'Temporal cloaking' could bring more secure optical communications

June 10, 2013
West Lafayette, IN--Researchers at Purdue University have demonstrated a method for "temporal cloaking" of optical communications.
West Lafayette, IN--Researchers at Purdue University have demonstrated a method for "temporal cloaking" of optical communications. The work is a time-based analogue of spatial cloaking, such as so-called "invisibility cloaking." Findings were detailed in a research paper appearing in the advance online publication of the journal Nature. Researchers at Cornell University (Ithaca, NY) invented temporal cloaking in 2011, but their approach cloaked only a small fraction (1 x 10-6) of the time available for optically sending data. Now, the Purdue researchers have increased that to about 46%, potentially making the concept practical for commercial applications such as improving security for telecommunications.Related: Time cloak hides optical 'event' "More work has to be done before this approach finds practical application, but it does use technology that could integrate smoothly into the existing telecommunications infrastructure," said Joseph Lukens, a student in Purdue University's electrical engineering graduate program working with his professor, Andrew Weiner.
Basic operation of a "temporal cloak." A signal is modified to have zero intensity when the data are "on," cloaking the information. Then the cloak converts the pulses back to a flat signal, hiding the fact that any data were transmitted. (Joseph Lukens, Purdue University)

While the previous research in temporal cloaking required the use of a picosecond laser, the Purdue researchers achieved the feat using off-the-shelf equipment commonly found in commercial optical communications. The technique works by manipulating the phase of light pulses; the data in regions of destructive interference would be cloaked. In temporal cloaking, two phase modulators are used to first create the holes and two more to cover them up, making it look as though nothing was done to the signal.

"It's a potentially higher level of security because it doesn't even look like you are communicating," Lukens said. "Eavesdroppers won't realize the signal is cloaked because it looks like no signal is being sent."

Sponsored Recommendations

Request a quote: Micro 3D Printed Part or microArch micro-precision 3D printers

April 11, 2024
See the results for yourself! We'll print a benchmark part so that you can assess our quality. Just send us your file and we'll get to work.

Request a Micro 3D Printed Benchmark Part: Send us your file.

April 11, 2024
See the results for yourself! We'll print a benchmark part so that you can assess our quality. Just send us your file and we'll get to work.

Request a free Micro 3D Printed sample part

April 11, 2024
The best way to understand the part quality we can achieve is by seeing it first-hand. Request a free 3D printed high-precision sample part.

How to Tune Servo Systems: The Basics

April 10, 2024
Learn how to tune a servo system using frequency-based tools to meet system specifications by watching our webinar!

Voice your opinion!

To join the conversation, and become an exclusive member of Laser Focus World, create an account today!