Fig 2 - uploaded by Preecha Yupapin
Content may be subject to copyright.
Message authentication code diagram 

Message authentication code diagram 

Source publication
Article
Full-text available
We propose a novel method that can be used to perform the data verification and encryption by using the microring resonators incorporating an add/drop filter, where the confidentiality and integrity of information in optical communication can be formed. In this paper, the encryption is formed by the chaotic noise sophisticates irreversible and unpr...

Contexts in source publication

Context 1
... cryptography, a message authentication code (MAC) is information that uses to authenticate the message. The objective of MAC is to ensure that two or more parties, who share the secret key, can communicate with the capacity to identify any modifications to the message in transportation. This prevents an attacker from modifying the message to gain undesirable outcome. MAC algorithm is achieved by accepting as input the message and secret key and producing a fixed size MAC code. The message and MAC code are transmitted to the receiver, who can then re- compute the MAC code and compare it against the MAC code that was transmitted. If they match, the message is almost definitely approved. Otherwise, the message is incorrect and should be ignored, or drop the transmission, as it is likely being tampered with, depending on the situation. The general operation schematic diagram of MAC is as shown in Fig 2. Because MAC algorithm characteristics such as sophisticates, irreversible, and unpredictable are much like chaos in microring resonator, MAC algorithm module can be built by using a microring resonator. In this research, two microring resonators and one add/drop are combined together as shown in Fig 3(a) to generate message authentication code. By this structure, input signal and key signal permute in a microring resonator. Afterward, both unformulated signal of input and key combined together using add/drop to generate message authentication code that exclusively related to data and key signal. In operation, a sine wave with amplitude 1MHz, 0.4 mW, 4mW average power data signal and 0.35 MHz, 1.4 mW and 4 mW average power key signal are input into the system as shown in Fig. 3(b) and 3(c), respectively, then propagate into each waveguide as shown in Fig 3(a). The signal center wavelength (Lambda) of both signals is 1.55 μm. Key signals and data signal are hashed by 10 μm microring resonator radii, R 1 and R 3 , respectively. Coupling coefficient of hashed microrings, κ 1 = κ 4, , which is equal to 0.212, where the linear and nonlinear coefficients are 1.2 and 3.8 x 10 -13 cm 2 /W respectively, the effective core area equal to 0.30 μm 2 . Both outputs from each microring are input into add/drop filter, R 3 , to produce MAC code, the add/drop ring resonator radius is 5 μm, the coupling coefficient of add/drop are κ 2 and κ 3 , which are equal to 0.9 and 0.1, respectively, the ffractional coupler intensity loss of both side of microring are γ = 0.3. The waveguide ring resonator loss is α = 0.06 dBmm -1 . The MAC code can be formed by using the proposed configuration, which is related to key signal as shown in Fig 3(d). Furthermore, the digital message authentication code is able to generate by using digitized technique in [17]. In secure communication, encryption is method to ensure that transmission data between sender and receiver still unrevealed. This prevents an attacker from tapping information, exploit, modify, or obtain undesirable outcome from communication channel. Encryption algorithms accomplish this by accepting as input the message and secret key and producing a cipher text that unable to interpret without correct secret key and encryption algorithm. These secret messages are transmitted to the other party, who can then decrypt the cipher text into original data by using decryption algorithm and same secret key. Otherwise, the cipher text is unable to decipher into original message. Because characteristic of encrypting algorithms are much like characteristic of chaos such as sophisticates, irreversible, and unpredictable, encryption method can be built by using microring resonator. To secure transmission via noisy channel, chaos signals are generated by passing key signal into microring resonator and then compose with encoded data to generate cipher text. At the receiver, users who know secret key are able to both generate the same chaos pattern and filter chaos signal from cipher text signal to get encoded data. Subsequently, by using suitable decoder, original data signal are produced. Schematic of these methods are shown in Fig 4. In this process, suitable procedures of encoder and decoder module for continuous signal are differentiation and integration function, respectively, to maintain the chaotic pattern of encrypted data in communication channel. When pass through communication channel, data signal always scramble within noisy signal. Any sniffed data between communication links are unable to interpret without same key information, correct microring specification, and suitable encoding method. This technique always maintains confidentiality along the transmission channel. In our simulation, to generate hash signal, a sine wave with 0.25 MHz, 0.05mW amplitude, 4 mW average power key signal as shown in Fig 5(a), is input into a waveguide of 10 μm microring resonator radius. In addition, 1 W, 0.25 MHz sine wave with 4 W average power data signal as shown in Fig 5(b), is input into the encoder, where the encoded signal can be formed. The wavelength (Lambda) of waveguide is 1.55 μm, the coupling coefficient is equal to 0.212. The linear and nonlinear coefficients are equal to 1.2 and 3.8 x 10-13 cm 2 /W, respectively, the effective core area is equal to 0.30 μm 2 . Both encoded and chaotic signals are combined to produce the encrypted signal as shown in Fig 5(c). At the receiver end, both similar key signals and device configuration are required to generate same chaotic signal for decipher, where the cipher text and encoded data signal can be provided. Finally, the encoded data into decoding module to retrieve the original data is provided, as shown in Fig 5(d). Generally, the steganography is a security technique to hide information within other data for specific purposes, for instance, for owner identification, integrity inspection, or data verification. To conceal image into noisy channel, image information must be encoded into proper structure for enclosing with noisy signals. Both noisy signals and encoded image are combined together and transfer to the receiver. Outcome signals are also used in other purposes such as scramble other information, random number generation, message authentication code, or encryption. Along the communication channel, noisy signal protects the information by using their fuzzy pattern that is hard to identifying message information. All attackers who tapping the information recognizes only noise in communication link. At the receiver side, chaotic signals are extracted by the similar noise pattern, which is generated by using the similar secret key and equivalent microring resonator configuration, to obtain the encoded image. Afterward, decoder is used to reform the remaining data and release the hiding image. In our simulation, the following configurations are used in the experiment. A sine wave with 0.25 MHz, 0.05mW amplitude, 4 mW average power key signal, as shown in Fig 5(a), is input into waveguide of 10 μm microring resonator to generate noisy channel. The waveguide wavelength is 1.55 μm, the coupling coefficient is equal to 0.212. Linear and nonlinear coefficients are 1.2 and 3.8 x 10 -13 cm 2 /W, respectively. The effective core area is equal to 0.30 μm 2 . 8-bits-gray-scale Lenna image with 250x250 pixels encodes into bit stream of Return-to-Zero signals and coupling with noisy signal, which is generated by passing key signal into microring resonator. Then, noisy signals with image steganography are transferred into the communication channel. At the receiver side, both similar key signals and system configuration are used to generate same noisy signal for translate the signal and obtain encoded data. Then, launch the encoded data into decoding module to find original image. The result of our simulation, Lena image at sender, in the communication link and receiver, are illustrated in Fig 6. We have shown that message authentication code, secure channel, and image steganography in optical communication can be implemented by using the microring resonators incorporating an add/drop filter. The operation is shown the successful results by using chaos phenomenon in a microring resonator as hashing and encryption function in cryptography mathematics. In this model, any transmitted data and key pass into the optical hashing circuit to generate message authentication code that uses to validate integrity of transmitted data and its owner. Furthermore, by using microring and key signal to generate noisy channel, data sending from sender is secured in the transmission and also decipher at the receiver side. Encryption and decryption technique is able to use in steganographic process. The key advantages of the proposed system are simple to implement in single chip and easily apply to secure any form of communication in wireless network, mobile communication network and military applications with low power consumption and very high-speed ...
Context 2
... the message is incorrect and should be ignored, or drop the transmission, as it is likely being tampered with, depending on the situation. The general operation schematic diagram of MAC is as shown in Fig 2. Because MAC algorithm characteristics such as sophisticates, irreversible, and unpredictable are much like chaos in microring resonator, MAC algorithm module can be built by using a microring resonator. In this research, two microring resonators and one add/drop are combined together as shown in Fig 3(a) to generate message authentication code. ...

Similar publications

Article
Full-text available
The cloud storage service becomes a popular tendency based on the cloud computing, which can solve user’s storage bottleneck problem. Data security problems are solved by remote data auditing in cloud storage, which attracts more researchers to pay attention to data verification. In this paper, a new replay attack is defined, and attack process is...