‘Temporal cloaking’ could offer more secure optical communications

Researchers have demonstrated a method for “temporal cloaking” of optical communications, representing a potential tool to thwart would-be eavesdroppers and improve security for telecommunications.

“More work has to be done before this approach finds practical application, but it does use technology that could integrate smoothly into the existing telecommunications infrastructure,” said Purdue University graduate student Joseph Lukens, working with Andrew Weiner, the Scifres Family Distinguished Professor of Electrical and Computer Engineering.

Other researchers in 2012 invented temporal cloaking, but it cloaked only a tiny fraction – about a 10,000th of a percent – of the time available for sending data in optical communications. Now the Purdue researchers have increased that to about 46 percent, potentially making the concept practical for commercial applications.

While the previous research in temporal cloaking required the use of a complex, ultrafast-pulsing “femtosecond” laser, the Purdue researchers achieved the feat using off-the-shelf equipment commonly found in commercial optical communications.

The technique works by manipulating the phase, or timing, of light pulses. The propagation of light can be likened to waves in the ocean. If one wave is going up and interacts with another wave that’s going down, they cancel each other and the light has zero intensity. The phase determines the level of interference between these waves.

“By letting them interfere with each other you are able to make them add up to a one or a zero,” Lukens said. “The zero is a hole where there is nothing.”

Any data in regions where the signal is zero would be cloaked.

Controlling phase allows the transmission of signals in ones and zeros to send data over optical fibers. A critical piece of hardware is a component called a phase modulator, which is commonly found in optical communications to modify signals.

In temporal cloaking, two phase modulators are used to first create the holes and two more to cover them up, making it look as though nothing was done to the signal.

“It’s a potentially higher level of security because it doesn’t even look like you are communicating,” Lukens said. “Eavesdroppers won’t realize the signal is cloaked because it looks like no signal is being sent.”

Such a technology also could find uses in the military, homeland security or law enforcement.

“It might be used to prevent communication between people, to corrupt their communication links without them knowing,” he said. “And you can turn it on and off, so if they suspected something strange was going on you could return it to normal communication.”

The technique could be improved to increase its operational bandwidth and the percentage of cloaking beyond 46 percent, he said.

The technology is reminiscent of recent advances in cloaking using new “metamaterials,” assemblies that contain features, patterns or elements such as tiny antennas or alternating layers of oxides that enable an unprecedented control of light and that could make possible a cloak of invisibility. The temporal cloaking, however, does not require metamaterials, just commercially available phase modulators and optical fibers. The effect is called temporal cloaking because it hides data being transmitted over time, as opposed to “spatial” cloaking to hide physical objects.