Jun Qiao;Chenxia Li;Ying Tian;Bo Fang;Haomiao Zhou;Mingmin Zhu;Zhi Hong;Xufeng Jing
{"title":"Double-Validation Metasurface Holographic Encryption Based on XOR Algorithm","authors":"Jun Qiao;Chenxia Li;Ying Tian;Bo Fang;Haomiao Zhou;Mingmin Zhu;Zhi Hong;Xufeng Jing","doi":"10.1109/TMTT.2024.3454062","DOIUrl":null,"url":null,"abstract":"Electromagnetic metasurfaces have garnered widespread attention due to their capability for arbitrary wavefront manipulation of electromagnetic waves. In the field of information encryption, electromagnetic metasurfaces are also playing an increasingly important role. This article proposes a one-time dual-authentication encryption scheme for metasurfaces based on the XOR algorithm. Compared to traditional metasurface encryption, we do not store information solely in a single degree of freedom of the electromagnetic wave, thus avoiding decryption by indiscriminate attacks from adversaries. By employing the XOR algorithm of digital systems, we divide the information to be encrypted into multiple parts, which are held by several individuals, with each part containing no useful information on its own. To decrypt the information, the collaboration of all participants is required to successfully decode the encrypted message. On this basis, we have also designed a dual-authentication decryption method that requires two layers of decryption to break the final encrypted information. The first layer of decryption not only confuses attackers but also provides a key for the second layer of decryption, achieving a dual anti-counterfeiting purpose. Moreover, due to the theoretically unbreakable nature of the one-time pad (OTP), our scheme offers extremely strong security. To validate the theoretical concept, we improved the traditional G-S algorithm, using metasurface holography as a bridge, designed theoretical simulations at the 8-GHz electromagnetic band, and conducted microwave experiments. The experimental results highly correspond with the simulation outcomes, confirming the feasibility of the concept.","PeriodicalId":13272,"journal":{"name":"IEEE Transactions on Microwave Theory and Techniques","volume":"73 3","pages":"1741-1751"},"PeriodicalIF":4.1000,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Microwave Theory and Techniques","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10714392/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Electromagnetic metasurfaces have garnered widespread attention due to their capability for arbitrary wavefront manipulation of electromagnetic waves. In the field of information encryption, electromagnetic metasurfaces are also playing an increasingly important role. This article proposes a one-time dual-authentication encryption scheme for metasurfaces based on the XOR algorithm. Compared to traditional metasurface encryption, we do not store information solely in a single degree of freedom of the electromagnetic wave, thus avoiding decryption by indiscriminate attacks from adversaries. By employing the XOR algorithm of digital systems, we divide the information to be encrypted into multiple parts, which are held by several individuals, with each part containing no useful information on its own. To decrypt the information, the collaboration of all participants is required to successfully decode the encrypted message. On this basis, we have also designed a dual-authentication decryption method that requires two layers of decryption to break the final encrypted information. The first layer of decryption not only confuses attackers but also provides a key for the second layer of decryption, achieving a dual anti-counterfeiting purpose. Moreover, due to the theoretically unbreakable nature of the one-time pad (OTP), our scheme offers extremely strong security. To validate the theoretical concept, we improved the traditional G-S algorithm, using metasurface holography as a bridge, designed theoretical simulations at the 8-GHz electromagnetic band, and conducted microwave experiments. The experimental results highly correspond with the simulation outcomes, confirming the feasibility of the concept.
期刊介绍:
The IEEE Transactions on Microwave Theory and Techniques focuses on that part of engineering and theory associated with microwave/millimeter-wave components, devices, circuits, and systems involving the generation, modulation, demodulation, control, transmission, and detection of microwave signals. This includes scientific, technical, and industrial, activities. Microwave theory and techniques relates to electromagnetic waves usually in the frequency region between a few MHz and a THz; other spectral regions and wave types are included within the scope of the Society whenever basic microwave theory and techniques can yield useful results. Generally, this occurs in the theory of wave propagation in structures with dimensions comparable to a wavelength, and in the related techniques for analysis and design.