Professional Documents
Culture Documents
2, FEBRUARY 2005
655
AbstractEnhanced security has often been cited as an important benefit of optical CDMA (O-CDMA) signaling. However, the
quality and degree of security enhancement has not been closely examined in the literature. This paper examines the degree and types
of security that may be provided by O-CDMA encoding. A quantitative analysis of data confidentiality is presented for O-CDMA
encoding techniques that use both time spreading and wavelength
hopping. The probability of successful data interception is calculated as a function of several parameters, including signal-to-noise
ratio and fraction of total available system capacity. For reasonable choices of system and encoding parameters, it is shown that
increasing code complexity can increase the signal-to-noise ratio
(SNR) required for an eavesdropper to break the encoding by
only a few dB, while the processing of fewer than 100 bits by an
eavesdropper can reduce the SNR required to break the encoding
by up to 12 dB. The overall degree of confidentiality obtainable
through O-CDMA encoding is also compared with that obtainable
through standard cryptography. time-spreading/wavelength-hopping in particular, and O-CDMA in general, are found to provide
considerably less data confidentiality than cryptography, and the
confidentiality provided is found to be highly dependent on system
design and implementation parameters.
Index TermsCode division multiaccess (CDMA), communication system security, optical communication.
I. INTRODUCTION
Manuscript received May 10, 2004; revised September 9, 2004. This work
was supported by the Defense Advanced Research Projects Agency under Air
Force Contract F19628-00-C-0002. Opinions, interpretations, recommendations, and conclusions are those of the author and are not necessarily endorsed
by the United States Government.
The author is with the Massachusetts Institute of Technology, Lincoln Laboratory, Lexington, MA 02420-9108 USA (e-mail: shake@ll.mit.edu).
Digital Object Identifier 10.1109/JLT.2004.838844
656
657
TABLE I
CODE SPACE SIZE FOR FOUR CATEGORIES OF O-CDMA CODING
elements, one can calculate that there are 48 different -sequences that could be used as codes [17], and each of these sequences can be shifted by one or more code elements to produce a distinct code. This produces a maximum of about 25 000
(48 511) possible codes. This is a considerably larger code
space than that produced by most time-spreading codes, but still
quite small compared with time-spreading/wavelength-hopping
codes.
Spectral phase encoding has similar code mask implementation constraints to spectral amplitude encoding. However,
analysis has shown that spectral phase encoding may be able
to support a reasonably large number of simultaneous users
at low bit-error-rates (BERs) by employing code word sets
that are chosen randomly [16]. Unlike time-spreading/wavelength-hopping codes, the number of ones and zeros in a
spectral phase code does not affect the amount of energy in the
transmitted signal, and hence does not affect the power balance
among a group of users. Thus, a central controller choosing
codes to assign to a group of, say, 100 users could choose
code elements
100 different random combinations of the
in a spectral phase encoder, and each user would be assigned
one of these codes. Performance calculations in [16] show
that, on average, a reasonably large number of simultaneous
users can be supported with randomly chosen code word sets.
These calculations apply to average performance, though, and
it should be noted that a large portion of the many possible
code sets chosen randomly might have well below average
BER performance. In theory, though, a central controller could
select a set of randomly chosen codes for some desired number
of users, and could then pseudorandomly refine the set of codes
by discarding certain codes of the chosen set and randomly
choosing replacements until the overall performance of the
code set met the desired BER specifications. (This procedure
might be highly processing-intensive, and might need to be
pre-calculated before network operations begin.) The resulting
set of codes would still appear random to an eavesdropper
trying to guess which individual codes had been selected, and
658
659
660
661
and
are determined by the SNR at the eavesdropper
and by the eavesdropping detectors performance in noise. Assuming that the dominant form of noise can be modeled as additive white Gaussian noise, the EDFA/optical matched filter receiver structure in Fig. 5 can be shown to give [22]
(2)
(3)
is the ratio of the peak pulse energy to the noise
where
power spectral density, is the detection threshold, and
is the Marcum Q-function defined as [23, p. 147]
(4)
where
denotes a zeroth order modified Bessel function of
the first kind.
versus
for a time-spreading/waveFig. 6 plots
length-hopping code and for both this type of receiver and the
coherently detected matched filter receiver. (Derivation of the
performance of the coherent receiver with matched filter detection can be found in standard texts [24], [25], [18]). The code
, and
parameters used for this sample calculation were
, and
, corresponding to a prime hop code
with 961 time slots and 31 wavelengths [28], for example. Note
plotted here refers to the enthat the numerator in the
ergy in an individual code pulse, not the energy received during
an entire data bit. In both the cases plotted, the eavesdropper
is assumed to be able to set the detection threshold to its optimum value. This requires knowing or estimating such param, and the SNR; the optimal threshold at each
eters as
SNR value for the envelope detector was determined by a search
algorithm for these calculations. As the figure shows, the loss in
performance of the optical matched filter with envelope detection relative to the optimum coherent matched filter detection is
relatively small, especially at higher SNRs.
The basic form of the result shown in Fig. 6 has strong implications for the degree of confidentiality that may be attained by
O-CDMA encoding. (While the results in Fig. 6 are for a particular type of time domain encoding with certain coding parameters, the same general results can be shown for different
types of O-CDMA encoding [29].) Since the eavesdroppers
ability to correctly detect user code words is strongly dependent
on the SNR at the intercepting receiver, it follows that the degree of confidentiality provided is also a strong function of this
SNR. Since the eavesdroppers SNR is a function of a number
of system design and operation parameters, this means that the
degree of confidentiality provided by O-CDMA techniques will
also be a function of these system design and operation parameters.
Since the degree of confidentiality of user data is dependent
on the SNR at the eavesdropper, it is important to quantify how
low this SNR could be made through intelligent system design.
This design is not completely straightforward, though, because
it must involve a tradeoff between communication performance
662
Fig. 7. Approximate
confidentiality.
tradeoff
between
system
data
capacity
and
to other types of codes as well. Users are assumed to use incoherent detection, modeled here by assuming that each code pulse
is optically matched filtered and envelope detected (much as in
Fig. 5), and combined after the envelope detection. The resultant
incoherent combining of 31 code pulses produces a combining
(see [23, p. 178]). The
efficiency of approximately
. Error
maximum acceptable system BER is assumed to be
correction codes used in commercial high-rate optical telecommunication equipment can produce this BER with a raw detector
. An optical matched filter receiver
BER of approximately
followed by envelope detection theoretically requires a (peak)
dB [22] to produce the required
SNR of
. The eavesdropper for this example
raw detector BER of
from a
is assumed to tap one percent of the energy
fiber carrying a single user signal, and to have a receiver that is
.
equal in sensitivity to the authorized users receivers
The solid curve, labeled baseline example, shows the performance of the straw man system. For this particular example,
if the authorized users transmit sufficient power so that 95% or
more of the theoretical system capacity is attained, the eavesdropper has a high enough SNR to detect the code without errors
with a probability of virtually one. To reduce the eavesdroppers
, for example, each user
probability of effectiveness below
must reduce its transmit power to the extent that only about 75%
of the theoretical system capacity can be attained.
Variations in system design parameters can strongly affect
this performance trade, as shown by the other three curves in
Fig. 7. A change in any combination of the factors in the first
bracket of (6) can result in a higher or lower SNR for the eavesdropper. If for example, the eavesdroppers receiver is 3 dB more
)
sensitive than the authorized users receivers (i.e.,
then the dotted performance curve (baseline 3 dB) in Fig. 7 is
obtained. If, in addition, the eavesdropper taps the fiber with 2%
efficiency rather than 1%, then the dash-dotted curve (baseline
6 dB) is obtained, and so on.
Depending on the type of encoding that is used, an eavesdropper may be able to improve on the performance specified
by (1)(3) and (6), and illustrated by Figs. 6 and 7. Most encoding schemes for O-CDMA use code words that are relatively far apart in Hamming distance; this allows relatively good
orthogonality properties among multiple users transmitting simultaneously. However, if the eavesdropper knows the structure of the code (e.g., that Prime Hop Codes are being used),
then an intercepted code wordwhich may contain detection
errorscan be compared with the set of allowable code words.
The allowable code word nearest in Hamming distance to the
intercepted code word would then be chosen. In this case, the
coding structuredesigned primarily for good orthogonality
propertieswill function much like an error-correcting code for
the eavesdropper, possibly allowing the eavesdropper to take an
intercepted code word with errors and correct the errors. Calculating the degree of improvement in the eavesdroppers ability to
intercept code words through this technique is beyond the scope
of this paper; still, the better the orthogonality properties of the
encoding scheme, the larger the minimum Hamming distance
between the codes is likely to be, producing a greater potential improvement in interception performance by making use of
the code structure in the interception process. This performance
663
improvement is, of course, only obtainable when the eavesdropper knows the set of allowable code words, as in well known
codes with well-established structures. If a completely random
coding scheme were employed, where any possible combination
of code chips could represent a users code word, then an eavesdropper could not improve its interception performance in this
way. In time-spreading/wavelength-hopping coding schemes,
however, such random coding would lead to variable weight
codes, which is problematic for maintaining good cross-correlation properties among multiple user codes. (Random codes are
more feasible with encoding schemes such as spectral phase encoding [16].)
B. Multiple Bit Combining
A further, and more dramatic, improvement in the eavesdroppers code interception performance can be obtained by
processing and combining code transmissions from multiple
data bits. The eavesdropper can use exactly the same detector
),
structure as shown in Fig. 5 (with multiple channels if
but can accumulate samples in each of
bins (Fig. 3) over
total bins if
.)
multiple data bits. (There will be
The eavesdropper must maintain bit synchronization so that
the same bins can be sampled repeatably on multiple data bits,
but this has already been assumed for the worst-case scenario
analysis.
The case of greatest interest for multiple bit combining
is where the transmitter uses 2-code keying, as described in
Section IV.B. Accumulating multiple bits from a 2-code keyed
O-CDMA data stream using time-spreading/wavelength-hopping encoding produces the superposition of the two code
words C1 and C2 in the eavesdroppers detector. Since the
codes are designed to be as mutually orthogonal as possible, it
is almost certainly possible for most codes to separate the two
individual code words from their superposition. For example,
it is quite simple to examine the superposition of two Prime
Codes and determine the individual code words, especially if
the two code words are synchronized in time (see examples on
[12, p. 46]). Note that the eavesdroppers detected superposition
of C1 and C2 will always be synchronized if they are from a
single transmitter using 2-code keying and the eavesdropper
has attained bit synchronization.
(If 2-code keying is generalized so that each user transmits
code words for each data bits, as mentioned
one of
in Section IV.B, the eavesdroppers task can be made a bit more
forces the eavesdropper to sepacomplicated. Choosing
rate several code words from a single multiple bit receiver detection rather than just two. Nevertheless, assuming that the eavesdropper knows the general structure of the codes in use, separation of multiple codes is almost certainly still possible in theory.
A number of variables affect a trade-off analysis of the security
of such a scheme, such as the increased energy per code word
that must be transmitted to maintain an acceptable BER with
multiple bit encoding, the increased number of code words that
must be assigned to each user, etc. A full analysis is beyond the
scope of this paper; here, we calculate the performance for the
.)
example case of
The eavesdroppers detection performance against a 2-code
keying transmitter is derived in Appendix B, which shows that
664
-function,
(10)
and where
denotes an
th-order modified Bessel
function of the first kind.
These results are illustrated in Figs. 8 and 9. Fig. 8 shows
the eavesdroppers detection performance against two different
that produce
codes as a function of its SNR. (Values of
are included in this graph to
negligibly small values of
illustrate the large degree of improvement that can be obtained
by combining relatively few bits, as discussed in the next paragraph.) Both curves use all the same parameters as straw man
design example illustrated by the baseline performance curve
in Fig. 7. The solid line in Fig. 8 uses the same code used in the
, and
.
straw man example, i.e.,
The dashed line assumes a more complex (and more difficult to
, and
.
implement) code using
When the more complex code is used, the user must combine
101 separate detectionsincoherently, we assumeand thus
665
TABLE II
REQUIRED E =N PER CODE CHIP FOR P
Fig. 10.
= 0:9
666
the code on every single bit in a random way, such that the eavesdropper would not know, on a given data bit, whether the detected code word represented a one or a zero.
Lower SNRs would require the eavesdropper to process multiple data bits to correctly detect the code. If the transmitter
changed the code words more frequently than they could be correctly detected, then confidentiality could be significantly increased. However, code reconfiguration rates would probably
need to approach the data rate to achieve a strong assurance of
confidentiality, since the eavesdroppers advantage from combining multiple data bits increases quite rapidly, as shown in
Fig. 9. In addition, the transmitters codes would need to be
changed in a way that could not be predicted or guessed by
an eavesdropper. In other words, the code reconfiguration generator would need to have characteristics much like those of a
cryptographic keystream generator.
Fig. 11. Code word isolation rates for OOK transmitters at 100 Mbps.
VI. DISCUSSION
transmitted alone once vs. the number of simultaneous transmitters is shown in Fig. 11 for an example data rate of
Mbits/s.
users are not synchronized among themselves,
Since the
an eavesdropper probably cannot attain either bit or code pulse
synchronization for a particular user, which was assumed in
the analysis in previous sections. However, neither bit nor code
pulse synchronization is strictly required for detecting a users
code (although assuming synchronization greatly simplifies
the quantitative calculation of code detection performance).
Bit sync is not required because, under the aforementioned
assumptions, one data bit duration is guaranteed to contain
the entire code, albeit starting from an unknown point in the
code. This makes the eavesdroppers task more difficult, but
not impossible, since the eavesdropper may detect code pulses
over one bit duration and then sequentially search through
all possible time shifts over a single bit time to find the right
code word. The number of possible time shifts is not likely
to be a significant obstacle to a brute force search. Similarly,
code pulse synchronization is not strictly required, since the
eavesdropper could employ techniques similar to those radar
pulse detection (where the time of return of the radar pulse is
unknown). These techniques generally entail faster sampling of
the signal by a factor of 2 or 3 over the approach quantified in
previous sections, again making the eavesdroppers job more
difficult, but not, theoretically at least, impossible.
D. Code Reconfiguration
As mentioned in Section III-B, a transmitter could attempt to
increase confidentiality by changing its code words frequently.
The preceding analysis shows that the reconfiguration rate required to insure that a code-detecting eavesdropper could not
detect long strings of data depends on the SNR at the eavesdropper. If the eavesdropper could attain a relatively high SNR,
then he could, in theory, detect the new codes by processing a
single data bit, and could use the detected code to demodulate
every subsequent bit until the code were changed again. In this
case, strong confidentiality could only be attained by changing
667
VII. CONCLUSION
It is clear that, in theory at least, source cryptography
provides a much greater degree of confidentiality than does
time-spreading/wavelength-hopping O-CDMA encoding. In
principle, this conclusion also applies to any form of O-CDMA
encoding that can be represented by an LTI transfer function.
On the other hand, an intelligently encoded O-CDMA signal
can force a potential eavesdropper to implement a sophisticated
and possibly expensive detector in order to be able to break the
users confidentiality. Rapid reconfiguration of codes can also
increase the difficulty of interception. These factors can provide
significant security advantages compared with standard optical
communication technologies such as WDM, where a commercial off-the-shelf detector can be purchased to read the data.
Whether or not this degree of confidentiality is sufficient for
a given purpose depends largely on the value of the information being protected, and the likelihood that an adversary will
be willing to expend the resources necessary to read the information.
APPENDIX A
This Appendix derives a quantitative relationship between the
users SNR per data bit and the eavesdroppers SNR per code
chip, which allows a tradeoff between system capacity and confidentiality to be quantified. With a reasonably large number of
can be approxisimultaneous users, the MUI noise term
mated by white Gaussian noise4 [19], as can the receiver noise
term [24]. Using these approximations, the following analysis
shows a quantitative trade between confidentiality and system
capacity, and allows calculation of how low the eavesdroppers
SNR can reasonably be made given various system design parameters.
users are connected to a broadcast star
We assume that
LAN and that the total number of taps in the star coupler is
equal to . We assume that the eavesdropper taps into a fiber
carrying a single users coded transmission (Fig. 2) with a tapping efficiency of . To model a general time-spreading/wavecode pulses are dislength-hopping code, we assume that
tributed among
possible time slots and
possible waveand the code length is
lengths. Thus, the code weight is
. No assumptions are made concerning how the
pulses are distributed among the
possible code bins,
which assures that the analysis can be applied to any type of
time-spreading/wavelength-hopping code.
The eavesdropper is assumed to use optical matched filtering
followed by envelope detection, as shown in Fig. 3 for a single
wavelength. Separate but identical detectors are used for each
different wavelength. Time samples from the output of each envelope detector are taken in each of the time bins illustrated in
total samples,
Fig. 3. Thus, the eavesdropper collects
668
assuming that a single data bit is processed. Each sample is compared with a threshold to decide whether or not a code pulse is
present in the corresponding bin.
, the
Assuming the energy transmitted per code pulse is
. The autotal energy transmitted per data bit is
thorized users receiver is assumed to produce additive white
.
Gaussian thermal noise of double-sided spectral density
The eavesdropper has an equivalent receiver noise of spectral
, which is also assumed to be white and Gaussian.
density
represent the ratio of the eavesdroppers
Let
receiver noise density to the authorized users receiver noise
density.
The total effective energy per data bit received at the authorized users receiver from the desired user signal is given by
(A1)
where
represents the users efficiency for combining the energy from multiple code pulses.
for coherent detection
and combining, and is between zero and one for incoherently
detected and combined signals.
As described previously, the eavesdropper must make decisions in each time/wavelength bin as to whether or not a code
pulse was transmitted. Given that a code pulse is transmitted in
a particular bin, the amount of energy received by the eavesdropper in that bin is given by
(A2)
where the second equality makes use of (A1).
The eavesdroppers effective SNR for an individual
. Comtime/wavelength bin detection decision is
bining all factors defined so far gives
(A3)
If a particular maximum BER level is specified for the authorized users in the network, the eavesdroppers received SNR
(per code pulse) can be related to the required SNR (per bit) of
the authorized users as follows. Since the BER of an authorized
user is some monotonically decreasing function of the
given in (5), setting a maximum BER specification is equivalent
. We denote this value by
to setting a minimum value of
.
The eavesdroppers SNR can be related to
as
a function of the relative levels of the MUI noise term and the
receiver noise term (5). Defining the parameter as the ratio of
the receiver noise to the total noise gives
(A4)
We can then write either
(A5)
or, alternatively
(A6)
Substituting the result of (A6) into (A3) and rearranging terms,
we get
(A7)
which directly relates the eavesdroppers SNR to the minimum
SNR that the authorized users must have to meet some BER
specification.
may vary between zero and one. (ArbiThe parameter
trarily setting to a value outside this range requires that one
of the spectral densities in (A4) be negative, which is not allowed by the definition of power spectral density.) For a fixed
, and assuming that
is fixed by the
value of
receiver implementation, (A6) implies that must increase as
the total transmitted energy per data bit decreases. Minimizing
each users transmitted power thus implies maximizing . Setthus gives the minimum possible value of the eavesting
droppers SNR for a given maximum BER specification. Since
the eavesdroppers probability of correctly detecting a users
code word is a function of this SNR, this implies that for a given
there is a limit to the degree of confidentiality that
can be obtained [for a given set of the system design and coding
parameters in the first term of (A7)].
produces the case
At the other end of the range, setting
where receiver noise is completely negligible compared with the
MUI noise term (A4). This situation can be approached if each
user transmits at high power levels. Note that the eavesdroppers
SNR becomes arbitrarily large as approaches zero.
The form of the trade between system capacity and confidentiality can be made plain by introducing one further approximation. Assuming that the MUI noise from each interfering user
adds incoherently in an authorized users receiver and is roughly
proportional to the number of active transmitters, we obtain
(A8)
is the number of active users and
is the equivawhere
lent noise spectral density contributed by each user. Substituting
(A8) into (A5) gives
(A9)
be the theoretical maximum number (assuming
, i.e., that
) of simultaneous users that
can be active and still maintain a BER that meets the system
performance specification. The maximum data carrying camultiplied by the data rate of an
pacity of the network is
individual user. Setting
in (A9) and replacing
with
gives the relationship between
and
for
ideal, noiseless receivers as
Let
(A10)
669
(A11)
This equation relates all the various system design factors (the
first bracketed term), the number of active users relative to the
maximum theoretical number (the second term), and the SNRs
of both the eavesdropper and the authorized users. Its interpretation is discussed in the main body of the paper.
APPENDIX B
This Appendix derives the statistics of the decision variables
for a code detecting eavesdropper combining the energy from
multiple transmitted data bits. Assume that the eavesdropper incoherently5 combines the energy from data bits for each code
word detection. As described in Appendix A, time samples from
an envelope-detected optical matched filter output are taken in
each of the time bins illustrated in Fig. 3. For each transmitted
total samples. Let the
data bit, the eavesdropper collects
.
sample from the th bin of the th data bit be denoted by
For each of the bins, the eavesdropper forms the statistic
(B2)
noise
C1 or C2
is the Generalized Marcum
where and
defined as [25, p. 44]
-function,
(B1)
of the bits will repFor each transmission of data bits,
resent ones (codeword C1) and
of them will repis a binomially disresent zeros (codeword C2), where
. The
tributed random variable whose expected value is
probability distribution of each sample, , will thus depend on
the value of
. For relatively large values of , we can approxby its expected value and determine the probability
imate
distributions of . First, assume that the codewords C1 and
C2 overlapi.e., both have energy pulses in the same binin
locations. (
must be small for acceptable orthogonality
among different users.) There will then be
bins in which no code pulses are transmitted, and whose stahas a Chi-square
tistics reflect noise only. For these bins,
distribution with
degrees of freedom. There will also be
bins where C1 and C2 overlap. These bins will have signal enwill have a noncenergy on each transmitted data bit, and
degrees of freedom and
tral Chi-square distribution with
noncentrality parameter of
. There will be
bins
that have signal energy only on bits where C1 is transmitted.
will have a noncentral Chi-square distribuFor these bins,
degrees of freedom and noncentrality parameter of
tion with
. Finally, there will be
bins that have signal energy
have a noncentral
only when C2 is transmitted, and these
degrees of freedom and nonChi-square distribution with
. (See [25] and [22] for more
centrality parameter
detailed discussion on these probability distributions and how
5The structure of Fig. 5 implies that the combining will be incoherent. If a coherent matched filter detector were implemented, more efficient coherent combining of the energy from multiple bits could be accomplished.
(B4)
denotes an
th order modified Bessel
where
function of the first kind.
The probability of error given that signal energy from both
C1 and C2 have accumulated in bin is
(B5)
C1 and C2
Following the notation of (1)(3), we have
noise
(B6)
(B7)
The eavesdroppers overall probability of detecting an errorfree code word is then given by
(B8)
total bins where some signal energy
since there are
total bins where only
has accumulated and
noise has been accumulated.
is significantly different from
, the
Note that if
signal noise bins where energy has been accumulated from
than
one code word will have a significantly higher
the signal noise bins where energy has accumulated from
670
the other code word, since more one bits were accumulated
than zero bits (or vice versa). In this case, the probability of
error-free code word detection would be somewhat lower than
that given by (B8).
ACKNOWLEDGMENT
The author would like to acknowledge the many useful
discussions concerning this work with other staff members
at Lincoln Laboratorys Communications and Information
Technology Division, most especially Dr. P. A. Schulz, who
has had a substantial influence on the work reported here.
REFERENCES
[1] N. Karafolas and D. Uttamcandani, Optical fiber code division multiple
access networks: A review, Optical Fiber Technol., vol. 2, pp. 149168,
1996.
[2] K. Iverson and D. Hampicke, Comparison and classification of all-optical CDMA systems for future telecommunication networks, in Proc.
SPIE, vol. 2614, 1995, pp. 110121.
[3] L. Tancevski, I. Andonovic, and J. Budin, Secure optical network architectures utilizing wavelength hopping/time spreading codes, IEEE
Photon. Technol. Lett., vol. 7, no. 5, pp. 573575, May 1995.
[4] P. Torres, L. C. G. Valente, and M. C. R. Carvalho, Security system for
optical communication signals with fiber bragg gratings, IEEE Trans.
Microwave Theory Tech., vol. 50, no. 1, pp. 1316, Jan. 2002.
[5] D. D. Sampson, G. J. Pendock, and R. A. Griffin, Photonic code-division multiple-access communications, Fiber Int. Opt., vol. 16, pp.
129157, 1997.
[6] W. Ford, Computer Communications Security. Upper Saddle River,
NJ: Prentice-Hall, 1994, ch. 2.
[7] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, Spread
Spectrum Communications. Rockville, MD: Computer Science Press,
1985.
[8] D. R. Stinson, Cryptography. Boca Raton, FL: CRC, 1995, ch. 2.
[9] B. Schneier, Applied Cryptography, 2nd ed. New York: Wiley, 1996,
pp. 89.
[10] N. Ferguson and B. Schneier, Practical Cryptography. Indianapolis,
IN: Wiley, 2003.
[11] J. A. Salehi, Code division multiple-access techniques in optical fiber
networksPart I: Fundamental principles, IEEE Trans. Commun., vol.
37, no. 8, pp. 824833, Aug. 1989.
[12] G.-C. Yang and W. C. Kwong, Prime Codes. Belmont, MA: Artech
House, 2003.
[13] S. V. Marhic, Z. I. Kostic, and E. L. Titlebaum, A new family of optical code sequences for use in spread spectrum fiber-optic local area
networks, IEEE Trans. Commun., vol. 41, no. 8, pp. 12171221, Aug.
1993.
[14] H. Fathallah, L. A. Rusch, and S. LaRochelle, Passive optical fast frequency-hop CDMA communications system, J. Lightwave Technol.,
vol. 17, no. 3, pp. 397405, Mar. 1999.
[15] M. Kavehrad and D. Zaccarin, Optical code-division-multiplexed systems based on spectral encoding of noncoherent sources, J. Lightwave
Tech., vol. 13, no. 3, pp. 534545, Mar. 1995.