Security processor with quantum key distribution (original) (raw)

The Engineering of Software-Defined Quantum Key Distribution Networks

IEEE Communications Magazine, 2019

Quantum computers will change the cryptographic panorama. A technology once believed to lay far away into the future is increasingly closer to real world applications. Quantum computers will break the algorithms used in our public key infrastructure and in our key exchange protocols, forcing a complete retooling of the cryptography as we know it. Quantum Key distribution is a physical layer technology immune to quantum or classical computational threats. However, it requires a physical substrate, and optical fiber has been the usual choice. Most of the time used just as a point to point link for the exclusive transport of the delicate quantum signals. Its integration in a real-world shared network has not been attempted so far. Here we show how the new programmable software network architectures, together with specially designed quantum systems can be used to produce a network that integrates classical and quantum communications, including management, in a single, production-level infrastructure. The network can also incorporate new quantum-safe algorithms and use the existing security protocols, thus bridging the gap between today's network security and the quantum-safe network of the future. This can be done in an evolutionary way, without zero-day migrations and the corresponding upfront costs. We also present how the technologies have been deployed in practice using a production network.

The SECOQC quantum key distribution network in

2009

In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004–2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) videoconference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and...

Modular Quantum Key Distribution Setup for Research and Development Applications

Journal of Russian Laser Research, 2019

Quantum key distribution (QKD), ensuring unconditional security of information, attracts a great deal of interest. One of the most actual tasks is to design modular QKD setups as a platform for educational purposes as well as for research and development applications. In this work, we present a modular QKD system driven by National Instruments (NI) cards with open source LabView code and open source Python code for post processing. We demonstrate that the developed modular QKD setup has a high degree of robustness beyond laboratory conditions. We use the setup for distribution of quantum keys between two bank offices in Moscow.

Architecture of the Secoqc Quantum Key Distribution network

2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07), 2007

The European projet Secoqc (Secure Communication based on Quantum Cryptography) [1] aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

Advances in device-independent quantum key distribution

arXiv (Cornell University), 2022

Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only it allows for information-theoretic security based on quantum mechanics, but it relaxes the need to physically model the devices, hence fundamentally ruling out many quantum hacking threats to which non-DI QKD systems are vulnerable. In practice though, DI-QKD is very challenging. It relies on the loophole-free violation of a Bell inequality, a task that requires high quality entanglement to be distributed between distant parties and close to perfect quantum measurements, which is hardly achievable with current technology. Notwithstanding, recent theoretical and experimental efforts have led to the first proof-of-principle DI-QKD implementations. In this article, we review the state-of-the-art of DI-QKD by highlighting its main theoretical and experimental achievements, discussing the recent proof-of-principle demonstrations, and emphasizing the existing challenges in the field.

Architecture and protocols of the future European quantum key distribution network

Security and Communication Networks, 2008

A point-to-point quantum key distribution (QKD) system takes advantage of the laws of quantum physics to establish secret keys between two communicating parties. Compared to the classical methods, such as public-key infrastructures, QKD offers unconditional security, which makes it attractive for very high security applications. However, this unprecedent level of security is mitigated by the inherent constraints of quantum communications, such as the limited rates and ranges of an individual point-to-point QKD link. A QKD network, which can be built by combining multiple point-to-point QKD devices, can alleviate the constraints and enable point-to-multi-point key distribution based on QKD technology. The European project, secure communication based on quantum cryptography (SeCoQC) aims at deploying a prototype QKD network, which will be demonstrated in September 2008, by developing the architecture and the protocols, as well as the specific hardware for long-range QKD networks. This paper discusses the important aspects of the architecture and the network layer protocols of the SeCoQC QKD network.

A Proposed Architecture for Key Management Schema in Centralized Quantum Network

Advances in Computational Intelligence and Robotics

Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-to-point mode, so it is crucial to demonstrate compatibility with this type of network in order to maximize the application range for QKD. Therefore, this chapter proposed architecture for implementing a multicast quantum key distribution Schema. The proposed architecture is designed as a Multicast Centralized Key Management Scheme Using Quantum Key Distribution and Classical Symmetric Encryption. In this architecture, a secured key generation and distribution solution has been proposed for a single host sending to two or more (N) receivers using centralized Quantum Multicast Key Distribution Centre and classical symmetric encryption.

High performance quantum key distribution prototype system using a commercial off-the-shelf solution: experimental and emulation demonstrations

Optica Applicata, 2017

A continuous variable-quantum key distribution system prototype that uses weak coherent states with a diffused phase, commercial off-the-shelf devices, complete free space 90-degrees hybrid and simplified quantum protocol is proposed in this paper. In general, the quantum transmitter-receiver shows an experimental average quantum bit error rate of 30% using auto-homodyne detection with 0.25 photons per pulse in locking phase mode. The emulated final secret key rate measurements were 20 and 40 Kbps for minimum (30 Mbps) and maximum (90 Mbps) throughput, respectively, in a real traffic network using databases for the quantum keys generated by two true random number generators.

Experimental Quantum Key Distribution Secure Against Malicious Devices

2020

The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus providing Eve with multiple opportunities to meddle with the devices. As a consequence, conventional hardware and/or software hacking attacks pose natural threats to the security of practical QKD. Fortunately, if the number of corrupted devices is limited, the security can be restored by using redundant apparatuses. Here, we report on the demonstration of a secure QKD setup with optical devices and classical post-processing units possibly controlled by an eavesdropper. We implement a 1.25 GHz chip-based measurement-device-independent QKD system secure against malicious devices on \emph{both} the measurement and the users' sides. The secret key rate reaches 137 bps over a 24 dB channel loss. Our setup, benefiting from high clock rate, miniaturized transmitters and a cost-effective structure, provides a promising solution for widespread applications requiring uncompromising communica...

Different Architectures of Quantum Key Distribution Network

Studies in big data, 2017

Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-to-point mode, so it is crucial to demonstrate compatibility with this type of network in order to maximize the application range for QKD. The researchers have proposed several approaches for Quantum Key Distribution Network. In this chapter we will discuss these various architectures.