. Medical and Hospital News .




CHIP TECH
'Temporal cloaking' could bring more secure optical communications
by Emil Venere for PU News
West Lafayette IN (SPX) Jun 07, 2013


This diagram depicts the basic operation of a "temporal cloak" for optical communications that represents a potential tool to thwart would-be eavesdroppers and improve security for telecommunications. The signal is modified to have zero intensity when the data are "on," cloaking the information. Then the cloak converts the pulses back to a flat signal, hiding the fact that any data were transmitted. (Joseph Lukens, Purdue University)

Researchers have demonstrated a method for "temporal cloaking" of optical communications, representing a potential tool to thwart would-be eavesdroppers and improve security for telecommunications.

"More work has to be done before this approach finds practical application, but it does use technology that could integrate smoothly into the existing telecommunications infrastructure," said Purdue University graduate student Joseph Lukens, working with Andrew Weiner, the Scifres Family Distinguished Professor of Electrical and Computer Engineering.

Other researchers in 2012 invented temporal cloaking, but it cloaked only a tiny fraction - about a 10,000th of a percent - of the time available for sending data in optical communications. Now the Purdue researchers have increased that to about 46 percent, potentially making the concept practical for commercial applications.

While the previous research in temporal cloaking required the use of a complex, ultrafast-pulsing "femtosecond" laser, the Purdue researchers achieved the feat using off-the-shelf equipment commonly found in commercial optical communications.

Findings are detailed in a research paper appearing in the advance online publication of the journal Nature at 1 p.m. Eastern time Wednesday (June 5). The paper was authored by Lukens, senior research scientist Daniel E. Leaird and Weiner.

The technique works by manipulating the phase, or timing, of light pulses. The propagation of light can be likened to waves in the ocean. If one wave is going up and interacts with another wave that's going down, they cancel each other and the light has zero intensity. The phase determines the level of interference between these waves.

"By letting them interfere with each other you are able to make them add up to a one or a zero," Lukens said. "The zero is a hole where there is nothing."

Any data in regions where the signal is zero would be cloaked.

Controlling phase allows the transmission of signals in ones and zeros to send data over optical fibers. A critical piece of hardware is a component called a phase modulator, which is commonly found in optical communications to modify signals.

In temporal cloaking, two phase modulators are used to first create the holes and two more to cover them up, making it look as though nothing was done to the signal.

"It's a potentially higher level of security because it doesn't even look like you are communicating," Lukens said. "Eavesdroppers won't realize the signal is cloaked because it looks like no signal is being sent."

Such a technology also could find uses in the military, homeland security or law enforcement.

"It might be used to prevent communication between people, to corrupt their communication links without them knowing," he said. "And you can turn it on and off, so if they suspected something strange was going on you could return it to normal communication."

The technique could be improved to increase its operational bandwidth and the percentage of cloaking beyond 46 percent, he said.

The technology is reminiscent of recent advances in cloaking using new "metamaterials," assemblies that contain features, patterns or elements such as tiny antennas or alternating layers of oxides that enable an unprecedented control of light and that could make possible a cloak of invisibility.

The temporal cloaking, however, does not require metamaterials, just commercially available phase modulators and optical fibers. The effect is called temporal cloaking because it hides data being transmitted over time, as opposed to "spatial" cloaking to hide physical objects.

.


Related Links
Ultrafast Optics and Optical Fiber Communications Laboratory
Computer Chip Architecture, Technology and Manufacture
Nano Technology News From SpaceMart.com






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

Get Our Free Newsletters
Space - Defense - Environment - Energy - Solar - Nuclear

...





CHIP TECH
Spintronics approach enables new quantum technologies
Chicago IL (SPX) Jun 06, 2013
A team of researchers, including members of the University of Chicago's Institute for Molecular Engineering, highlight the power of emerging quantum technologies in two recent papers published in the Proceedings of the National Academy of Sciences. These technologies exploit quantum mechanics, the physics that dominates the atomic world, to perform disparate tasks such as nanoscale temperature m ... read more


CHIP TECH
Sandbags and raw nerves as flood peak hits Germany

More radioactive leaks reported at Fukushima plant

Japan disaster cash spent on counting turtles: report

Agreement over Statue of Liberty security screening

CHIP TECH
Orbcomm Offers Dual-Mode Telematics Solution For Heavy Equipment Industry

Google to buy Israeli GPS app Waze for $1 bln: reports

Lockheed Martin Completes Functional Testing of First GPS III Satellite Bus Electronic Systems

Glitch puts off Indian navigation satellite launch by a fortnight

CHIP TECH
Weapons testing data determines brain makes new neurons into adulthood

World's 'oldest woman' dies in China: family

Geneticist speculates humans could have big eyes, foreheads in future

How similar are the gestures of apes and human infants? More than you might suspect

CHIP TECH
Large-scale biodiversity is vital to maintain ecosystem health

An 'extinct' frog makes a comeback in Israel

US mulls endangered status for captive chimpanzees

Bridge species drive tropical engine of biodiversity

CHIP TECH
WHO simplifies pandemic alert system after criticism

Only 14 China H7N9 patients left in hospital: govt

Singapore fights back against worsening dengue outbreak

Cost-effective: HIV tests for all in India

CHIP TECH
In fashion, China gets its own first lady effect

Children 'left behind' in China's rush to the cities

China Nobel winner's relative gets 11 years in jail

Chinese website bans searches for 'yellow duck'

CHIP TECH
Global cybercrime ring targeted by Microsoft and FBI

Report: Belgian army sold helicopters to firm linked to trafficking

US feds 'kidnapped' suspected druglord: Guinea-Bissau

US ships look to net big contraband catches in Pacific

CHIP TECH
Japan economy heats up in first quarter

Walker's World: Europe's blame game

Outside View: Sub-par U.S. jobs growth expected

Outside View: Economy adds 175,000 jobs in May but trouble ahead




The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement