Double-Validation Metasurface Holographic Encryption Based on XOR Algorithm

IF 4.1 1区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC
Jun Qiao;Chenxia Li;Ying Tian;Bo Fang;Haomiao Zhou;Mingmin Zhu;Zhi Hong;Xufeng Jing
{"title":"Double-Validation Metasurface Holographic Encryption Based on XOR Algorithm","authors":"Jun Qiao;Chenxia Li;Ying Tian;Bo Fang;Haomiao Zhou;Mingmin Zhu;Zhi Hong;Xufeng Jing","doi":"10.1109/TMTT.2024.3454062","DOIUrl":null,"url":null,"abstract":"Electromagnetic metasurfaces have garnered widespread attention due to their capability for arbitrary wavefront manipulation of electromagnetic waves. In the field of information encryption, electromagnetic metasurfaces are also playing an increasingly important role. This article proposes a one-time dual-authentication encryption scheme for metasurfaces based on the XOR algorithm. Compared to traditional metasurface encryption, we do not store information solely in a single degree of freedom of the electromagnetic wave, thus avoiding decryption by indiscriminate attacks from adversaries. By employing the XOR algorithm of digital systems, we divide the information to be encrypted into multiple parts, which are held by several individuals, with each part containing no useful information on its own. To decrypt the information, the collaboration of all participants is required to successfully decode the encrypted message. On this basis, we have also designed a dual-authentication decryption method that requires two layers of decryption to break the final encrypted information. The first layer of decryption not only confuses attackers but also provides a key for the second layer of decryption, achieving a dual anti-counterfeiting purpose. Moreover, due to the theoretically unbreakable nature of the one-time pad (OTP), our scheme offers extremely strong security. To validate the theoretical concept, we improved the traditional G-S algorithm, using metasurface holography as a bridge, designed theoretical simulations at the 8-GHz electromagnetic band, and conducted microwave experiments. The experimental results highly correspond with the simulation outcomes, confirming the feasibility of the concept.","PeriodicalId":13272,"journal":{"name":"IEEE Transactions on Microwave Theory and Techniques","volume":"73 3","pages":"1741-1751"},"PeriodicalIF":4.1000,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Microwave Theory and Techniques","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10714392/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Electromagnetic metasurfaces have garnered widespread attention due to their capability for arbitrary wavefront manipulation of electromagnetic waves. In the field of information encryption, electromagnetic metasurfaces are also playing an increasingly important role. This article proposes a one-time dual-authentication encryption scheme for metasurfaces based on the XOR algorithm. Compared to traditional metasurface encryption, we do not store information solely in a single degree of freedom of the electromagnetic wave, thus avoiding decryption by indiscriminate attacks from adversaries. By employing the XOR algorithm of digital systems, we divide the information to be encrypted into multiple parts, which are held by several individuals, with each part containing no useful information on its own. To decrypt the information, the collaboration of all participants is required to successfully decode the encrypted message. On this basis, we have also designed a dual-authentication decryption method that requires two layers of decryption to break the final encrypted information. The first layer of decryption not only confuses attackers but also provides a key for the second layer of decryption, achieving a dual anti-counterfeiting purpose. Moreover, due to the theoretically unbreakable nature of the one-time pad (OTP), our scheme offers extremely strong security. To validate the theoretical concept, we improved the traditional G-S algorithm, using metasurface holography as a bridge, designed theoretical simulations at the 8-GHz electromagnetic band, and conducted microwave experiments. The experimental results highly correspond with the simulation outcomes, confirming the feasibility of the concept.
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Microwave Theory and Techniques
IEEE Transactions on Microwave Theory and Techniques 工程技术-工程:电子与电气
CiteScore
8.60
自引率
18.60%
发文量
486
审稿时长
6 months
期刊介绍: The IEEE Transactions on Microwave Theory and Techniques focuses on that part of engineering and theory associated with microwave/millimeter-wave components, devices, circuits, and systems involving the generation, modulation, demodulation, control, transmission, and detection of microwave signals. This includes scientific, technical, and industrial, activities. Microwave theory and techniques relates to electromagnetic waves usually in the frequency region between a few MHz and a THz; other spectral regions and wave types are included within the scope of the Society whenever basic microwave theory and techniques can yield useful results. Generally, this occurs in the theory of wave propagation in structures with dimensions comparable to a wavelength, and in the related techniques for analysis and design.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信