The security is crucial in modern communications systems for preserving the transferred data. In this work, a secure fiber optic communication system utilizing Hill cipher algorithm is demonstrated and investigated vi...
详细信息
The security is crucial in modern communications systems for preserving the transferred data. In this work, a secure fiber optic communication system utilizing Hill cipher algorithm is demonstrated and investigated via integrated the matlab with optisystem software. The matlab is used to encrypt and decrypt the data in electrical domain. While the optisystem software is used to build a fiber optic communication system with a bit rate of 80 Gbps over a 77.4 km link distance. According to the results, the link distance is degraded due to the ciphering process to 41 km. The link distance was increased to 178 km by combining a dispersion compensation fiber and an erbium-doped fiber to improve both of the dispersion and attenuation in the proposed system, respectively.
With the increasing demand for image transmission in various fields including medical, military and multimedia, the security of information contained on these images has become a standing problem.. This work provides ...
详细信息
With the increasing demand for image transmission in various fields including medical, military and multimedia, the security of information contained on these images has become a standing problem.. This work provides information security for images transfer for 160 Gbps over 140 km optical fiber link. Image encryption and decryption is maintained by applying blowfish algorithm via matlab software with the adaption of optisystem software to examine data transmission over 16 channels WDM system.. The proposed algorithm has provide a large key space, resistivity to differential attacks, anti-differential attack, brute-force attack and less correlation between adjacent pixels However, channel dispersion and signal attenuation has been controlled with the adaption of symmetric dispersion compensation map and an erbium doped fiber amplifier (EDFA) at the end of the fiber link. Our WDM system design has reached a high figure of merit of about 22,400 as compared with different previous schemes. Moreover, to provoke the power of the proposed cipher algorithm, key space, correlations, histogram analysis and different security analysis has been studied and compared with other algorithms.
暂无评论