1 / 15

Quantum Cryptography: Securing Data with Unconditional Security

Explore the world of Quantum Key Distribution (QKD) technology for ultimate data protection. Learn about the project goals and structure, and the importance of standardization for network security.

jsummer
Download Presentation

Quantum Cryptography: Securing Data with Unconditional Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Content • IP-SECOQC – Consortium, Funding • What is Quantum Cryptography? • Project Goals / Project Structure • Standard Related Issues: • In Quantum Key Distribution Primitives • In Network Infrastructures based on Quantum Key Distribution … on 15 slides

  2. Integrated Project FP6-2002- IST-1 -506813 Unit D4: ICT for Trust and Security Objective: „Towards a global dependability and security framework“ Duration: April 2004 – April 2008

  3. Consortium Co-ordinator: ARC Seibersdorf research (Vienna) 41 Teams: 25 from Universities 4 from National Research Centers 8 Multinational Enterprises 4 SMEs …from 11 European Countries: A, B, CH, CZ, D, DK, F, I, RU, S, UK Funding: 11.300.000 Euros

  4. Introduction ‘Quantum Cryptography’ …actually, this is a little bit misleading. more accurately: ‘Quantum Key Distribution’

  5. QKD, what is it? • Quantum Key Distributionis simultaneous generation of identical bit sequences in two distinct locations with quantum physical methods • Quantum technology guaranteesunconditional security • QKD enables the implementation of aperfectly secure secret channel

  6. Project Goals Make QKD ready for practical application • Make physical devices ready for practical application • Provide necessary interfaces for the integration into existing applications • Develop conceptual design for networked infrastructures

  7. Subprojects I • COM – Components • Development of advanced Sources and Detectors • Experimental QKD - 4 Teams / different Technologies: • Zeilinger/Vienna Entangled Photons • Ribordy/Geneva Weak Pulses • Grangier/Paris Continuous Variables • Weinfurter/Munich Free Space

  8. Subprojects II • QIT – Quantum Information Theory • Evaluation of different QKD technologies • Development of quantum protocols • SEC – Security and Cryptography • Classical security analysis • Development of cryptographic algorithms and models

  9. Subprojects III • SYS – System Integration • Market analysis • Integration of QKD into existing systems • Definition of Interfaces • NET – Network Architecture • Network design and simulation • Development of QKD based infrastructures • Definition of Network Standards

  10. Subprojects IV • CCC – Certification acc. to „Common Criteria“ • Carry out preparatory work for security certification • Establishment of IT security specifications

  11. Point to Point QKDSimplified Component Model

  12. Network Architectures I • SecLink • Point to Point • For banks, ATMs, governmental institutions • SecMAN (Metropolitan Area Network) • All nodes belong to one organisation • All end users have QKD channels to some network member • For big companies with many urban outlets

  13. Network Architectures II • SecWAN • Secret is distributed over many paths • Attacker has to control at least one node in each path • For trusted centers, users with special privacy needs

  14. Conclusion: Importance of Standardisation • Standardisation of ‘internal’ interfaces • Achieve interoperability of QKD components of different manufacturers • Standardisation of ‘external’ interfaces and network infrastructures • To make applications compatible with different QKD systems • Provide applications standardised access to QKD based infrastructures

  15. Thank You!Thomas LängerARC Seibersdorf research thomas.laenger@arcs.ac.atwww.secoqc.net

More Related