All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Review

, Volume: 10( 2) DOI: 10.37532/2320-6756.2022.10(2).263

Scattering of Perfect Optical Vortex Beams: Physical Unclonable Function

*Correspondence:
Bikash Kumar Das
Department of Physics, Technion-Israel Institute of Technology, Haifa, Israel
E-mail: bikash.das@campus.technion.ac.il

Received: December 01, 2021, Manuscript No. M- 48847; Editor assigned: December 4, 2021, PreQC No. P-48847; Reviewed: December 24, 2021, QC No. 48847; Revised: January 15, 2022, Manuscript No. R-48847; Published date: February 5, 2022, DOI: 10.37532/2320–6756.2022.10(2).263

Citation: Bikash Kumar Das, Scattering of Perfect Optical Vortex beams: Physical Unclonable Function, J Phys Astron.2022;10(2):263.

Abstract

Now-a-days, data security has become an important part for anyone connected to the web. Data security ensures that data is getting transmitted securely without any modifications or alterations to the intended receiver. To achieve data security, we have focused on the cryptography which helps to protect our information from being stolen or third-party attacks. Encryption techniques demonstrate an excellent deal of data security when implemented in an optical system such as Holography due to the inherent physical properties of light and the precision it demands. Such systems are somehow vulnerable during their digital implementation under various attacks called crypt-analysis due to the predictable nature of security keys used for the encryption. In this work, we are presenting a Physically Unclonable Functions (PUFs) for producing a robust (stable over time) security key for digital encryption systems. More specifically, we have used the correlation functions of scattered perfect optical vortex beams for the generation of keys which can be used for encryption of data. Here, we convert the 2-D correlation function to 1-D key and digitize based on the average value which will be the random sequence of 1s and 0s. In the best of our knowledge, we are reporting this work for the first time. The experiment and simulation results are well matched.

Keywords

Cryptography; Encryption; Decryption; PUF; Security; Cipher

Introduction

Since last several decades, Cryptography has acquired much popularity for secured transmission of information over an insecure channel like the internet. Information, which needs to be sent, is encrypted in the transmission end and is decrypted in the receiving end using appropriate keys (encrypted and decrypted keys may be same or different depending on the type). An algorithm is usually written for encryption of the information which unites original information with certain number of keys (string of bits) and this algorithm is popularly known as cipher [1]. Initially, classical cryptographic techniques such as symmetric key cryptography (Data Encryption Standard or Data Encryption Algorithm) and asymmetric or public key cryptography (RSA) were employed. In symmetric key cryptography, same key is used for encryption as well as decryption. So, some major difficulties get noticed with this cryptographic technique such as the distribution of key and detection of third parties i.e., eavesdropper which was later solved by quantum cryptography. In public key cryptography, the sender uses public key of the receiver to encrypt the information which is decrypted only with the receiver’s private key. Optical encryption of the information offers a low complexity and higher data rates as compared to electronic encryption. Now-a-days, cryptography is commonly used in various fields such as secured bank transactions, health care, social media, the Internet of Things (IoT), government, security protocols etc. For the first time in 1882, Miller introduced the One Time Pad (OTP) technique which basically uses a perfect random key that is at least as long as the original information. Presently, we are witnessing a constant evolution and change in the field of encryption.

Basically, physical unclonable functions (PUFs) is a physical object that for a given input and conditions (challenges) provides a physically defined “digital fingerprint” output (responses) which serves a unique identifier. PUFs are based on unique physical variations (microstructure) which occur naturally during manufacturing. Advantages of PUFs include (1) easy to evaluate (2) stability over time (3) difficult to replicate (4) impossible to duplicate (cloning of PUFs is impossible). These characteristics of PUFs make us believe that ground glass plate, which is being used for scattering of perfect optical vortex beam, can be used as a PUF device which produces a speckle pattern that can never be cloned.

The correlations in light beams are becoming one of the promising fields of study as it plays a vital role in certain applications such as communication [2,3]. The correlation functions that have singularities are named as “coherent vortices” [4,5]. Recently, these coherent vortices are realized in the intensity correlation of two speckle patterns of different orders [5,6].

As a fundamental attribute that describes statistical properties of random light fields, optical coherence has played an important role in understanding and tailoring light-matter interactions [2, 9]. Information encryption with the help of optical technologies has been studied extensively in the past decade due to remarkable multidimensional capabilities and ultrafast modulation speed afforded by the light fields [10, 11]. Numerous protocols for optical information encryption have been proposed since the double random phase encoding (DRPE) was developed by Refregier and Javidi [12]. Rigorous research on optical information encryption has been carried out till now using the DRPE or DRPE related techniques such as a fractional Fourier domain DRPE [13], lens less DRPE in the Fresnel domain [14], and multidimensional random phase encoding [15]. Recent progress in the light field structure engineering [ 16-18], has highlighted the degrees of freedom of a structured light field as the powerful tools for information encoding. The optical encryption protocols based on the phase structure modulation [19] and OAM and polarization state MDM [20-26] have been developed lately.

In this paper, we proposed a simple and effective method for the generation of Perfect Optical Vortex (POV) speckle pattern by scattering of POV beams through a Ground Glass Plate (GGP) and correlated the generated speckle patterns i.e2-D correlation from which 1-D key has been generated and is used for encryption purpose [7]. For efficient generation of keys, we have used Physically Unclonable Functions (PUFs) and then digitize based on average value which will be random sequence of 1s and 0s. Now-a-days, researchers are using optical technologies for encryption of sensitive information due to multidimensional capabilities of light field. In our work, we use an optical encryption protocol where the information to be sent is encoded with the correlation image of a structured POV beam.

Experiment

In our experiment, we have proposed the simplest method to generate a perfect optical vortex beam. FIG.1 shows the experimental set up to generate a perfect optical vortex beam and FIG.2 shows the scattering of perfect optical vortex beam through a ground glass plate (GGP) in order to produce perfect optical vortex speckle pattern. A He-Ne laser with a wavelength of 632nm has been used as an optical source which will generate Gaussian beam. The laser beam is made to fall on a reflecting mirror which will be reflected from it and will incident on an unpolarized beam splitter. A spatial light modulator (SLM) in phase only mode has been used which will introduce an optical vortex onto the laser beam. When the spatial light modulator is illuminated by laser beam, an optical vortex beam is produced. The desired beam selected with an aperture (A) is passed through an axicon of apex angle 1780 in order to convert the vortex beam into a non-diffracting Bessel-Gauge (BG) beam. An axicon has been placed at a distance of 50cm from the spatial light modulator. In order to obtain perfect optical vortex beam from Bessel-Gauge beam, a lens of focal length 30cm has been used which will simply perform the Fourier transform (image will be obtained at a very large distance) of BG beam. The intensity distribution of POV beam is recorded through a CCD Camera (FLIR, pixel size 3.45μm) which is placed at the Fourier plane.

physics-astronomy-vortex

Figure 1: (color line) Experimental setup for the generation of perfect optical vortex (POV) beams using a spatial light modulator (in phase only mode) and an axicon. M-Mirror, BD-Beam Dumper, BS-Beam Splitter, SLM-Spatial Light Modulator, A-Aperture, BG-Bessel Gauge, L-Lens, f-Focal Length, CCD-Charge Couple Device.

physics-astronomy-speckle

Figure 2: (color line) Experimental set up for generation of speckle from POV beams using ground glass plate and recording the speckle pattern using CCD camera.

The generated POV beams are allowed to pass through a ground glass plate (GGP) (DG10-600, from Thorlabs) for scattering. Ground glass plate is placed at a distance of 72.5 cm from the axicon. Due to interference of many scattered wavefronts, which arise due to the presence of inhomogeneities in GGP, a fine granular pattern of light having randomness is produced and is called as the speckle pattern. Speckle patterns have been recorded at different propagation distances using a CCD camera.

The field which hoists a POV beam having thin annular ring of order m is given by [8],

Where ρ0 is the POV beam radius and δ represents the Dirac Delta function having the following properties FIG.3:

physics-astronomy-SBB

Figure 3: Represents a new optical encryption protocol named as Saroj-Bhusan-Bikash (SBB Protocol) Protocol based on correlation function taken for perfect optical vortex speckles. An information with the correlation function combines with encryption keys forms an encoding system. We generate 2-D correlation image for correlation functions of different order POV beams using MATLAB coding and generate 1-D key from 2-D correlation image using Python. So, after encryption of the piece of information to be sent, cipher text is produced. Same encryption key will be used for decryption of cipher text in order to recover the original information.

A random phase function of e gets introduced in the beam when it is allowed to scatter through a ground glass plate. After scattering of the POV beam through GGP, field distribution of the speckle can be represented as,

Results and Discussion

In our work, we generate a special class of coherence vortex beam from the scattering of POV beams. The correlation function of the generated coherence vortex is generated by taking the intensity correlation of two speckle pattern corresponding to POV beams of different orders. The generated correlation function is given as,

Using equation (2) in the above equation with the help of Anger-Jacobi identity and integral properties of Dirac-Delta function, we get

From the above equation, it is clear that the correlation function of two speckle pattern of order m1 and m2 is completely dependent on the Bessel function of order m, where m=m2-m1.

For m1=m2, the cross-correlation function reduces to the auto-correlation function of order 0.

In our work, we have taken different values of m1 and m2 for the generation of correlation image of the speckles and to generate 1-D key from this image. Recent report shows that the Cross Spectral Density (CSD) of a random beam can be viewed as an effective career of an optically encoded information.

We take a ground glass plate as a Physical Unclonable Function (PUF) device which is having random inhomogeneities which are introduced during its manufacturing. PUF devices are difficult to duplicate and unclonable. So, producing two ground glass plates having same randomness is impossible. In our work, we are generating POV speckles by scattering of POV beams through a GGP. So, without the knowledge of the correlation function which depends on Bessel function of specific order and ground glass plate, an eavesdropper can’t access the information which is being sent. In our work, we have used a single encryption key for encoding the information and same key will be used for decoding the information as well FIG.4.

physics-astronomy-Bessel-Gauss

Figure 4: Represents experimentally generated Bessel-Gauss coherence functions of order m=0-2 at a propagation distance of 20 cm from the ground glass plate.

The complexity of measuring the correlation function makes our protocol the best fit for the encryption of the information.

Conclusion

In our work, we have proposed a protocol for optical information encryption into the fourth order correlation of the light fields expressed in terms of the cross spectral density function of the field. We encoded the information with the correlation function of generated POV speckles and found that this protocol enhances the information security as we are taking the help of a ground glass plate as the physical unclonable function device which cannot be cloned further. We found that huge amount of information is needed to reconstruct the cross spectral density distribution. So, the complexity in reconstruction of the cross spectral density distribution enhances the security of the encryption protocol. Our results show that the intensity correlation function of POV speckles of different orders serve as a tool in optical security and optical information security protocol.

References