Fig. 6: Experiments on key distribution and attacks in the spectral domain. | Nature Communications

Fig. 6: Experiments on key distribution and attacks in the spectral domain.

From: Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips

Fig. 6

a Experimental setup composed by two chips connected by a standard monomodal optical fiber SMF-28. b Communication sequence of the chosen input conditions between Alice and Bob. ce Example of data sent during one communication step, including c the individual random spectra of the user as measured from the communication line, d the combined spectra at the distal end measured by Alice and Bob, e the absolute spectral differences in the combined states measured by the users (solid blue line) and the state reconstructed by an ideal attacker (solid orange line). fh Encryption and decryption experiments. h shows the results of Eve from the best possible attempt to recreate the key of the users.

Back to article page