This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:


peer-reviewed publication

trusted source


Protecting light communication with random objects

Protecting light communication with random objects
Diagram of the scheme.  Alice sends a message to Bob while Eve tries to retrieve the message. In this scheme, the original message is only retrieved after passing through both PUFs, meaning Eve can't get the message. Credit: University of Twente

Researchers from the Complex Photonic Systems (COPS) group used two layers of random materials to encrypt and decrypt a message sent via light communication. With that, they hid the sender and receiver simultaneously, and only when the light passed through both layers was the message received.

The research team published their findings in the journal Optics Express, and believes this proof of concept has applications in visible light communication systems, light fidelity (LiFi), and optical fiber communications.

In an era when is the lifeblood of our interconnected world, ensuring its security is paramount. Encryption plays a vital role in safeguarding our data, turning a simple message into a complex pattern and then converting it back, rendering it indecipherable if the message is intercepted in the middle.

As technology advances at an unprecedented pace, the future of communication lies in the realm of visible light. But how can we guarantee the security of this cutting-edge form of communication?

Surprisingly, the solution may be found in everyday objects. Researchers from the University of Twente, in collaboration with experts from the Technical University of Eindhoven and the innovative Signify company (formerly known as Philips Lighting), have shown that random materials—such as a layer of paint, a piece of paper, or a glass diffuser—enhance the secrecy of by scrambling the message.

When light traverses through these random materials, it scatters in multiple directions, creating an intricate pattern known as a speckle pattern. This very pattern becomes the foundation for .

Protecting light communication with random objects
Distribution of 50,000 random patterns at the receiver (Bob). With this distribution, Alice and Bob agree on which patterns are a binary 0 or a binary 1. Bob just needs to measure spots A and B to receive the message. Credit: University of Twente

This encryption follows the concept of physical unclonable function (PUF). A PUF is an object so complex that it cannot be copied with current technologies. If a PUF is used as an , only the correct key—which is unclonable—can access the information. In this case, the key is the random object, and the information is the speckle pattern.

Researchers from the Complex Photonic Systems (COPS) group took this concept even further. Instead of using a single key to encrypt the message, they use two layers of random media as dual keys. With that, they hide the sender and receiver simultaneously, and only when the light passes through both keys is the message received. Any malicious eavesdropper attempting to intercept the message in transit would be confronted with a meaningless mixture of random patterns, utterly unrelated to the original message.

Furthermore, the secrecy is enhanced by the redundancy of the system. The proposed system is based on modulating the using a device similar to a screen projector (or beamer) at the sender. Because the random materials are so complex, there are thousands of different ways to modulate the light, resulting in the same message, while changing the random pattern between the two keys. If the sender is constantly switching between the different modulations, an attacker in the middle is overwhelmed with random patterns, while the receiver is unaffected by it.

The paper, "Enhanced secrecy in optical communication using speckle from multiple scattering layers," by Alfredo Rates, Joris Vrehen, Bert Mulder, Wilbert L. Ijzerman, and Willem L. Vos, appears in Optics Express. The data used for the publication are available in the Zenodo database

More information: Alfredo Rates et al, Enhanced secrecy in optical communication using speckle from multiple scattering layers, Optics Express (2023). DOI: 10.1364/OE.493479

Rates Alfredo et al, From Noise to Signal: Multi-layer Speckle Correlation with Applications in Visible Light Communication, Zenodo (2022). DOI: 10.5281/zenodo.6397330

Journal information: Optics Express

Citation: Protecting light communication with random objects (2023, July 17) retrieved 3 December 2023 from
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Cryptography without using secret keys


Feedback to editors