Advertisement

Secure Coherence Modulation Telecommunication System

  • B. Wacogne
  • H. Porte
  • P. Mollier
  • D. A. Jackson

Abstract

Recently, with the rapid development of optical telecommunications, a considerable interest as been shown for secure optical transmission. Coding techniques which are not based on intensity modulation can potentially be adapted for secure transmission. Among the different techniques available, the most popular are probably based on frequency1, phase2, coherent correlation3, and coherence modulation4. The coherent schemes employ two interferometers illuminated by a Broadband Source (BBS) with a coherence length shorter than the interferometer’s Optical Path Difference (OPD). Information is encoded by modulating the emitter interferometer’s OPD. The constant optical power transmitted in such systems is attractive for secure communication since, “apparently”, a perfectly matched receiving interferometer is required to decode the signal.

Keywords

Wave Packet Coherence Length Lithium Niobate Optical Path Difference Transmission Link 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    D. Mathoorasing, C. Kazmierski, Y. Sorel, and J.F. Kerdiles, Distance Transmission Limits ..., Electron. Lett., Vol. 30, No. 17, 1428, (1994)CrossRefGoogle Scholar
  2. 2.
    J.H. Shapiro, On the Performance of Optical PSK ..., IEEE Photon. Tech. Lett., Vol. 4, No. 6, 647, (1992)CrossRefGoogle Scholar
  3. 3.
    R.A. Griffin, D.D. Sampson, and D.A. Jackson, Demonstration of Data Transmission ..., IEEE Phot. Tech. Lett., Vol. 4, No. 5, 513, (1992)CrossRefGoogle Scholar
  4. 4.
    C. Gutierrez-Martinez, H. Porte, and J.P. Goedgebuer, Microwave Integrated ..., Micro, and Opt. Tech. Lett., Vol. 10, No. 1, 66, (1995)CrossRefGoogle Scholar
  5. 5.
    B. Wacogne, and D.A. Jackson, Security Vulnerability ..., IEEE Photon. Tech. Lett., Vol. 8, No. 3, 470, (1996)CrossRefGoogle Scholar
  6. 6.
    W. Wells, R. Stone, and E. Miles, Secure Communications ..., IEEE J. on Selected Areas in Communications, Vol. 11, 770, (1993)CrossRefGoogle Scholar
  7. 7.
    J. Hauden, H. Porte, J.P. Goedgebuer, Quasi-Polarisation Independent...lEEE J. of Quant. Elec, Vol. 30, No. 10, 2325, (1994)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 1997

Authors and Affiliations

  • B. Wacogne
    • 1
  • H. Porte
    • 2
  • P. Mollier
    • 2
  • D. A. Jackson
    • 1
  1. 1.Applied Optics Group, Physics DepartmentUniversity of Kent at CanterburyCanterburyUK
  2. 2.Laboratoire d’Optique P.M. DuffieuxFaculté des Sciences et des TechniquesBesançon cedexFrance

Personalised recommendations