Full Spectrum Laser Firmware Internal Encryption Error

Full Spectrum Laser Firmware Internal Encryption Error

Abstract

Meta-holographic encryption is a potentially of import technique for information security. Despite rapid progresses in multi-tasked meta-holograms, the number of information channels available in metasurfaces is limited, making meta-holographic encryption vulnerable to some attacking algorithms. Herein, we demonstrate a re-programmable metasurface that can produce capricious holographic images for optical encryption. The encrypted information is divided into two matrices. These two matrices are imposed to the incident lite and the metasurface, respectively. While the all-dielectric metasurface is static, the phase matrix of incident light provides additional degrees of freedom to precisely command the eventual functions at will. With a unmarried Si metasurface, arbitrary holographic images and videos have been transported and decrypted. Nosotros hope that this work paves a more promising style to optical data encryption and authentication.

Introduction

In modern order, almost everything is closely related to the cyberspace currently or in the nigh future. The recent reports of attacks by hackers on the databases evidence that the information security and authentication are more challenging, specially for the large commercial and financial companies
1
. In past decade, many types of optical encryption techniques based on classic and breakthrough optics have been developed to achieve reliable security of data
ii,3
. Attributable to its meaty and not-replicable nature, metasurface-based hologram has gradually been a promising arroyo
4,5,6,seven,eight,9,x
. Metasurface is a kind of two-dimensional materials that has the capability of precisely and fully controlling the incident light
eleven
. By advisedly designing the response of each antenna to dissimilar polarization, incident angle, wavelength, or orbital athwart momentum (OAM), multiple holographic images have been successfully implemented into a single metasurface in the by few years, significantly expanding the capacity and security of information encryption
7,12,13,14,15,sixteen,17,xviii,xix
. Despite of these progresses, the demonstrated meta-holograms are either static or binary
4,5,six,7,8,ix,10,11,12,13,xiv,xv,16,17,18,19,20
. While different multiplexing techniques based on spatial, polarization, wavelength, and OAM accept been combined recently, the number of information channels is even so finite and the electric current record value is only ~2six
(refs.

seven,fifteen,16,17,18,xix,xx,21,22,23,24,25,26
). Similar to the double-random-phase encryption technique, the finite aqueduct number makes the meta-holographic encryption vulnerable to certain attacks because the primal for decryption has to be used repeatedly without frequent update
27
. Therefore, from the point view of information security, it is highly desirable and urgent to realize a meta-hologram with space channels and higher security. Here, nosotros revisit the calorie-free–metasurface interaction and experimentally demonstrate a reprogrammable meta-hologram for optical security and authentication.

Results

Working principle

In principle, the interaction between light and metasurface tin can exist expressed as
28
:

$$U(x,y,z) = {\int\!\!\!\!\!\int} {U_{{\mathrm{inc}}}(x_0,y_0)U_{{\mathrm{meta}}}(x_0,y_0)h(x – x_0,y – y_0,z)} dx_0dy_0,$$

(1)

where
U
inc(x
0,
y
0) and
U
meta(ten
0,
y
0) represent to the functions of incident light and metasurface,
h(x,
y,
z) is an impulse response. The conventional approaches are generally focusing on the response of nanoantennas in metasurface
4,5,6,7,8,9,10,11,12,13,fourteen,15,16,17,eighteen,nineteen
. But few parameters of the incident light take been considered, e.m., polarization and OAM etc.
7,15,sixteen,17,18,xix,20,21,22,23,24,25,26
. Since the metasurface is typically static, the information channel is thus determined by the degrees of incident light and is strongly express
7,15,16,17,18,nineteen,20,21,22,23,24,25,26
. In this research, we divide the required phase profile of a holographic image into two matrices. I matrix is imposed to the metasurface (U
meta(x
0,
y
0)) as earlier, the other one is defined on the incident beam (U
inc(ten
0,
y
0)). This assumption is non but valid for algorithm but also consistent with the modern optical security arrangement, which consists of light source, lens, detectors, phase only masks, and spatial light modulators (SLMs) etc.
29,30
. On one hand, the two-dimensional matrix of incident beam can significantly aggrandize the number of data channels. Even though the metasurface is static, the large matrix of incident beam still has enough large parameters to modify the output beam (U(x,
y,
z)) and the respective holographic images. On the other paw, the dissever information in transported calorie-free and metasurface tin can improve the security. The codes for the modulation of incident light is transported through the cyberspace, whereas the metasurface can be implemented into the final decrypted devices. In case that the transported codes are cracked, they can but produce a random beam without any useful information (see inset in Fig.1b). If the metasurface is stolen and illuminated with an incorrect beam, no information can be hacked or a misleading image could be shown upwardly (Fig.1b). Merely when the modulated incident light matches the metasurface, as shown in Fig.1a, the encrypted image can exist displayed. According to Eq. (i), for encrypted data with fixed overall matrix, the matrices for the incident low-cal and the metasurface can be separated arbitrarily. Consequently, the roles of 2 matrices tin can exist interchanged and the flexibility of the system has been dramatically increased (see Supplementary Fig.2).

Fig. 1: The working principle of reprogrammable meta-hologram.
figure 1

a
The schematic of the meta-holographic image with the modulated incident beam.
b
The holographic image of metasurface when information technology is illuminated with an incorrect uniform laser beam. The inset shows that the incident beam itself cannot provide correct information.


Full size epitome

Experiments

To test the higher up analysis, nosotros have numerically designed the reprogrammable meta-hologram
31,32
. Taking an paradigm of “HIT 100 (100th ceremony of Harbin Constitute of Technology)”as an instance, the required stage contour for a holographic epitome has been calculated based on Gerchberg–Saxton algorithm. After because both of the efficiency and the fabrication difficulty, the continuous stage contour is discretized into 8-level phase steps (Supplementary Fig.3). And then the discretized matrix is separated into two matrices, which are imposed on the incident axle and the nanoantennas of Si metasurface, respectively (Fig.2a). The phase profile of incident light is controlled by a SLM (UPOLabs-HDSLM80R). The stage only metasurface is fabricated with standard silicon on sapphire wafer via a combined process of electron-beam lithography and reactive ion etching (Supplementary Notesane3)
32
. Effigy2b
shows the top-view scanning electron microscope (SEM) paradigm of the metasurface. It is equanimous as Si nanopillars with different radius
R. The height of Si nanopillar is fixed at 230 nm. In Fig.2b, viii types of nanopillars with
R = 44, 58, 64, 68, 73, 78, 85, and 95 nm are employed to provide relative loftier transmittance, and precipitous phases from 0 to 7π/4, simultaneously (Supplementary Notes13). In this experiment, each phase pixel of Si metasurface in Fig.2b
consists of multiple nanopillars with the same size. This setting is designed to fit the pixel size of Si metasurface and the matrix size of incident light.

Fig. 2: The experimental demonstration of meta-hologram.
figure 2

a
The designed image, the simulated holographic image, and two separated stage profiles.
b
The top-view SEM of the Si metasurface.
c
Schematic for capturing the meta-hologram.
d
The recorded meta-holographic images with the designed incident beam (left), with a uniform laser beam (centre), and the paradigm of incident light amplification by stimulated emission of radiation itself (right). Hither the lattice size is
L = 240 nm.


Full size paradigm

The Si metasurface is optically characterized with the setup in Fig.2c. Basically, the linearly polarized laser is generated with a He–Ne laser (633 nm) and a linear polarizer. The light is modulated by the SLM before information technology is focused onto the sample via a 4f organisation. The transmitted hologram is projected onto a screen in the far field and captured with a CCD camera (run across the “Methods” section). Figure2nd
shows the paradigm of intensity distribution generated past the metasurface. Similar to the numerical adding, a “HIT 100” paradigm has been experimentally produced when the Si metasurface is illuminated by the laser beam with the designed stage profile. The calibrated conversion efficiency of the meta-hologram is ~67% (Supplementary Fig.8). For a direct comparison, the aforementioned Si metasurface has also been illuminated with a uniform laser axle. As depicted in the heart panel of Fig.2nd, a misleading blueprint with wrong information is achieved. Similar encryption also holds true for the light source only. The modulated laser beam itself is besides an uniform laser spot with speckles instead of the designed information (correct panel in Fig.2d).

Read:  R4 Revolution for Ds Firmware V2 Movies

The to a higher place experiments show that the encrypted data tin can be protected even though the key or the metasurface was stolen. For a better demonstration, the vulnerability of the optical encryption scheme has besides been tested with a different key mismatch ratio. Figureiii
summarizes the experimental results equally a function of the modification on incident beam. It is clear to see that the meta-holographic image becomes blurry when the mismatch ratio is >x%. In case of the mismatch ratio exceeds xl%, the “HIT 100” image is close to the noise level and hard to be identified. This ways that the eavesdropper has to steal ~60% of the incident matrix and the last devices, simultaneously to barely recover the encrypted information. This is even higher than the recently demonstrated metasurface-based ghost imaging algorithm
eight
. Annotation that the to a higher place case is valid for the situation that both of the initial positions ((0,0) point of ii matrices and the longitudinal departure from the focal bespeak) and pixel sizes are known, and matched ane another. Without the above information, it shall consume orders of magnitude longer fourth dimension to randomly exam the right central for decryption (Supplementary Figs.6
and
7).

Fig. 3: The vulnerable examination of the meta-hologram.
figure 3

From
af, the mismatch ratio of the incident light increases from 0 to 50% with a step of 10%.


Total size prototype

In principle, the right key for decryption can still exist hacked if the random test fourth dimension is infinitely long
27
. To avoid the potential attack, the central must be updated frequently. As a upshot, the reprogrammable metasurface is highly desirable for the applications of optical encryption. According to Eq. (1), even though
U
meta(x
0,
y
0) is fixed and known, the displayed holographic image
U(x,
y,
z) can still be changed by controlling the incident light
U
inc(10
0,
y
0). And so the meta-hologram becomes all-optically controllable. In this sense, although the terminal hardware, such as Si metasurfaces are hard to be tuned in pixel level, the precise control of the incident beam can still ofttimes update the keys for decryption. Figure4
summarizes the experimental demonstration of the all-optically reprogrammable meta-hologram. In this experiment, the Si metasurface is kept as the aforementioned i as Fig.2b. By just modifying the phase distributions of the incident light, the displayed holographic epitome becomes an image of hydrogen element “H”, which is totally unlike from the image of “HIT 100” in Fig.2. With the further modification on incident light, the displayed hologram can be switched to an image of hydrogen element or whatsoever other elements. With the continuous change of incident light, nosotros have experimentally realized the holographic images of the entire periodic tabular array of the elements, with 118 types of elements. Here, each element is an individual holographic image produced by the same metasurface. The periodic table of elements is a clear demonstration of the programmable and all-optically controllable meta-hologram.

Fig. 4: The reprogrammable meta-hologram.
figure 4

The holographic images of periodic chemical element table. Each element in this table is one holographic image that is generated with the same metasurface in Fig.2.


Full size image

We note that the number of periodic element table is not the limit of the information channel of our design. With the same Si metasurface, we basically can realize arbitrarily shaped holographic images, including the holographic paradigm with complicated contents (Supplementary Fig.x). To verify this possibility, we take too produced a set of holographic images by modulating the incident beam and plotted them in Supplementary Fig.11. Each panel corresponds to one frame of a pinball archetype game. By playing these frames sequentially, a video of the pinball game from commencement to the end has too been achieved (Supplementary Movie1). These results farther demonstrate the potential of the proposed technique in the transportation of videos as well, significantly expanding the potential applications of metasurface holograms.

Read:  Sprint Note 5 Stock Firmware Download Qc5

Give-and-take

In summary, we have revisited the light–metasurface interaction and experimentally realized the reprogrammable meta-hologram. By separating the designed phase profile to 2 matrices, and defining them to incident laser and metasurface, we observe that the lack of pixel-level control of metasurface in optical frequency range can be made up via the all-optical control. With the phase command of incident axle, we have experimentally demonstrated that a single metasurface tin can display capricious holographic images, too every bit encrypted videos. This technique shall notice its applications in data security and authentication. It also paves a promising step toward dynamic displays as well.

Methods

The numerical simulation

The silicon metasurface was numerically imitation with a commercial software COMSOL Multiphysics. The Si nanorods are placed on a sapphire substrate with refractive indices of iii.88 and 1.76 at 633 nm. The height of nanorod was kept at 230 nm. The radius of nanorod and the lattice size are
R
and
L, respectively. Periodic purlieus conditions were applied in horizontal direction to mimic the periodic structure, and perfectly matched layers were used to absorb the transmission and reflection waves. The details are shown in Supplementary Notes1
and
2.

The fabrication of Si metasurface

The Si metasurfaces were fabricated past a combined process of electron-beam lithography and reactive ion etching. The 230 nm single-crystal silicon film on a sapphire wafer was cleaned with acetone and coated with 100 nm electron-beam resist polymethyl methacrylate. The sample was baked at 180 °C for one h and and then patterned by electron-beam writer (Raith E-line) with a dose xc µC/cmii
under an dispatch voltage xxx kV. Afterward developing with MIBK&IPA (ane:three) solution, 15 nm Cr was deposited on the sample using E-beam evaporation (SKE_A_75), and Cr hard mask was realized via a liftoff process in remover PG solution (Micro Chem) for 24 h. The blueprint was transferred to the Si through reactive ion etching with SF6
and CHF3
in Oxford Plasmalab Arrangement 100. The vacuum caste was 10−5
and the gas flow was 5 and l sccm for SF6 and CHF3, respectively. Finally, the Si metasurfaces were obtained past removing the Cr mask in Cr etchant solution (Aldrich Chemical science) for 30 min.

The optical label

During the optical characterization, the alignment of the phases in incident beam the phases in metasurface is crucial. The light is modulated past the SLM before information technology is focused onto the sample via a 4f system. The transmitted hologram is projected onto a screen in the far field and captured with a CCD camera. The SLM is switched to intensity module to clearly seen the focused axle, and precisely match it with the metasurface. Then it is switched dorsum to stage module and mensurate the meta-hologram.

Data availability

The data that support the findings of this report are available on asking from the respective authors.

References

  1. Check point research.
    Cyber Attach Trends: 2020 Mid-year Report
    https://research.checkpoint.com/2020/cyber-assault-trends-2020-mid-year-report/
    (2020).

  2. Refregier, P. & Javidi, B. Optical paradigm encryption based on input plane and Fourier plane random encoding.
    Opt. Lett.
    xx, 767–769 (1995).

    ADS
    CAS
    Article

    Google Scholar

  3. Unnikrishnan, G., Joseph, J. & Singh, Thousand. Optical encryption by double-random phase encoding in the fractional Fourier domain.
    Opt. Lett.
    25, 887–889 (2000).

    ADS
    CAS
    Article

    Google Scholar

  4. Ni, X., Kildishev, A. V. & Shalaev, V. G. Metasurface holograms for visible light.
    Nat. Commun.
    4, 2807 (2013).

    ADS
    Commodity

    Google Scholar

  5. Zheng, G. et al. Metasurface holograms reaching 80% efficiency.
    Nat. Nanotechnol.
    10, 308–312 (2015).

    ADS
    CAS
    Commodity

    Google Scholar

  6. Chen, W. T. et al. Loftier-efficiency broadband meta-hologram with polarization-controlled dual images.
    Nano Lett.
    14, 225–230 (2014).

    ADS
    Commodity

    Google Scholar

  7. Wen, D. et al. Helicity multiplexed broadband metasurface holograms.
    Nat. Commun.
    half-dozen, 8241 (2015).

    ADS
    Article
    PubMed

    Google Scholar

  8. Liu, H. C. et al. Single-pixel computational ghost imaging with helicity-dependent metasurface hologram.
    Sci. Adv.
    3, e1701477 (2017).

    ADS
    Article
    PubMed

    Google Scholar

  9. Gao, L. H. et al. Broadband diffusion of terahertz waves past multi-bit coding metasurfaces.
    Lite Sci. Appl.
    four, e324 (2015).

    CAS
    Article

    Google Scholar

  10. Yoon, G., Lee, D., Nam, One thousand. T. & Rho, J. Pragmatic metasurface hologram at visible wavelength: the residue between diffraction efficiency and fabrication compatibility.
    ACS Photon.
    v, 1643–1647 (2018).

    CAS
    Article

    Google Scholar

  11. Yu, N. et al. Light Propagation with phase discontinuities: generalized laws of reflection and refraction.
    Science
    334, 333–337 (2011).

    ADS
    CAS
    Commodity

    Google Scholar

  12. Cui, T. J., Qi, M. Q., Wan, X., Zhao, J. & Cheng, Q. Coding metamaterials, digital metamaterials and programmable metamaterials.
    Light Sci. Appl.
    3, e218 (2014).

    ADS
    Article

    Google Scholar

  13. Li, J. et al. Addressable metasurfaces for dynamic holography and optical information encryption.
    Sci. Adv.
    four, eaar6768 (2018).

    ADS
    Article
    PubMed

    Google Scholar

  14. Li, L. et al. Electromagnetic reprogrammable coding-metasurface holograms.
    Nat. Commun.
    8, 197 (2017).

    ADS
    Article
    PubMed

    Google Scholar

  15. Ye, Westward. et al. Spin and wavelength multiplexed nonlinear metasurface holography.
    Nat. Commun.
    7, 11930 (2016).

    ADS
    CAS
    Commodity
    PubMed

    Google Scholar

  16. Huang, L. et al. Broadband hybrid holographic multiplexing with geometric metasurfaces.
    Adv. Mater.
    27, 6444–6449 (2015).

    CAS
    Commodity

    Google Scholar

  17. Yue, Z., Ren, H., Wei, S., Lin, J. & Gu, M. Angular-momentum nanometrology in an ultrathin plasmonic topological insulator picture.
    Nat. Commun.
    9, 4413 (2018).

    ADS
    Article
    PubMed

    Google Scholar

  18. Xu, H. X. et al. Interference-assisted kaleidoscopic meta-plexer for arbitrary spin-wavefront manipulation.
    Light Sci. Appl.
    eight, 3 (2019).

    ADS
    Article
    PubMed

    Google Scholar

  19. Li, L. et al. Machine-learning reprogrammable metasurface imager.
    Nat. Commun.
    10, 1082 (2019).

    ADS
    Article
    PubMed

    Google Scholar

  20. Zhang, L. et al. Ultrabroadband blueprint for linear polarization conversion and asymmetric transmission crossing X- and K-ring.
    Sci. Rep.
    6, 33826 (2016).

    ADS
    CAS
    Article
    PubMed

    Google Scholar

  21. Liu, M. et al. Temperature-controlled asymmetric manual of electromagnetic waves.
    Sci. Rep.
    9, 4097 (2019).

    ADS
    Commodity
    PubMed

    Google Scholar

  22. Khalid, A. U. R. et al. Multipurpose thermoresponsive hydrogel: a platform for dynamic holographic display.
    Opt. Lett.
    45, 479–482 (2020).

    ADS
    CAS
    Article

    Google Scholar

  23. Chen, L., Ruan, Y. & Cui, H. Y. Liquid metal metasurface for flexible beam-steering.
    Opt. Express
    27, 23282–23292 (2019).

    ADS
    CAS
    Article

    Google Scholar

  24. Khalid, A. U. R., Liu, J., Ullah, North. & Jia, Southward. Tunable axle deflection based on plasmonic resonators mounted freestanding thermoresponsive hydrogel.
    Chin. Opt. Lett.
    18, 062402 (2020).

    ADS
    Article

    Google Scholar

  25. Jin, L. et al. Noninterleaved metasurface for (26-1) Spin- and wavelength-encoded holograms.
    Nano Lett.
    18, 8016–8024 (2018).

    ADS
    CAS
    Article

    Google Scholar

  26. Fang, X., Ren, H. & Gu, 1000. Orbital angular momentum holography for loftier-security encryption.
    Nat. Photon.
    fourteen, 102–108 (2019).

    ADS
    Article

    Google Scholar

  27. Peng, X., Zhang, P., Wei, H. & Yu, B. Known-plaintext set on on optical encryption based on double random phase keys.
    Opt. Lett.
    31, 1044–1046 (2006).

    ADS
    Article

    Google Scholar

  28. Jin, Fifty. et al. Dielectric multi-momentum meta-transformer in the visible.
    Nat. Commun.
    10, 4789 (2019).

    ADS
    Commodity
    PubMed

    Google Scholar

  29. Matoba, O. & Javidi, B. Optical retrieval of encrypted digital holograms for secure real-time display.
    Opt. Lett.
    27, 321–323 (2002).

    ADS
    Article

    Google Scholar

  30. Javidi, B. & Nomura, T. Securing information by utilize of digital holography.
    Opt. Lett.
    25, 28–thirty (2000).

    ADS
    CAS
    Article

    Google Scholar

  31. Zhang, C. et al. Dynamic perovskite metasurfaces: lead halide perovskite-based dynamic metasurfaces.
    Laser Photon. Rev.
    13, 1900079 (2019).

    ADS
    Article

    Google Scholar

  32. Gao, Y. et al. Nonlinear holographic all-dielectric metasurfaces.
    Nano Lett.
    18, 8054–8061 (2018).

    ADS
    CAS
    Article

    Google Scholar

Read:  What Is Intel Manageability Engine Firmware Recovery Agent

Download references

Acknowledgements

This research was supported past the National Key Research and Development Projection (Grant No. 2018YFB2200403), National Natural Science Foundation of China (Grant Nos. 11974092, 91850204, 11934012, and 61975041), Shenzhen Fundamental research projects (Grant No. JCYJ20180507184613841, JCYJ20180507183532343, and JCYJ20180306172041577), Shenzhen engineering laboratory on organic–inorganic perovskite devices, and the Primal Research Funds for the Central Universities. The authors also acknowledge fiscal support from Shenzhen Scientific discipline and Technology Innovation Commission (No. SGDX2019081623281169). The authors are grateful to the Department of Electronic and Data Engineering science, The Hong Kong Polytechnic University for their support likewise.

Author data

Affiliations

Contributions

Due south.X. and D.P.T. conceived the idea and supervise the research. Yard.Q. performed the device designs and experimental measurements. Due west.Y. and Y.50. helped the fabrication of nanostructures. Q.S., C.-W.Q. and J.H. analyzed the results. All the authors discussed the contents and prepared the manuscript.

Corresponding authors

Correspondence to
Din-Ping Tsai
or
Shumin Xiao.

Ethics declarations

Competing interests

The authors declare no competing interests.

Boosted information

Peer review data
Nature Communications
thanks Juan Liu and the other, bearding, reviewer(southward) for their contribution to the peer review of this work.

Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Rights and permissions

Open Access
This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, equally long as y’all requite appropriate credit to the original author(s) and the source, provide a link to the Artistic Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted employ, you will demand to obtain permission directly from the copyright holder. To view a copy of this license, visit
http://creativecommons.org/licenses/by/4.0/.

Reprints and Permissions

About this article


Verify currency and authenticity via CrossMark

Cite this article

Qu, M., Yang, West., Song, Q.
et al.
Reprogrammable meta-hologram for optical encryption.
Nat Commun
11,
5484 (2020). https://doi.org/10.1038/s41467-020-19312-9

Download citation

  • Received:



  • Accepted:



  • Published:



  • DOI
    :

    https://doi.org/10.1038/s41467-020-19312-ix

Further reading

Comments

By submitting a comment you agree to abide by our
Terms
and
Customs Guidelines. If yous find something calumniating or that does not comply with our terms or guidelines please flag it every bit inappropriate.

Full Spectrum Laser Firmware Internal Encryption Error

You May Also Like