In traditional optical communications, because information is transparently transmitted, there is a security risk of being hijacked at any time. Therefore, additional key negotiation must be established between the sending and receiving parties to ensure the reliable transmission of information. Once the outside world has mastered the key information, The signal can be easily intercepted and decrypted from any point of the transmission line to break the communication content.
For example, when a person is sick, he needs external forces, injections, and medications to cure it. The key is equivalent to this external force; and our endogenous secure optical communication technology is equivalent to human autoimmune systems that automatically kill viruses. Without medication, he will heal himself. 'Professor Zhang Jie introduced that noise is ubiquitous in any communication system. Traditional optical communication is to minimize noise. This endogenous secure optical communication technology is just the opposite. The physical layer security mechanism and means that the signal deviates into the noise transmission, that is, the weak part of the noise conveys information, and the strong noise part acts as an umbrella of information, which makes the traditional information and the key combined into one, forming a set The high-speed optical fiber transmission system with communication and confidentiality functions enables the information to have endogenous security and anti-acquisition function without relying on additional keys, which can effectively resist the splitting eavesdropping intrusion attacks from the outside world.
Zhang Jie said that this innovative technology can meet the security requirements of optical fiber communication systems and wireless laser communication systems at different speeds, and has broad application prospects in the fields of national defense, public security, telecommunications, electric power, and finance, and will eliminate the physical layer security of China's optical networks. Short board, it is of great significance to promote the development of the network from the additional security to endogenous security.