1 Introduction

To satisfy the increasing demand for data confidentiality and authenticity, it is important to ensure that communications are being properly secured. Since optical communication links have evolved from conventional applications in telecommunications to become the preferred infrastructure for transmitting substantial amounts of information, extensive research has been investigated to improve the optical networks’ performance. These improvements include spectral efficiency, data rate, and DSP speed [1, 2]. In long-haul optical fiber transmission, eavesdropping attacks are more likely to occur, wherein an eavesdropper can steal optical signals by tapping into the physical transmission links [35]. Various encryption techniques have been proposed and investigated to enhance the secrecy of information in fiber networks including QKD [6], optical chaos-based communication [7], optical steganography [8, 9], and XOR encryption [10, 11].

QKD can be achieved by encrypting the key information in the quantum states of a single photon, this is now known as the BB84 protocol [12]. QKD has the advantage of indicating whether an eavesdropper is trying to get the key information or not. However, QKD requires specialized infrastructure, including a single photon transmitter, detector, and quantum communication channels. QKD also has limited communication distance and low data rates [13].

Optical chaos-based communication can be seen as a jamming signal over an information signal. On the transmitter side, the information signal is coupled into a fiber loop and amplified by an EDFA, while on the receiver side, the chaotic signal is split and one of the taps goes through an open loop to regenerate the chaos, and the other tap is launched into a photodetector. To decrypt the signal correctly, the EDFA on the receiver side must match with the one on the transmitter side [1416]. The chaotic signals generated by such systems are not truly random, which can make them more susceptible to eavesdropping attacks by adversaries who can predict the behavior of the system.

Optical steganography is based on hiding the information signal in public channels, preventing eavesdroppers from detecting the stealth signal [8, 17]. One of the optical steganography techniques is done by using a temporal phase mask to encode the information signal by spreading the signal through CD, and only the right dispersion compensation receiver can decode the stealth signal correctly. However, data rates beyond 10 Gb/s remain a challenge in optical steganography [18].

Optical XOR gates have been recently investigated due to their high-speed encryption and electromagnetic wave immunity. However, the implementation of XOR gates requires special infrastructure and is limited in terms of transmission distance [11, 19].

In [20], Kuang and Bettenburg proposed a novel QKD-inspired approach using randomized Glauber states based on a round-trip mechanism for coherent optical communications. The roundtrip mechanism prevents sharing the secret key with any other entities. First, a user, Bob, creates a Glauber state as a quantum public key envelope by randomly modulating a secret phase that is known only to him and transmits the signal to another user, Alice, who modulates the information signal with no knowledge about the signal that Bob sent. Alice then transmits the signal back to Bob who is now able to use his secret key to read Alice’s information signal. In [2124], we have demonstrated extensive theoretical analysis of the latter approach through simulation using commercial software, Optisystem, and MATLAB, and in [25, 26], we experimentally validate our simulation results. In [27], we proposed a new encryption approach that is based on displacement operators in coherent optical communications and demonstrated theoretical proofs and preliminary simulation results. The DOCS is a generalized form of EPS [27]. Briefly, the EPS technique is based on creating a series of random phases that act like an envelope for the information signal and change its phases randomly. Only authorized users with the same random phase series can remove the envelope and detect the information signal. The generation of the encryption key can be done in the physical layer by employing a phase modulator before or after data modulation, and it can also be done in DSP for coherent optical communications. On the receiver side, the physical layer decryption can be done either by employing another phase modulator to reverse the phases by sharing the same series of random phases as a secret key, or in the DSP for a less complex system. The DOCS encryption approach creates a series of random phases with random amplitudes to encrypt the signal, making optical fiber links more secure against eavesdropping attacks.

Previously, we demonstrated simulation results of the security analysis of the proposed technique in [27]. In this paper, we experimentally validate the DOCS encryption approach in coherent optical communication systems over 80 km of SSMF. Employing the DOCS encryption approach, we achieve net data rates of 224, 448, and 560 Gb/s using dual-polarization QPSK, 16-QAM, and 32 QAM, respectively, and the measured BERs are below the FEC levels. We also investigate the challenges in coherent transmissions against eavesdropping attacks. Taken together, the experimental results indicate that the DOCS encryption technique has the potential to achieve a high level of physical layer security with acceptable performance at such high data rates and enhance data confidentiality in existing coherent optical communication systems. Compared to AES and RSA which have significant computational overhead due to the complexity of their algorithms [28], the computational overhead of the DOCS encryption relies mainly on the synchronization process for decryption. The throughput of the DOCS encryption is very high, as it does not significantly impact the data transmission rates. AES offers relatively high throughput but is still lower than DOCS due to its computational nature, and RSA has the lowest throughput among the three. One of the disadvantages of the DOCS encryption in practical deployment is that the codeword still needs to be shared with other parties for decryption.

2 Operating principles

An example of a geometric representation based on the DOCS encryption technique for coherent optical transmission is shown in Fig. 1. Assume we have typical QPSK modulation format symbols defined in the phase space as illustrated in red dots. After applying the displacement operator, \(\hat{D} (\alpha ) \), the symbols are displaced to another location in the phase space as illustrated in blue dots. In general, the \(\hat{D} (\alpha ) \) displaces any input state \(|\alpha \rangle \) to any other state \(| \beta \rangle \) in the phase space [29]. A phase shift operator \(\hat{D} (\alpha = |\beta | e^{j\varphi })\) is a special case of a displacement operator, where symbols are displaced with a fixed amplitude and random phases in the phase space. In [27], we proved that the displacement operator is a unitary reversible operator. Therefore, applying the displacement operator to a coherent state, and then applying the inverse of the displacement operator returns the coherent state to its original geometry in phase space. The displacements applied to the information symbols can be completely random in phase space, namely, phases are not just restricted to 0 and π, nor amplitudes are restricted to certain values. Therefore, the number of possible random displacement masks can be vast. For example, if the phase mask has \(N = 30\) values, and the phase shifts \(\varphi = \pi \times m\), where \(m \in (0, 1, 2, \ldots, 6)\), then there are 730 possibilities in the random phase mask. The same formula can be used to determine the possibilities in the amplitude variation mask. The total number of possibilities is the summation of the phase and amplitude masks.

Figure 1
figure 1

Illustration of the DOCS encryption technique and the DSP routine in transmitter and receiver of a coherent optical transmission system. BER: bit error ratio. CD: chromatic dispersion. ADC: analog-to-digital conversion

The displacement operator in a coherent state can be expressed as follows:

$$ \hat{D} (t) = \bigl\vert \beta (t) \bigr\vert e^{j (\varphi (t)+\delta \varphi )} $$
(1)

where \(\beta (t)\) and \(\varphi (t)\) are the amplitude variation and the phase deviation applied to the information signal, respectively, and δφ is an initial random phase of the displacement operator. Let us assume an information signal, \(s(t)\), then, the encrypted information signal can be expressed as follows:

$$ s(t)_{En} = s(t) \otimes \bigl\vert \beta (t) \bigr\vert e^{j (\varphi (t)+\delta \varphi )} \hat{e} $$
(2)

where, ê is the polarization unit vector. The information signal, \(s(t)\), can be modulated using any modulation format. In our demonstration, we focus on QPSK and QAM modulation formats. After transmitting the encrypted signal over optical fiber, and assuming the impulse response of the fiber channel is \(f(t)_{\text{fiber}}\), the received signal can be expressed as follows:

$$ s(t)_{Rx} = s(t)_{En} \otimes f(t)_{\text{fiber}} $$
(3)

To decrypt the signal, we apply the inverse of the displacement operator to the received signal as follows:

$$ s(t)_{De} = \bigl\{ s(t)_{Rx} \otimes \bigl\vert \beta ^{\prime }(t) \bigr\vert e^{-j (\varphi (t)+ \delta \varphi )} \bigr\} \otimes f^{\prime }(t)_{\text{fiber}} $$
(4)

where \(f^{\prime }(t)_{\text{fiber}}\) is the CD compensation element corresponding to the fiber channel. The amplitude variation codeword, \(\beta (t)\), should be chosen carefully to satisfy the power constraint of the system. Symbols with a high PAPR introduce a larger nonlinear phenomenon and limit the system’s performance [30]. The DAC and ADC operate with a finite ENoB, which adds quantization noise to the information signal [31]. The phase deviation codeword, \(\varphi (t)\), can be chosen randomly as we mentioned earlier. We emphasize this point because such encryption is novel and represents one of our main contributions. In general, high-order modulation formats tend to have a lower tolerance to noise due to the reduction in the Euclidean distance between constellation points. In higher-order modulation formats, more bits are transmitted per symbol, resulting in a denser constellation diagram. Thus, the DOCS encryption technique affects higher-order modulation formats than lower-order ones.

The baseline DSP flow is also shown in Fig. 1. On the transmitter side, the data source is obtained by generating a PRBS, which is then mapped into QAM symbols. Then, the generated symbols are processed by the displacement operator encryption scheme. Pilot symbols are appended to the symbols for synchronization. The encrypted symbol sequence is up-sampled to 2 SPS, shaped by a RRC pulse filter, and resampled to match the DAC sampling rate. On the receiver side, a series of signal processing techniques are applied to ensure accurate reception of the signal before decryption. These techniques include ADC de-skew, resampling, CD compensation, synchronization, matched filtering, adaptive equalization, down-sampling to 1 SPS, and carrier phase recovery which is based on the BPS algorithm [32]. Then, the inverse of the displacement operator is applied to decrypt the signal, and symbols are de-mapped into QAM symbols and then bits for BER calculations.

3 Experimental results and discussion

The experimental setup of a secure coherent optical transmission system using the DOCS encryption technique is shown in Fig. 2. The transmitter side comprises a μITLA, a DAC, a dual-polarization DP-IQM, and an EDFA. The μITLA generates light at a wavelength of 1550 nm, and the DP-IQM modulates the optical signal with the encrypted mapped and pre-emphasized data sequence. Both polarizations are encrypted using the same displacement operator. The sampling rate of the DAC and ADC is the same and approximately 70 GSa/s with 8-bit resolution. The DP-IQM has 4 channels representing IQ and dual polarization status and are organized in order as XI, XQ, YI, and YQ, respectively. Then, the optical signal is amplified with an EDFA before it is launched into the 80-km of SSMF. On the receiver side, a typical coherent detection system is used. A μITLA is used as a LO and mixed with the encrypted signal through a 90o optical hybrid. The beating signal is detected by BPDs, and the electrical signal is captured for signal processing. The transmitter and receiver DSP steps to employ the DOCS encryption and decryption technique are illustrated in Fig. 1. We conducted our experiment using a commercial coherent transceiver modem. The integrated laser within the coherent transceiver modem boasts a linewidth below 100 kHz, which indicates low phase noise, thereby ensuring high coherence and stability in our optical signal. The coherent transciever modem can operate stably over a range of operating conditions. The experiments were conducted in a lab, and the devices were in a quasi-stable environment (temperature fluctuations and vibrations are slow varying). As we repeated the experiments multiple times on different dates, we obtained very similar performance when reproducing the experiments so that these slow fluctuations did not seem to have an impact. The receiver sensitivity could detect signals below −30 dBm.

Figure 2
figure 2

The experimental setup of the DOCS encryption technique in a typical coherent optical transmission. μITLA: micro-integrable tunable laser assembly. EDFA: erbium-doped fiber amplifier. BPDs: balanced photodetectors

To assess the performance of the DOCS encryption technique, first, spectra, and histograms are calculated at the transmitter side with and without the DOCS encryption technique. Then, BER analyses are presented for each case at different codeword symbol shifts, phase deviations, and ROP over 80-km SSMF transmission. We also investigate the performance of the system when two random displacement operators are applied to the two polarization states, X and Y, separately.

3.1 Loaded electrical signals characteristics

The double-sideband spectra of QPSK, 16QAM, and 32QAM before and after pre-emphasizes are shown in Fig. 3 (a) and (b), respectively. The double-sideband spectra are obtained by fast Fourier transform (FFT) of the data sequence of the corresponding modulation format. Figure 3 row (c) represents cumulative distribution histograms of a typical QPSK, a QPSK with the DOCS encryption technique applied to the two polarization states, a QPSK with two random displacement operators each applied to X-Y polarization states and QPSK quantified cumulative distribution histogram, respectively. Figure 3 rows (d) and (e) represent the same thing for 16QAM and 32QAM modulation formats, respectively. These histograms are important to show the penalty of signal qualities with and without the DOCS encryption technique. Reduced signal qualities come as a trade-off for high-level signal encryption.

Figure 3
figure 3

(a) The double-sideband spectra, and (b) the pre-emphasized double-sideband spectra of transmitted QPSK, 16QAM, and 32QAM. Rows (c), (d), and (e) represent the cumulative distribution histogram of a typical QAM modulation format, QAM with DOCS encryption technique, QAM with different DOCS encryption employed on the X and Y polarization states, and the corresponding quantified cumulative distribution for QPSK, 16QAM, and 32QAM, respectively

3.2 Performance evaluation of the DOCS encryption technique

We evaluate the system performance with and without encryption to better assess the penalty of applying the DOCS encryption technique. All experimental results presented in this paper are dual-polarization at 56 GBd after 80-km SSMF transmission. The net bit rates achieved are 224, 448, and 560 Gb/s for QPSK, 16QAM, and 32QAM modulation formats, respectively.

Figure 4 (a) shows the average BER as a function of ROP for QPSK, 16QAM, and 32QAM with (straight lines) and without (dashed lines) employing the DOCS encryption technique. As expected, there is a noticeable degradation in performance compared to the case without encryption. However, most of the points scored BER values below the SD-FEC threshold \(2.4 \times 10^{-2}\). For ROP \(> -20\) dBm, QPSK and 16QAM scored BER lower than the HD-FEC threshold \(3.8 \times 10^{-3}\). In general, the trade-off in using higher-order modulation formats like 32QAM is that they offer higher data rates, but they are more sensitive to noise including, but not limited to, DAC, ADC, RF amplifiers, and BPDs. In the ROP analysis, the encryption and decryption are considered to be matched and synchronized. The constellation diagrams of QPSK, 16QAM, and 32QAM are shown in Fig. 5 column 1 (correct decryption). Since we use pilot symbols to help with symbol synchronization, it becomes impractical for the adversary to find the right synchronization between the transmitted and received symbols, assuming the adversary has complete knowledge of the transmitted data and the codeword used for encryption.

Figure 4
figure 4

(a) Measured BER as a function of ROP for different modulation formats with and without the DOCS encryption. (b) Measured BER as a function of the shifts in the exact codeword used for encryption and decryption for different modulation formats. (c) Measured BER as a function of the phase deviation of the exact codeword used for encryption and decryption for different modulation formats. (d) Measured BER as a function of phase deviation of two random DOCS codewords used to encrypt the two polarization states to add another layer of security

Figure 5
figure 5

Constellation diagrams of QPSK, 16QAM, and 32QAM when the correct DOCS decryption is used, a single-symbol shift in the correct codeword, a single-phase shift in the correct codeword, and a different DOCS decryption, respectively

For an eavesdropper to decrypt the signal correctly, the exact codeword must be used with the right synchronization, amplitude variations, and phase deviation. Since the DOCS encryption technique is completely random and any values of amplitude variations and phase deviations can be used within the phase space of the QAM symbols, the decryption process using brute force becomes more and more complicated. To begin the eavesdropping analysis against our robust system, we assume that an eavesdropper taps into the fiber link and uses the exact receiver technology as an authenticated receiver without knowledge of the codeword used, this assumption is well-known in cryptography as Kerckhoffs’ Principle [33].

Figure 4 (b) shows the BER as a function of codeword symbol shift. The results indicate that employing the correct codeword for decryption, but with a single-symbol shift (or more), results in an immediate increase in the BER to approximately 50%. A single-symbol shift in the exact codeword means that information symbols are displaced to new geometry in the phase space, which means every false attempt complicates the decryption process in a real-time scenario. The corresponding constellation diagrams are shown in Fig. 5 column 2 (1 symbol shift) for QPSK, 16QAM, and 32QAM. Next, we assume the correct synchronization and amplitude variations are found but not the correct phase deviation. Figure 4 (c) shows the BER as a function of the phase deviation used to decrypt the signal. A single-phase deviation shift (or more) also leads to an immediate increase in the BER to approximately 50% for the tested modulation formats. Since the received encrypted signal has an ambiguous structure, the BPS algorithm failed to compensate for the mismatching of the phase deviation even with the exact codeword and perfect synchronization. It is also important to note that signals using low-order modulation formats, such as QPSK, can tolerate more key noise than signals using high-order modulation formats, such as 32QAM, at the same symbol rate of 56 GBd. The corresponding constellation diagrams are shown in Fig. 5 column 3 (1 phase shift) for QPSK, 16QAM, and 32QAM.

We further explore the performance of the system when each polarization state, X and Y, is encrypted with a random different displacement operator. Equation (2) can be expressed for the two polarization states as follows:

$$\begin{aligned}& \begin{bmatrix} s_{En,x}(t) \\ s_{En,y}(t) \end{bmatrix} = \begin{bmatrix} s_{x}(t) & 0 \\ 0 & s_{y}(t) \end{bmatrix} \begin{bmatrix} \vert \beta _{x}(t) \vert e^{j(\varphi _{x}(t)+\delta \varphi _{x})} \\ \vert \beta _{y}(t) \vert e^{j(\varphi _{y}(t)+\delta \varphi _{y})} \end{bmatrix} \end{aligned}$$
(5)

Figure 4 (d) shows the measured BER as a function of phase deviation for different encryption in the X-Y polarization. Data points below the SD-FEC threshold are with the correct phase deviation and synchronization for each polarization. If the inverse of the X-polarized displacement operator is applied to decrypt the Y-polarized signal, the measured BER is above 30%, and vice versa. The corresponding constellation diagrams are shown in Fig. 6. In general, if a false displacement operator is applied to decrypt the signal, the adversary should not be able to extract any information from the signal. The constellation diagrams in this case are shown in Fig. 5, column 4.

Figure 6
figure 6

The two polarization states are encrypted with two different displacement operators. Constellation diagrams of QPSK, 16QAM, and 32QAM when the decryption of X-polarized symbols is done using the Y-polarized displacement operator and vice versa

4 Discussion and summary

We have demonstrated experimental validation of quantum encryption in phase space using the displacement operator technique in a conventional coherent optical communication system. Our investigation focused on assessing the system’s performance both with and without encryption, allowing us to quantify the impact of the proposed encryption technique. Experimental results indicate the feasibility of implementing the DOCS encryption technique within the existing coherent optical communication infrastructure.

In our demonstration, we intentionally avoided the displacement operator causing destructive interference with the modulated data for simplicity. Specifically, the phases of the displacement operator were selected to ensure they did not align oppositely to those of the symbols across all QAM modulation formats. For instance, in the case of QPSK, where the phases of the modulated data are 45, 135, 225, and 315 degrees, the phases of the displacement operator were carefully chosen not to be opposite to these phases. This constraint restricts the permissible phase choices for the displacement operator, excluding those within ±1 degree of the modulation format phases, as illustrated by our experimental findings in Fig. 4(b). Thus, we avoided scenarios where the signal would fall below the system’s detection threshold. In practical applications, once the modulation format is agreed upon between authenticated users, the displacement operator is selected to prevent any destructive interference with the modulated data.

Although we did not have access to directly measure thermal noise and shot noise in the receiver, by comparing results with and without encryption, we aimed to investigate the impact of the displacement operator on the system’s overall performance. When performing the comparison, the impact of thermal and shot noise in the receiver are already considered. These noise sources are inherent in any optical communication system. However, distinguishing the exact contribution of thermal noise versus shot noise to the overall system performance is challenging. This difficulty arises because these noise sources interact in complex ways with the signal and with each other, making it impractical to isolate their individual effects explicitly.

The security aspect of DOCS encryption becomes evident when considering potential eavesdropping attempts. If an adversary gains access to the fiber link and detects the encrypted signal, complete knowledge of the DOCS encryption is required for successful decryption. Any false trial by the adversary only introduces additional ambiguity to the received signal, enhancing the security of the communication channel.

The integration of the DOCS encryption/decryption technique with coherent DSP at the transmitter/receiver ends establishes a robust foundation for secure data transmission. The proposed encryption technique is tested over 80 km-SSMF transmissions using dual polarization at 56 GBd. The net bit rates achieved are 224, 448, and 560 Gb/s for QPSK, 16QAM, and 32QAM modulation formats, respectively. Our experimental results demonstrate that attempting to decrypt the signal with any symbol shift, phase deviation shift, or a different codeword results in a BER of approximately 50%. This highlights the resilience of DOCS encryption against eavesdropping attacks, showcasing its effectiveness in ensuring the confidentiality of the transmitted data. Future investigations include assessments of how the proposed encryption technique performs under common optical communication interference such as cross-talk or multipath interference.