Experimental multiplexing protocol to encrypt messages of any length
- Autores
- Barrera, John Fredy; Velez, Alejandro; Torroba, Roberto Daniel
- Año de publicación
- 2013
- Idioma
- inglés
- Tipo de recurso
- artículo
- Estado
- versión publicada
- Descripción
- As optical systems are diffraction limited, it is not possible to encrypt in a single step texts containing a large amount of characters. We overcome this situation by separately encrypting several characters, along with a multiplexing procedure to obtain an encrypted keyboard. The experimental application is performed in a joint transform correlator architecture and using digital holography. We combine the different characters into a keyboard encrypted with a single phase mask together with a selection-position key that gives the right sequence to recover safe encrypted messages. The multiplexing operation we suggest is advantageous in the sense that the technique enables processing of messages that otherwise the optical system could not process in a single step. We also employ a repositioning technique to prevent both the natural background noise over recovered characters and the possible cross talk. The lack of any single key avoids the correct message recovery. Experimental results are presented to show the feasibility of our proposal, representing an actual application of the optical encrypting protocols.
Fil: Barrera, John Fredy. Universidad de Antioquia; Colombia
Fil: Velez, Alejandro. Universidad de Antioquia; Colombia
Fil: Torroba, Roberto Daniel. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico la Plata. Centro de Investigaciones Opticas (i); Argentina - Materia
-
Encryption
Messages
Encrypted Keyboard
Speckle - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- https://creativecommons.org/licenses/by-nc-sa/2.5/ar/
- Repositorio
- Institución
- Consejo Nacional de Investigaciones Científicas y Técnicas
- OAI Identificador
- oai:ri.conicet.gov.ar:11336/7439
Ver los metadatos del registro completo
id |
CONICETDig_450eaccec67a21d7cb21e46742ee9218 |
---|---|
oai_identifier_str |
oai:ri.conicet.gov.ar:11336/7439 |
network_acronym_str |
CONICETDig |
repository_id_str |
3498 |
network_name_str |
CONICET Digital (CONICET) |
spelling |
Experimental multiplexing protocol to encrypt messages of any lengthBarrera, John FredyVelez, AlejandroTorroba, Roberto DanielEncryptionMessagesEncrypted KeyboardSpecklehttps://purl.org/becyt/ford/1.3https://purl.org/becyt/ford/1As optical systems are diffraction limited, it is not possible to encrypt in a single step texts containing a large amount of characters. We overcome this situation by separately encrypting several characters, along with a multiplexing procedure to obtain an encrypted keyboard. The experimental application is performed in a joint transform correlator architecture and using digital holography. We combine the different characters into a keyboard encrypted with a single phase mask together with a selection-position key that gives the right sequence to recover safe encrypted messages. The multiplexing operation we suggest is advantageous in the sense that the technique enables processing of messages that otherwise the optical system could not process in a single step. We also employ a repositioning technique to prevent both the natural background noise over recovered characters and the possible cross talk. The lack of any single key avoids the correct message recovery. Experimental results are presented to show the feasibility of our proposal, representing an actual application of the optical encrypting protocols.Fil: Barrera, John Fredy. Universidad de Antioquia; ColombiaFil: Velez, Alejandro. Universidad de Antioquia; ColombiaFil: Torroba, Roberto Daniel. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico la Plata. Centro de Investigaciones Opticas (i); ArgentinaIOP Publishing2013-03info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdfapplication/pdfhttp://hdl.handle.net/11336/7439Barrera, John Fredy; Velez, Alejandro; Torroba, Roberto Daniel; Experimental multiplexing protocol to encrypt messages of any length; IOP Publishing; Journal of Optics; 15; 5; 3-2013; 55404-554042040-8978enginfo:eu-repo/semantics/altIdentifier/url/http://iopscience.iop.org/article/10.1088/2040-8978/15/5/055404/metainfo:eu-repo/semantics/altIdentifier/doi/10.1088/2040-8978/15/5/055404info:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-sa/2.5/ar/reponame:CONICET Digital (CONICET)instname:Consejo Nacional de Investigaciones Científicas y Técnicas2025-09-03T09:46:15Zoai:ri.conicet.gov.ar:11336/7439instacron:CONICETInstitucionalhttp://ri.conicet.gov.ar/Organismo científico-tecnológicoNo correspondehttp://ri.conicet.gov.ar/oai/requestdasensio@conicet.gov.ar; lcarlino@conicet.gov.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:34982025-09-03 09:46:16.007CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicasfalse |
dc.title.none.fl_str_mv |
Experimental multiplexing protocol to encrypt messages of any length |
title |
Experimental multiplexing protocol to encrypt messages of any length |
spellingShingle |
Experimental multiplexing protocol to encrypt messages of any length Barrera, John Fredy Encryption Messages Encrypted Keyboard Speckle |
title_short |
Experimental multiplexing protocol to encrypt messages of any length |
title_full |
Experimental multiplexing protocol to encrypt messages of any length |
title_fullStr |
Experimental multiplexing protocol to encrypt messages of any length |
title_full_unstemmed |
Experimental multiplexing protocol to encrypt messages of any length |
title_sort |
Experimental multiplexing protocol to encrypt messages of any length |
dc.creator.none.fl_str_mv |
Barrera, John Fredy Velez, Alejandro Torroba, Roberto Daniel |
author |
Barrera, John Fredy |
author_facet |
Barrera, John Fredy Velez, Alejandro Torroba, Roberto Daniel |
author_role |
author |
author2 |
Velez, Alejandro Torroba, Roberto Daniel |
author2_role |
author author |
dc.subject.none.fl_str_mv |
Encryption Messages Encrypted Keyboard Speckle |
topic |
Encryption Messages Encrypted Keyboard Speckle |
purl_subject.fl_str_mv |
https://purl.org/becyt/ford/1.3 https://purl.org/becyt/ford/1 |
dc.description.none.fl_txt_mv |
As optical systems are diffraction limited, it is not possible to encrypt in a single step texts containing a large amount of characters. We overcome this situation by separately encrypting several characters, along with a multiplexing procedure to obtain an encrypted keyboard. The experimental application is performed in a joint transform correlator architecture and using digital holography. We combine the different characters into a keyboard encrypted with a single phase mask together with a selection-position key that gives the right sequence to recover safe encrypted messages. The multiplexing operation we suggest is advantageous in the sense that the technique enables processing of messages that otherwise the optical system could not process in a single step. We also employ a repositioning technique to prevent both the natural background noise over recovered characters and the possible cross talk. The lack of any single key avoids the correct message recovery. Experimental results are presented to show the feasibility of our proposal, representing an actual application of the optical encrypting protocols. Fil: Barrera, John Fredy. Universidad de Antioquia; Colombia Fil: Velez, Alejandro. Universidad de Antioquia; Colombia Fil: Torroba, Roberto Daniel. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico la Plata. Centro de Investigaciones Opticas (i); Argentina |
description |
As optical systems are diffraction limited, it is not possible to encrypt in a single step texts containing a large amount of characters. We overcome this situation by separately encrypting several characters, along with a multiplexing procedure to obtain an encrypted keyboard. The experimental application is performed in a joint transform correlator architecture and using digital holography. We combine the different characters into a keyboard encrypted with a single phase mask together with a selection-position key that gives the right sequence to recover safe encrypted messages. The multiplexing operation we suggest is advantageous in the sense that the technique enables processing of messages that otherwise the optical system could not process in a single step. We also employ a repositioning technique to prevent both the natural background noise over recovered characters and the possible cross talk. The lack of any single key avoids the correct message recovery. Experimental results are presented to show the feasibility of our proposal, representing an actual application of the optical encrypting protocols. |
publishDate |
2013 |
dc.date.none.fl_str_mv |
2013-03 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion http://purl.org/coar/resource_type/c_6501 info:ar-repo/semantics/articulo |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://hdl.handle.net/11336/7439 Barrera, John Fredy; Velez, Alejandro; Torroba, Roberto Daniel; Experimental multiplexing protocol to encrypt messages of any length; IOP Publishing; Journal of Optics; 15; 5; 3-2013; 55404-55404 2040-8978 |
url |
http://hdl.handle.net/11336/7439 |
identifier_str_mv |
Barrera, John Fredy; Velez, Alejandro; Torroba, Roberto Daniel; Experimental multiplexing protocol to encrypt messages of any length; IOP Publishing; Journal of Optics; 15; 5; 3-2013; 55404-55404 2040-8978 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/url/http://iopscience.iop.org/article/10.1088/2040-8978/15/5/055404/meta info:eu-repo/semantics/altIdentifier/doi/10.1088/2040-8978/15/5/055404 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/ |
dc.format.none.fl_str_mv |
application/pdf application/pdf |
dc.publisher.none.fl_str_mv |
IOP Publishing |
publisher.none.fl_str_mv |
IOP Publishing |
dc.source.none.fl_str_mv |
reponame:CONICET Digital (CONICET) instname:Consejo Nacional de Investigaciones Científicas y Técnicas |
reponame_str |
CONICET Digital (CONICET) |
collection |
CONICET Digital (CONICET) |
instname_str |
Consejo Nacional de Investigaciones Científicas y Técnicas |
repository.name.fl_str_mv |
CONICET Digital (CONICET) - Consejo Nacional de Investigaciones Científicas y Técnicas |
repository.mail.fl_str_mv |
dasensio@conicet.gov.ar; lcarlino@conicet.gov.ar |
_version_ |
1842268780968804352 |
score |
13.13397 |