Standardization of Quantum Cryptography in China

Similar documents
Quantum threat...and quantum solutions

Quantum Key Distribution. The Starting Point

Applications of Quantum Key Distribution (QKD)

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

Quantum Wireless Sensor Networks

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Quantum Cryptography

Spatial information sharing technology based on Grid

Recent Topics regarding ISO/TC 211 in Japan

Research, Development and Simulation of Quantum Cryptographic Protocols

Realization of B92 QKD protocol using id3100 Clavis 2 system

Calculation of the Key Length for Quantum Key Distribution

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

APPLICATIONS. Quantum Communications

GEOGRAPHIC INFORMATION SYSTEM ANALYST I GEOGRAPHIC INFORMATION SYSTEM ANALYST II

Practical quantum-key. key- distribution post-processing

Ping Pong Protocol & Auto-compensation

Oregon Department of Transportation. Geographic Information Systems. Implementation Plan. Adopted November, 2000 By the GIS Steering Committee

QUALIFICATION SPECIFICATION

The quantum threat to cryptography

arxiv: v1 [quant-ph] 4 Mar 2009

Ready for INSPIRE.... connecting worlds. European SDI Service Center

C. QUANTUM INFORMATION 99

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

The Swedish National Geodata Strategy and the Geodata Project

Information Security in the Age of Quantum Technologies

Status of interoperability issues in the Chilean SDI. Álvaro Monett Pablo Morales Executive Secretariat NSDI-Chile

C. QUANTUM INFORMATION 111

PROGRESS IN OPTICS VOLUME 4 9. E. Wolf

AS/NZS ISO :2015

CHAPTER 22 GEOGRAPHIC INFORMATION SYSTEMS

SPATIAL INFORMATION GRID AND ITS APPLICATION IN GEOLOGICAL SURVEY

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

Clock Synchronization Procedure

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

The Quantum Age Technological Opportunities

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Everything NENA: GIS Data Standards, the NEAD, and the NG9-1-1 Act of 2017

ISO 2575 INTERNATIONAL STANDARD. Road vehicles Symbols for controls, indicators and tell-tales

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Geografisk information Referensmodell. Geographic information Reference model

Quantum Information Transfer and Processing Miloslav Dušek

OIML R 141 RECOMMENDATION. Edition 2008 (E) ORGANISATION INTERNATIONALE INTERNATIONAL ORGANIZATION

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

INTERNATIONAL STANDARD

Quantum Networking: Deployments, Components and Opportunities September 2017

This document is a preview generated by EVS

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Cyber Security in the Quantum Era

Quantum key distribution for the lazy and careless

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Device-Independent Quantum Information Processing

Maritime Spatial Planning in the Baltic Sea Region

Leveraging Web GIS: An Introduction to the ArcGIS portal

2007 / 2008 GeoNOVA Secretariat Annual Report

URISA QUESTIONNAIRE DRAFT MUNICIPAL GIS CAPABILITY MATURITY MODEL

Analyzing the IETF ACE-OAuth Protocol

Mobile Driver License (mdl) June 20, Geoff Slagle Director, Identity Management AAMVA

The Quantum Threat to Cybersecurity (for CxOs)

Application of Internet+ Field Survey Technology in China s Land Management

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

Global 3D Machine Vision Market Report- Forecast till 2022

Kansas Next Generation 911

SDI Standards at work

A Model of GIS Interoperability Based on JavaRMI

Maryland Transit Administration (MTA) Bus Accident Mapping and Analysis Application

Smart Sensing Embedded Spectroscopy Platform Botlek studiegroep 06-april-2017

ISO Radiological protection Sealed radioactive sources General requirements and classification

MetConsole AWOS. (Automated Weather Observation System) Make the most of your energy SM

ESBN. Working Group on INSPIRE

CHILEAN GEO-SPATIAL NATIONAL DATA INFRASTRUCTURE (INDE) Pablo Gran Rodrigo Barriga Alfredo Gonzalez María L. Advis Juan C. Montero Leonardo Oyarzun

GIS at UCAR. The evolution of NCAR s GIS Initiative. Olga Wilhelmi ESIG-NCAR Unidata Workshop 24 June, 2003

Quantum Technologies: Threats & Solutions to Cybersecurity

Everything is Quantum The EU Quantum Flagship

Notes for Lecture 17

Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++

Quantum Cryptography. Marshall Roth March 9, 2007

Part 1: Fundamentals

Portal for ArcGIS: An Introduction. Catherine Hynes and Derek Law

Background Document: Report of the Regional Committee of United Nations Global Geospatial Information Management for Asia and the Pacific

ISO INTERNATIONAL STANDARD. Geographic information Spatial referencing by coordinates

Advanced GIS Applications in Transit

GSDI: Towards a Spatially Enabled Society

The role of the authorities, SVHC substances, data issues

Quantum key distribution

E-Government and SDI in Bavaria, Germany

How to Increase the Significance of your GIS

Integration and Higher Level Testing

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Communication

Vol. 5, No. 5 May 2014 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Dual 3-channel analog multiplexer/demultiplexer with supplementary switches

Practical Quantum Key Distribution

LECTURE NOTES ON Quantum Cryptography

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

Ground-Satellite QKD Through Free Space. Steven Taylor

Transcription:

Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018

CONTENTS 1 Background on Quantum Cryptography 2 Standardization of Quantum Cryptography 3 Introduction on Quantum Cryptography Standards 4 Roadmap of Quantum Cryptography Standards 2

Background on Quantum Cryptography Necessity Quantum cryptography can be applied to the information security fields of government, military, finance, electricity, taxation, and customs. Draft of China QKD network

Background on Quantum Cryptography Roadmap of quantum cryptography Network Performance Security Cost cost Application Standardization Security Application Cost performance Tel/Fax Multimedia Authentication Quantum route/switch Integration with existing networks Secure key rate Maximum safe distance Stability, Usability

CONTENTS 1 Background on Quantum Cryptography 2 Standardization of Quantum Cryptography 3 Introduction on Quantum Cryptography Standards 4 Roadmap of Quantum Cryptography Standards 5

Relationships of Cryptography Standardization Technical Committee Cryptography Standardization Technical Committee (CSTC) Cryptography Standardization Technical Committee : Responsibilities for the standardization of cryptographic technology, product, system management, etc. 6

Standardization of Quantum Cryptography Quantum cryptography standard workgroup had been set up by the Cryptography Standardization Technical Committee in November 2012. 需求 The workgroup lead by Anhui Asky Quantum Technology Co.,Ltd.

Standardization of Quantum Cryptography Tasks of Quantum cryptography standard workgroup To formulate the QKD standards system and make a developing plan To draw the relation companies, scientific institutions, and the experts of university into the working group To investigate the user, sales, products designer, and also the security requirements to QKD To draft and revise the standards To Training engineer and consulting Popularization and application To promote international cooperation and participate the International Organization for QKD Standards

需Members of the committee of QKD Many companies became members of the QKD workgroup 求 Many interest committee, such as communication companies, energy industries, finance and government agents, participated in the standardization of quantum secure communication.

Standardization of Quantum Cryptography Seminars of Quantum Cryptography Standards 2015 Langfang 2017 Beijing 2016 Beijing 2018 Suzhou

Standardization of Quantum Cryptography List of the Cryptography Standardization Technical Committee Time Project Name 2016 Technology Specification of Network Cryptographic Server Based on QKD Technology 2016 Technology Specification of Decoy BB84 QKD Protocol 2017 Report on Evaluation Specification of Decoy BB84 Quantum Key Distribution System 2017 Report on Encrypted Communication Technology Framework Based on QKD Technology 2018 Research on Quantum Random Number 2018 Decoy BB84 QKD Test Specification 2018 Research on Relay Security of QKD Network 2018 Quantum Key Application Interface Specification 2018 Coherent State Continuous Variable QKD Technology Specification

Standardization of Quantum Cryptography Working Contents Technology of quantum key application Technology requirements of key application Key application interface Device requirements of key application Quantum VPN Quantum encrypter Requirements of system and application Business requirements and application scenario Network architecture Network operation management Technology of quantum key management and device management Technology requirements of key management Key management Key relay Key service interface Technology requirements of device management Device management interface Device communication protocol

Standardization of Quantum Cryptography Working Contents Technology of quantum key distribution Requirements of QKD protocol Decoy BB84 protocol Continuous variable protocol Technical requirements of quantum channel Quantum repeater Routing and exchange Channel multiplexing Technical requirements of quantum security Security of QKD Security of component and device Security of interface Test technology of quantum cryptography Protocol test Performance test Security test

CONTENTS 1 Background on Quantum Cryptography 2 Standardization of Quantum Cryptography 3 Introduction on Quantum Cryptography Standards 4 Roadmap of Quantum Cryptography Standards 14

Introduction on Quantum Cryptography Standards Decoy BB84 Quantum Key Distribution Technology Specification Described the procedure of the decoy BB84 quantum QKD protocol. Specified the security indicators of each stage, and the technical requirements of the product functions, performance and management. Decoy BB84 Quantum Key Distribution Test Specification Specified the test purpose, environment configuration, process and judgment of the decoy BB84 QKD protocol. Described the testing requirements and methods of the products function, performance, hardware, software and safety management.

Case Introduction on Quantum Cryptography Standards Decoy BB84 Quantum Key Distribution Technology Specification Sections Details 01 Scope Application scope and specification boundaries 02 Normative Documents referenced in this specification references 03 Terms and definitions Terms, definitions, symbols and abbreviated terms in this specification 04 Symbols and abbreviated terms QKD applications in communication system, architectures of QKD system, 05 Overview deployment requirements of QKD products, authentication requirements of QKD protocol 06 Quantum key distribution protocol 07 Product requirements Technology requirements of QKD protocol, including quantum state preparation, quantum state transmission, quantum state measurement, basis sifting, error correction, privacy amplification and authentication Including products function, performance, hardware, software and safety management

Introduction on Quantum Cryptography Standards Decoy BB84 Quantum Key Distribution Test Specification Sections Details 01 Scope Application scope and specification boundaries 02 Normative references 03 Terms and definitions 04 Symbols and abbreviated terms 05 Overview 06 Test contents 07 Test methods 08 Conformity assessment Documents referenced in this specification Terms, definitions, symbols and abbreviated terms in this specification Contents of this Specification, Relationship of Communication and QKD System, Authentication of QKD, Requirement of Assemblage Test contents and methods about the QKD protocol and products Conformity assessment of the QKD products

Introduction on Quantum Cryptography Standards Technology & Test Requirements for Decoy BB84 Protocol Quantum state preparation Quantum state transmission Quantum state measurement Basis sifting Error correction Technical Contents Basis error Quantum state error Light intensity accuracy Phase randomness Correct of coding process Information leakage prevention Correct of decoding process Detection Protocol conformance in the basis sifting process protocol conformance in the error correction process Privacy amplification Authentication protocol conformance in the privacy protocol conformance in the authentication process

Introduction on Quantum Cryptography Standards Technology & Test Requirements for Product Function Performance Hardware Software Technical Contents Device initialization Function of QKD Key management Randomness of Quantum Key Quantum key generation rate Maximum distance of QKD Interface Random number generator Environmental adaptability Reliability Software security Application program interface Management tools Security Management Key management Data management Remote control management Device management

Introduction on Quantum Cryptography Standards A draft of the Decoy BB84 Quantum Key Distribution Technology Specification is calling for public comments. A first versions of the Decoy BB84 Quantum Key Distribution Test Specification has been formed, and will be reviewed.

CONTENTS 1 Background on Quantum Cryptography 2 Standardization of Quantum Cryptography 3 Introduction on Quantum Cryptography Standards 4 Roadmap of Quantum Cryptography Standards 21

Roadmap of Quantum Cryptography Standards Completion of quantum cryptographic standardization system until 2025 Establish technical standards to construct quantum cryptographic networks which integrate with traditional optical networks. Establish application standards to realize the application of quantum cryptography in traditional communications. Establish security standards for quantum secure communication systems. Goals

Roadmap of Quantum Cryptography Standards Quantum Cryptography Standard System Architecture 01 Basic 02 Key Application Technology 06 Security Application Cryptography Industry Communication Industry Financial Industry Electric Industry Evaluation System Business Applicatio n Service System Architecture Networking Technology Operation Management Safety Management Terminology Key Agreement Management 03 Key Management Technology Key Relay Management Key Management 04 Key Agreement Technology Device Management Protocol Security System/ Device Security Quantum key Distribution Protocol Quantum key Distribution Device Quantum Channel Multiplexing Technology Quantum Component Component Security Quantum Random Number Quantum Certification 05 Quantum Cryptography Correlative technology Quantum Public Key Quantum Relay Quantum Information Encryption Quantum Error Correction Quantum Computing Algorithm Security 07 Detection and Evaluation Including seven parts

T H A N K S E-mail: zfhan@ustc.edu.cn Tel: +86 0551-63607342 Anhui Asky Quantum Technology Co.,Ltd 24