Skip to main content
banner image
venafi logo

What Is Optical Stealth Encryption?

What Is Optical Stealth Encryption?

optical stealth encryption
July 6, 2020 | Anastasios Arampatzis


Researchers at the Ben-Gurion University in Israel have developed the first all optical stealth encryption technology that will be significantly more secure and private for highly sensitive cloud-computing and data center network transmission.


 

The Need for New Encryption Technology

"Today, information is still encrypted using digital techniques, although most data is transmitted over distance using light spectrum on fiber-optic networks," said Professor Dan Sadot, Director of the Optical Communications Research Laboratory, who heads the team that developed this new encryption technology.
 

Strength of encryption algorithms is technology dependent. Advances on quantum computing have manifested that the majority of known cryptographic algorithms may become obsolete with the use of ultra-high processing power computers. Also, until now, hackers who want to access hidden data can easily detect information being transferred on the internet and record it—even without understanding the information in real time—and then work offline on decoding the information at a later stage. Thus, a different data security paradigm had to be found.
 

"Time is running out on security and privacy of digital encryption technology, which can be read offline if recorded and code-broken using intensive computing power," said Professor Sadot.
 

The new technology was presented at the Cybertech Global Tel Aviv conference held on January 28-30, 2020 in Tel Aviv.
 

How Does the Optical Stealth Encryption Technology Work?

The optical stealth encryption technology is based on fiber optics. Fiber-optic cables carry information between two places using entirely optical (light-based) technology. The propagation of multiple data streams is achieved by transmitting light in different angles within the fiber-optic cable. The light carrying the information bounces within the cable until it reaches its destination.

 

A screenshot of a cell phone

Description automatically generated


The goal of the research team was to render the fiber-optic light transmission undetectable and stealthy by using standard optical equipment, and to overcome the drawbacks of digital encryption. They did this by taking information—either already encrypted or not—and spreading the data over several light waves in fiber optic cables.
 

“We've developed an end-to-end solution providing encryption, transmission, decryption, and detection optically instead of digitally,” said Professor Sadot.
 

Instead of using one color of the light spectrum to send one large data stream, this method spreads the transmission across many colors in the optical spectrum bandwidth, which is 1,000 times wider than the digital one. Furthermore, the new encryption method intentionally creates multiple weaker data streams which are hidden under noise and elude detection.
 

Every transmission, whether electronic, digital or fiber, has a certain amount of "noise." The researchers demonstrated that they were able to transmit weaker encrypted data hidden under a stronger inherent noise level so that the encrypted data cannot be detected.
 

To add an extra level of security the researchers employed a commercially available phase mask, which changes the phase (color) of each wavelength. That process also appears as noise, which destroys the "coherence" or ability to recompile the data without the correct encryption key. A great security benefit of the optical phase mask is that it cannot be recorded offline, so the data is destroyed if a hacker tries to decode it.
 

"Basically, the innovative breakthrough is that if you can't detect it, you can't steal it," Professor Sadot said. "Because an eavesdropper can neither read the data nor even detect the existence of the transmitted signal, our optical stealth transmission provides the highest level of privacy and security for sensitive data applications."
 

Conclusion

This novel encryption method is highly useful for multiple applications, such as high-speed communication, sensitive transmission of financial, medical or social media-related information.  "Every data center has 100G and 400G lines, and part of those lines are encrypted end-to-end," Prof. Sadot says. There is a need for non-digital encryption for customers who require the most advanced security possible without the risk of eavesdropping or jamming data flow. “In fact, with this method, an eavesdropper will require years to break the encryption key," said Zafrir Levy, Senior Vice President, Exact Sciences & Engineering, BGN Technologies.


 

Related posts

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies
eBook

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Anastasios Arampatzis
Anastasios Arampatzis

Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years of experience in evaluating cybersecurity and managing IT projects. He works as an informatics instructor at AKMI Educational Institute, while his interests include exploring the human side of cybersecurity.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more