, allowing them to obtain information Alice sends to Bob. This means, a copy of any transmitted data,
either encrypted ciphers or plaintexts, through fibers would be obtained by eavesdroppers. That is a fundamental fact for today’s optical infrastructure. However, with encryption, this
capability is disabled for an eavesdropper as shown in Fig. 5(c,e). The constellation diagram that Bob receives without Eve’s tapping, is clear and the samples can be determined to the
correct constellation points with minor errors. With the addition of a tapping attack, the constellations that Bob receives, are relatively good, but with noticeably more error than without
a tapping attack. The constellations that Eve receives, are a randomized cluster that results in high indiscernible information with a BER of 0.5. This randomized cluster is a result of the
encryption applied where each bit has been randomly shifted, changing the position, and making the constellation diagram for an eavesdropper uninterruptible. Finally, these results are in
line with our experimental results which were presented in26 for QPSK. PM PHASE DEVIATION AND PERIOD PARAMETER ANALYSIS The PM phase deviation and period parameter also play a vital role in
determining the security of the system. Phases for every period will be selected between zero and the phase deviation value. It was determined in22 that those different parameters had a
large effect on the BER. In this analysis, we will perform similar performance tests as done in22,23 in the presence of a tapping attack. Furthermore, we will compare the BER performance
with different parameters in Alice’s laser, Bob’s reference laser, and Eve’s reference laser. As shown in Fig. 6, with an increase in period, Bob’s BER decreases with a trade-off of lower
security or less randomness. When the phase deviation was too small, Eve was able to obtain an error-less BER with a phase deviation of 0 deg (no phase encryption applied) and only a small
error at 20 deg. A phase deviation of 20 deg resulted in low error because relatively small phase shifts were applied to the optical signal. Even without any decryption applied by Eve, with
a less complex modulation format, Eve will be able to obtain a low BER for small phase deviations due to bits remaining in the correct decision boundary after encryption has been applied. At
phase deviations larger than 45 deg for 128-QAM, Eve is unable to decode any information and obtains the maximum BER of 0.5. CW LASER LINEWIDTH Lastly, we identify the effect of the laser
linewidth on the security of the system. Essentially, we determine the effect of using better laser equipment than previously tested and the effect of an eavesdropper having a superior laser
than the one that Alice and Bob use in their set-up. OptiSystem is not capable of completely isolating the effects of EPS and the linewidth. At the low frequency non-linear regime
instabilities may occur and may not be encompassed in this set of simulations which include white noise, flicker, random walk noises27. These limitations may not be a dominant effect in the
present commercial network; however, with constant improvements to technology, these effects must be explored. Shown in Fig. 7 are the results for the analysis on different laser linewidth
for 128-QAM. With a smaller linewidth, the BER was expected to drop significantly for Bob, though the laser linewidth was found to not improve Bob’s BER. On the other hand, for an
eavesdropper, because the quality of their tapped signal and their local oscillator is improved, it was found that the security was decreased, and that Eve was able to obtain more correct
bits. Nevertheless, improvements to Eve’s BER are only apparent at low to no phase deviations. From these simulation results it was determined that a set of operating encryption parameters
are required to ensure the security of the EPS system. A summary of these optimal operation parameters is shown in Table 2. EXPERIMENTAL RESULTS The results for an experimental demonstration
are summarized in Figs. 8 and 9. The equipment and experimental setup used are similar to26; however, this demonstration is configured for the symmetric encryption rather than the
asymmetric encryption. This highlights the configurability of the set-up allowing seamless transition from symmetric encryption to asymmetric encryption. This experiment is performed at 6
GBaud for 16-QAM. This experiment was only continued until the HD-FEC limit was reached and values differ from simulation as the experimental set-up layout parameters are not identical. As
seen, the measured BER as a function of phase deviation in Fig. 8 follows the same trend as the simulations shown in Fig. 6a. With increasing phase deviation, the BER increases. Furthermore,
constellation diagrams of this experiment are shown in Fig. 9. For three phase deviation points for Bob’s receiver. To clarify, this experimental demonstration does not contain any
eavesdropper and demonstrates the results for transmission from Alice to Bob transmission without any tapping. As expected, with increasing phase deviation of the encryption, the increasing
BER of Bob’s receiver can be seen with the received data overlapping in constellation points. With increasing phase deviation, larger error occurs due to bigger phase shifts resulting in a
larger BER which is seen in Fig. 9c where the constellation points start to overlap. It is also important to note that this is a preliminary experimental validation where future work will be
performed to verify the conclusions made in this simulation at higher baud rates, more complex modulation formats, and in the presence of Eve. Nevertheless, these results verify the
conclusions made for a non tapping scenario. DISCUSSION In our previous analysis22, we determined that by controlling the CW power of both Bob Tx and Rx, a window is created where Bob can
recover Alice’s secret key while preventing Eve from obtaining any transmitted information. Furthermore, we performed an analysis on these results in23, determining the theoretical and
practical security of the system. We have also tested for varying CW power and concluded that Eve is unable to decode for all CW power for all modulation formats, resulting in a BER value of
0.5 at all input power. These results demonstrate that EPS is compatible with all modulation formats and maintains security by encryption of the encoded data at the transmitter preventing
any eavesdropper from obtaining any information. The initial encryption will fully mask Alice’s transmission data and can only be decoded with knowledge of the exact phases applied. These
results demonstrate the efficacy of applying phase encryption to the security of the network in preventing any information from being known to an eavesdropper. In contrast to our results
in22, which described a window of power operation that prevented an eavesdropper from obtaining information, in this system a minimum power is defined to provide security where even at high
powers, an eavesdropper is unable to obtain any information. A minimum power is required in EPS to obtain good BER due to noise from transmission. Additionally, by operating at higher power,
lower BER at longer transmission distances can be achieved. It is also important to note that for QPSK modulation, the minimum power required is outside the range of testing shown and was
determined to be at a CW power greater than -21 dBm. Although the working range provides a minimum power that the operator must operate at, the BER can also be used to verify if an attacker
is presently eavesdropping. In this case, only one specific power can be used, where Bob’s BER would increase significantly in the presence of an eavesdropper tapping 10% of their power (for
16-PSK, a power of -5 dBm and for 128-QAM, a power of 0 dBm). For QPSK, this case would not be possible at any power because there is no significant difference between the BER in the no
tapping and tapping case. This is due to the already low operating power that EPS can operate at for QPSK. Constellation diagrams were also shown in Fig. 9 to demonstrate the effect that EPS
has on both Bob’s and Eve’s diagram. Here, the effects of adding encryption to a traditional optical network are compared. Without encryption, it was determined that Eve could obtain
information sent between Alice to Bob assuming that Eve had information of their systems. With encryption, the in-phase and quadrature electrical signals at the Rx are shifted and scrambled,
preventing correct detection of bits by Eve. This demonstration is extremely important to the security of EPS. By changing the phase space of the in-phase and quadrature signals of the
data, malicious parties would obtain data that is unidentifiable. The bits of data are mapped to a modulation format which correlates to a constellation point and these constellation points
are on the in-phase and quadrature axis. If the phase reference is shifted continuously and without any knowledge of the new phase references, a malicious party would obtain incoherent data.
We have also shown that the phase deviation and period results demonstrated that selecting large phase deviations can provide greater security in securing Alice’s data to Bob. It was also
found that Eve could decode the signal up to a maximum of 45 deg. Therefore, it is recommended to use a phase deviation of at least 70 deg for any modulation format tested to prevent an
attacker from obtaining any information. An analysis on Eve’s phase de-randomization in the DSP was not performed as it has been demonstrated in28 for various test cases and will be assumed
to be similar and comparable in performance when adapted to the EPS system. Our exploration of transmission impairments on the DSP’s ability to distinguish the phase modulation from the
encryption process is incomplete and will be performed in the future. This will require more time to test and verify by analyzing factors such as the effect of equalization enhanced phase
noise on the DSP’s ability to properly perform decryption due to the non-commutative property of the convolution and multiplication. Optimization of DSP algorithms may be required, or new
algorithms will need to be implemented to compensate for the additional encryption introduced by EPS. Nevertheless, shown in our experimental results, current DSP algorithms are capable, but
not optimized to decode EPS. It is also important to note that in our simulation results large standard deviations are present within testing. These results are mainly due to one extreme
outlier within the test set with a substantial increase in BER. The increase in BER shifts the average up slightly from the expected value and results in a large standard deviation.
Furthermore, the logarithmic scaling amplifies these outliers, appearing more significant. Finally, it was concluded in the laser linewidth analysis, that with lower linewidth, results do
not improve for an attacker when EPS is present, however, when no encryption is applied, the results obtained by an eavesdropper will be superior. As expected, with a better-quality signal,
where the linewidth is improved, an attacker can obtain a lower BER after tapping. However, with the addition of EPS to the system, the phase space of the coherent state is scrambled,
preventing the eavesdropper from obtaining any significant information even if the quality of their tap is improved. Thus, it can be concluded that linewidth and EPS are independent of each
other; if the eavesdropper has knowledge of the EPS applied, their results will be better at lower linewidth, but if they have no knowledge of the EPS applied, their results will have no
difference at any linewidth. Based on these results and summarized in Table 2, by selecting a smaller PM period value and a larger phase deviation value, the security can be maintained.
Again, these results demonstrate the security of applying an encryption to prevent an eavesdropper from obtaining information sent over the optical network using different parameters.
Besides the theoretical verified security, the practical security of EPS must be considered. An eavesdropper has one main challenge in obtaining the secret information sent from Alice to Bob
due to the phase randomization pattern. Eve can attempt to decrypt the encoded data through their own PM or through digital decryption, however, without knowledge of the pre-shared seed,
Eve will be unable to obtain the correct bits. Although slightly simpler for EPS, where the attacker can also decode and compensate digitally, the obstacle of having the correct random seed
remains. With a cryptographic-secure PQRNG24, the sufficiently large entropy will deter attackers from attempting to decrypt the encryption even when part of the initial or running state
becomes available due to future states being unpredictable. The said PQRNG is capable to take a secret of up to 16 kB long, perfect for EPS. Moreover, the complexity of this system can
quickly be increased through randomizing the phase deviation and period parameter during operation. This additional randomization must be driven by a deterministic PRNG component so that
encryption and decryption can be seamless. It is recommended that the same PRNG unit used to drive the PM should be used to randomize the phase deviation and period parameter to reduce
resources. Furthermore, tested in both simulation and experiment previously, if there is even one symbol shifted in the phase de-randomization, then a maximum BER of 0.5 is obtained. This is
similar to23 which discusses how synchronization is a monumental challenge for an eavesdropper in decoding. Finally, we briefly discuss other forms of physical layer attacks on the system.
Common vulnerabilities in optical networks that can still be exploited such as gain competition in erbium-doped fiber amplifiers, interchannel crosstalk, correlated jamming, and denial of
service through fiber damage29. All of these disruptions can cause major issues to the optical network service; however, the network security and robustness can be maintained through
traditional network routing algorithms29, minimizing system disruptions. EPS can be integrated into current infrastructure allowing it to leverage these technologies. With the vast array of
interconnected optical fiber, service disruptions can be quickly rerouted to reduce physical impairment. With the addition of EPS to current infrastructure, there is little to no added
complexity with the advantage of increased security at the optical layer. Only one optical component is added to the system for the encoding and decoding can be performed in DSP. Thus, EPS
can be used as a physical layer security against attacks where the malicious party target the data in the network, however, for attacks which are targeted to disrupt a network, current
solutions can be still leveraged. SUMMARY We have proposed a theoretical model for an optical encryption layer scheme over existing coherent optical communication channel utilizing
randomized phase encoding. EPS is compatible with common modulation formats such as PSK and QAM. Both PSK and QAM formats were tested at 28 GBaud. A common eavesdropping scenario was
considered, and it was demonstrated that the system was secure against an eavesdropper with no knowledge of the randomization seed. With larger phase deviation and smaller periods, the
security of the system increases with a trade-off of higher BER. In contrast to20, it was concluded in the CW power analysis that a minimum power was required for operation instead of a
window of operation range. Constellation diagrams were also compared to demonstrate the effect of encryption has only the optical network. Preliminary experimental validation was performed,
and results were in line with simulation results. Other physical layer attacks were also discussed where the addition of EPS does not add vulnerability to currently used conventional
coherent optical communication networks, however, EPS can still be affected by common disruptions. EPS provides a unique solution to telco operators to control the data security of their
system over the infrastructure layer. This model will be employed experimentally to validate our numerical results and is the subject of current study. DATA AVAILABILITY Data are available
from the corresponding author upon reasonable request. REFERENCES * Holl, K. _OSI Defense in Depth to Increase Application Security_ (SANS Institute, 2003). Google Scholar * Fouli, K. &
Maier, M. OCDMA and optical coding: Principles, applications, and challenges. _IEEE Commun. Mag._ 45, 27–34 (2007). Article Google Scholar * Argyris, A. _et al._ Chaos-based
communications at high bit rates using commercial fibre-optic links. _Nature_ 438, 343–346 (2005). Article ADS CAS PubMed Google Scholar * Wu, B. _et al._ Optical steganography based on
amplified spontaneous emission noise. _Opt. Express_ 21, 2065–2071 (2013). Article ADS CAS PubMed Google Scholar * Li, Z. & Li, G. Ultrahigh-speed reconfigurable logic gates based
on four-wave mixing in a semiconductor optical amplifier. _IEEE Photon. Technol. Lett._ 18, 1341–1343 (2006). Article ADS CAS Google Scholar * Shake, T. Security performance of optical
CDMA against eavesdropping. _J. Lightw. Technol._ 23, 655–670 (2005). Article ADS Google Scholar * Bennett, C. H. and Brassard, G. Quantum cryptography: public key distribution and coin
tossing. In _International Conference on Computers, Systems & Signal Processing_ (1984). * Djordjevic, I. B. _Physical-Layer Security and Quantum Key Distribution_ (Springer, 2019). Book
MATH Google Scholar * Wang, H. _et al._ High-speed Gaussian-modulated continuous-variable quantum key distribution with a local local oscillator based on pilot-tone-assisted phase
compensation. _Opt. Express_ 28, 32882–32893 (2020). Article ADS PubMed Google Scholar * Dynes, J. F. _et al._ Ultra-high bandwidth quantum secured data transmission. _Sci. Rep._ 6,
35149 (2016). Article ADS CAS PubMed PubMed Central Google Scholar * Lucamarini, M., Yuan, Z. L., Dynes, J. F. & Shields, A. J. Overcoming the rate-distance limit of quantum key
distribution without quantum repeaters. _Nature_ 557, 400–403 (2018). Article ADS CAS PubMed Google Scholar * Pirandola, S., Laurenza, R., Ottaviani, C. & Banchi, L. Fundamental
limits of repeaterless quantum communications. _Nat. Commun._ 8, 15043 (2017). Article ADS PubMed PubMed Central Google Scholar * Wang, S. _et al._ Twin-field quantum key distribution
over 830-km fibre. _Nat. Photon._ 16, 154–161 (2022). Article ADS Google Scholar * Quantum Key Distribution (QKD) and Quantum Cryptography (QC), National Security Agency/Central Security
Service, [Online]. https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/ (Accessed 23 March 2022). * Scarani, V. & Kurtsiefer, C. The black paper of
quantum cryptography: Real implementation problems. _Theor. Comp. Sci._ 560, 27–32 (2014). Article MathSciNet MATH Google Scholar * Shi, S. & Xiao, N. 10-Gb/s data transmission
using optical physical layer encryption and quantum key distribution. _Opt. Commun._ 507, 127603 (2022). Article CAS Google Scholar * R. Kuang and N. Bettenburg, Quantum public key
distribution using randomized Glauber states. In _IEEE International Conference on Quantum Computing and Engineering _(_QCE_) (2020). * Harasawa, K. New quantum cipher optical communication:
Y-00. In _Optical Communication_ (ed. Harasawa, K.) (IntechOpen, 2012). Google Scholar * Yang, X. _et al._ Single-carrier QAM/QNSC and PSK/QNSC transmission systems with bit-resolution
limited DACs. _Opt. Commun._ 445, 29–35 (2019). Article ADS CAS Google Scholar * Roy Glauber, J. Quantum optics and heavy ion physics. _Nucl. Phys. A_ 774, 3–13 (2006). Article Google
Scholar * Sudarshan, E. C. G. Equivalence of semiclassical and quantum mechanical descriptions of statistical light beams. _Phys. Rev. Lett._ 10, 277 (1963). Article ADS MathSciNet MATH
Google Scholar * M. Khalil et al. Security performance of public key distribution in coherent optical communications links. In _3rd International Conference on Computer Communication and
the Internet (ICCCI)_ (2021). * Kuang, R. et al. Pseudo quantum random number generator with quantum permutation pad. In _IEEE International Conference on Quantum Computing and Engineering
(QCE)_ (2021). * Medhi, D. & Ramasamy, K. _Network Routing: Algorithms, Protocols, and Architectures_ (Elsevier, 2018). Google Scholar * Goebel, B., Essiambre, R.-J., Kramer, G.,
Winzer, P. J. & Hanik, N. Calculation of mutual information for partially coherent gaussian channels with applications to fiber optics. _IEEE Trans. Inf. Theory_ 57, 5720–5736 (2011).
Article MathSciNet MATH Google Scholar * Shahriar, K. A. _et al._ Physical-layer secure optical communication based on randomized phase space in pseudo-3-party infrastructure. In
_Conference on Lasers and Electro-Optics_ (eds Shahriar, K. A. _et al._) (Optica Publishing Group, 2022). Google Scholar * Camatel, S. & Ferrero, V. Narrow linewidth CW laser phase
noise characterization methods for coherent transmission system applications. _J. Lightw. Technol._ 26, 3048–3055 (2008). Article ADS Google Scholar * Skorin-Kapov, N. _et al._ A new
approach to optical network security: Attack-aware routing and wavelength assignment. _IEEE/ACM Trans. Netw._ 18, 750–760 (2010). Article Google Scholar * Colavolpe, G. & Raheli, R.
The capacity of noncoherent channels. _Eur. Trans. Telecommun._ 12, 289–296 (2001). Article MATH Google Scholar Download references ACKNOWLEDGEMENTS We thank Ciena for the use of their
WaveLogic modem. This research was supported in part by the Natural Sciences and Engineering Research Council of Canada (NSERC) and MITACS Accelerate Program. AUTHOR INFORMATION AUTHORS AND
AFFILIATIONS * Quantropi Inc., Ottawa, ON, K1Z 8P8, Canada Adrian Chan & Randy Kuang * Department of Electrical and Computer Engineering, McGill University, Montreal, QC, H3A 0E9, Canada
Mostafa Khalil, Kh Arif Shahriar, David V. Plant & Lawrence R. Chen Authors * Adrian Chan View author publications You can also search for this author inPubMed Google Scholar * Mostafa
Khalil View author publications You can also search for this author inPubMed Google Scholar * Kh Arif Shahriar View author publications You can also search for this author inPubMed Google
Scholar * David V. Plant View author publications You can also search for this author inPubMed Google Scholar * Lawrence R. Chen View author publications You can also search for this author
inPubMed Google Scholar * Randy Kuang View author publications You can also search for this author inPubMed Google Scholar CONTRIBUTIONS A.C. performed theoretical analysis and simulations,
with assistance from M.K. and K.A.S. M.K. and K.A.S. performed experimental work. R.K. conceived the idea and supervised the study along with D.V.P. and L.R.C. All authors contributed to
data analysis and manuscript writing. CORRESPONDING AUTHOR Correspondence to Kh Arif Shahriar. ETHICS DECLARATIONS COMPETING INTERESTS The authors declare no competing interests. ADDITIONAL
INFORMATION PUBLISHER'S NOTE Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. RIGHTS AND PERMISSIONS OPEN ACCESS
This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as
long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third
party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the
article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the
copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. Reprints and permissions ABOUT THIS ARTICLE CITE THIS ARTICLE Chan, A., Khalil, M.,
Shahriar, K.A. _et al._ Encryption in phase space for classical coherent optical communications. _Sci Rep_ 13, 12965 (2023). https://doi.org/10.1038/s41598-023-39621-5 Download citation *
Received: 02 March 2023 * Accepted: 27 July 2023 * Published: 10 August 2023 * DOI: https://doi.org/10.1038/s41598-023-39621-5 SHARE THIS ARTICLE Anyone you share the following link with
will be able to read this content: Get shareable link Sorry, a shareable link is not currently available for this article. Copy to clipboard Provided by the Springer Nature SharedIt
content-sharing initiative
Trending News
India shines in uncertain global economy: NSE MD Ashishkumar Chauhan“India today shines as a beacon of stability and opportunity in the global economy,” he said while speaking at Assocham’...
NSE IPO issue to be resolved soon, confirms Sebi chairman Tuhin Kanta PandeyThe highly anticipated IPO of the National Stock Exchange (NSE) may soon get a green light from the market regulator, Se...
Is 40 MT on the anvil for Tata Steel after clocking 26.6 MT?On November 12, 2018, when Tata Steel conducted the groundbreaking ceremony for the expansion of Kalinganagar plant to e...
Neither trade nor talks with Pakistan, discussion only around PoK: PM ModiPrime Minister Narendra Modi, speaking in Bikaner, Rajasthan today, said there would be neither trade nor talks with Pak...
Jensen Huang’s Taiwan memory: Pancakes, night markets, and a tomato surpriseSign InHomeRankingsFortune 500 IndiaMost Powerful WomenThe Next 500Forty Under FortyBest B-SchoolsMNC 500ProfilesCompani...
Latests News
Encryption in phase space for classical coherent optical communicationsABSTRACT Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the ne...
The page you were looking for doesn't exist.You may have mistyped the address or the page may have moved.By proceeding, you agree to our Terms & Conditions and our ...
Did you know a healthy gut is linked to healthy aging?Memorial Day Sale! Join AARP for just $11 per year with a 5-year membership Join now and get a FREE gift. Expires 6/4 G...
Could the wagner group become a russian hezbollah? | thearticleOne year ago, the most consistent adjectives describing the Private Military Company known as the Wagner Group and its l...
We need a government of national unity. And we need it now. | thearticleJohn Major says that a national government may be necessary quite soon, probably after the next (inconclusive) general e...