150 likes | 165 Views
Explore the world of Quantum Key Distribution (QKD) technology for ultimate data protection. Learn about the project goals and structure, and the importance of standardization for network security.
E N D
Content • IP-SECOQC – Consortium, Funding • What is Quantum Cryptography? • Project Goals / Project Structure • Standard Related Issues: • In Quantum Key Distribution Primitives • In Network Infrastructures based on Quantum Key Distribution … on 15 slides
Integrated Project FP6-2002- IST-1 -506813 Unit D4: ICT for Trust and Security Objective: „Towards a global dependability and security framework“ Duration: April 2004 – April 2008
Consortium Co-ordinator: ARC Seibersdorf research (Vienna) 41 Teams: 25 from Universities 4 from National Research Centers 8 Multinational Enterprises 4 SMEs …from 11 European Countries: A, B, CH, CZ, D, DK, F, I, RU, S, UK Funding: 11.300.000 Euros
Introduction ‘Quantum Cryptography’ …actually, this is a little bit misleading. more accurately: ‘Quantum Key Distribution’
QKD, what is it? • Quantum Key Distributionis simultaneous generation of identical bit sequences in two distinct locations with quantum physical methods • Quantum technology guaranteesunconditional security • QKD enables the implementation of aperfectly secure secret channel
Project Goals Make QKD ready for practical application • Make physical devices ready for practical application • Provide necessary interfaces for the integration into existing applications • Develop conceptual design for networked infrastructures
Subprojects I • COM – Components • Development of advanced Sources and Detectors • Experimental QKD - 4 Teams / different Technologies: • Zeilinger/Vienna Entangled Photons • Ribordy/Geneva Weak Pulses • Grangier/Paris Continuous Variables • Weinfurter/Munich Free Space
Subprojects II • QIT – Quantum Information Theory • Evaluation of different QKD technologies • Development of quantum protocols • SEC – Security and Cryptography • Classical security analysis • Development of cryptographic algorithms and models
Subprojects III • SYS – System Integration • Market analysis • Integration of QKD into existing systems • Definition of Interfaces • NET – Network Architecture • Network design and simulation • Development of QKD based infrastructures • Definition of Network Standards
Subprojects IV • CCC – Certification acc. to „Common Criteria“ • Carry out preparatory work for security certification • Establishment of IT security specifications
Network Architectures I • SecLink • Point to Point • For banks, ATMs, governmental institutions • SecMAN (Metropolitan Area Network) • All nodes belong to one organisation • All end users have QKD channels to some network member • For big companies with many urban outlets
Network Architectures II • SecWAN • Secret is distributed over many paths • Attacker has to control at least one node in each path • For trusted centers, users with special privacy needs
Conclusion: Importance of Standardisation • Standardisation of ‘internal’ interfaces • Achieve interoperability of QKD components of different manufacturers • Standardisation of ‘external’ interfaces and network infrastructures • To make applications compatible with different QKD systems • Provide applications standardised access to QKD based infrastructures
Thank You!Thomas LängerARC Seibersdorf research thomas.laenger@arcs.ac.atwww.secoqc.net