ETSI ISG QKD. Martin Ward. Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017

Size: px
Start display at page:

Download "ETSI ISG QKD. Martin Ward. Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017"

Transcription

1 ETSI ISG QKD Martin Ward Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017

2 ETSI Industry Specification Group in QKD Mission: To develop ETSI Group Specifications / Group Reports describing quantum cryptography for ICT networks Publishes GS (or since 2016 GR) Documents based on QKD use cases, Application Interfaces, Security Proofs, Module Specification, Ontology, Characterisation of Components and Modules, Deployment Parameters and Implementation Security Membership includes large industry, telecom operators, SMEs, NMIs and universities Open to new members and participants Contact the ISG Chair Andrew Shields (andrew.shields@crl.toshiba.co.uk) Next ISG Meeting in Munich, 4 5 December 2017

3 Main Areas of Activity Components and module characterisation Correct characterisation important for implementation security Define market for specialist components and modules Implementation Security Promote best practice in implementation security Mitigate risks of side channels and active attacks Deployment scenarios Ensuring effective communication over deployments, network requirements etc. Interfaces Enabling interoperability and application development

4 Component and module characterisation GS QKD 011 published in 2016 Component characterization: characterizing optical components for QKD systems Specifications for the components used in QKD systems will stimulate a supply chain for the technology Define a market for specialist components such as photon sources and detectors New metrology of standard telecommunications components for quantum applications Some parameters related back to primary standards e.g., pulse photon number Specifications benefit companies manufacturing components for quantum technologies and QKD manufacturers

5 Module characterisation Work item DGS/QKD 0013_TransModChar Characterisation of Optical Output of QKD transmitter modules Performing metrology on complete QKD modules Additional challenges over measuring bare components Want to verify behaviours in optical outputs and confirm correct operation In a QKD module interferometers and time varying signals etc. Test procedures require and involvement of manufacturer Talk by Christopher Chunnilall (NPL) tomorrow at 13:30

6 Implementation security All security systems need to be designed to avoid side channels QKD security is based in the optical layer on the properties of light at a small scale Inability to fully measure / clone photons useful for forward security Some potential side channels are common with classical systems use existing standards Need to understand how implementations differ from ideal protocols QKD assumes eavesdropping and quantifies information leak Same approach often applicable for side channels if these cannot be eliminated by design: quan fy and use privacy amplifica on

7 Implementation security DGS/QKD 0010_ISTrojan Implementation security: protection against Trojan horse attacks in one way QKD systems Specifies passive countermeasures against attack Defines metrology to quantify optical isolation of QKD system Design guidelines for receiver modules Enables manufacturer to apply necessary privacy amplification to remove residual risk Consideration of certification Aim to ensure ISG security documents are structured to help future certification work Series of conference calls during 2017 to consider approach

8 Deployment scenarios DGS/QKD 0012_DeployParam Device and Communication Channel Parameters for QKD Deployment Define the main communication resources involved in a QKD system Communication channels Common architectures Planning a QKD Deployment: Entities and Contexts Information exchange template Help parties to understand what matters for a successful deployment and to communicate requirement effectively

9 Application Interfaces GS QKD 004 Application Interface Internal interface for key requests Function calls not network protocols DGS/QKD 014KeyDeliv Protocol and data format of key delivery API to Applications For application developers to make simple calls to a QKD network to request cryptographic keys Allow interoperability of equipment from different vendors Required as active integration work by manufacturers Single QKD link or an extended network Future ISG work items likely on integration into SDN architectures and wider key management issues

10 Update work Reviewing earlier documents due to Technical progress Contents moved to more detailed specifications E.g., GS QKD 003 Components and Internal Interfaces (under revision) GS QKD 011 Component characterization (replaces parts of GS QKD 003) Improve uniformity of terminology used in ISG documents Ontology

11 Summary The rate of innovation in QKD remains high New protocols Improved performance and ease of use of systems Satellite links to extend reach Several network being constructed ETSI remains central in leading the development of standards for QKD The ISG is working to enable the future interoperability of quantum communications networks being developed around the world Promotes best practice in implementation security Mitigate the risks of side channels and active attacks For further details on QKD please visit:

Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd)

Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd) UPDATE ON ETSI ISG QKD Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd) Industry Specification Group in Quantum Key Distribution Global Deployments of Quantum Key Distribution

More information

Andrew Shields (Toshiba Research Europe Ltd)

Andrew Shields (Toshiba Research Europe Ltd) ETSI S ROLE IN THE DEPLOYMENT OF QUANTUM KEY DISTRIBUTION Andrew Shields (Toshiba Research Europe Ltd) Industry Specification Group in Quantum Key Distribution Quantum Key Distribution optical fibre Quantum

More information

An Update on ETSI ISG QKD

An Update on ETSI ISG QKD An Update on ETSI ISG QKD Andrew Shields (Chair) Industry Specification Group in Quantum Key Distribution Global Deployments of QKD EU Flagship Programme UK Quantum Network TREL Tokyo QKD Network Cambridge

More information

Mobile Edge Computing

Mobile Edge Computing Mobile Edge Computing A key technology towards 5G 1 Nurit Sprecher (Chair of ETSI MEC ISG) 5G World 2016, London, UK 5G Use Cases and Requirements 5G Use Cases Families and Related Examples Build a virtual

More information

Cloud Security Alliance Quantum-safe Security Working Group

Cloud Security Alliance Quantum-safe Security Working Group Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security

More information

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the

More information

Security Perspectives for Quantum Key Distribution

Security Perspectives for Quantum Key Distribution Security Perspectives for Quantum Key Distribution Norbert Lütkenhaus Institute for Quantum Computing & Department of Physics and Astronomy University of Waterloo, Canada Ontario Research Funds DARPA Office

More information

Extensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013

Extensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Extensible standards and impact on technology switching costs Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Agenda Why standardize? Impact of standardization on adoption

More information

ETSI GS QKD 005 V1.1.1 ( ) Group Specification

ETSI GS QKD 005 V1.1.1 ( ) Group Specification GS QKD 005 V1.1.1 (2010-12) Group Specification Quantum Key Distribution (QKD); Security Proofs Disclaimer This document has been produced and approved by the Quantum Key Distribution (QKD) Industry Specification

More information

National Network of Quantum Technologies Hubs: Quantum Communications Hub. Director: Professor Tim Spiller Affiliation

National Network of Quantum Technologies Hubs: Quantum Communications Hub. Director: Professor Tim Spiller Affiliation National Network of Quantum Technologies Hubs: Quantum Communications Hub Director: Professor Tim Spiller Affiliation Quantum Communications Hub: Partners Academic partners: York (lead), Bristol, Cambridge,

More information

Security Standardization

Security Standardization ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012

More information

World Class Standards. Sophia Antipolis, December Margot Dor

World Class Standards. Sophia Antipolis, December Margot Dor WORKSHOP WIRELESS FACTORY Sophia Antipolis, 15-16 December 2008 Margot Dor margot.dor@etsi.org ETSI, a helicopter view World Class Standards ICT standards organization, open to direct participation Global

More information

National Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division

National Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division National Cybersecurity Challenges and NIST Matthew Scholl Chief Computer Security Division National Archives The Importance of Standards Article I, Section 8: The Congress shall have the power to fix the

More information

onem2m - A Common Service Layer for IoT Basic principles and architecture overview

onem2m - A Common Service Layer for IoT Basic principles and architecture overview onem2m - A Common Service Layer for IoT Basic principles and architecture overview Presented by: Xavier Piednoir For: ILNAS & ETSI Workshop IoT & Technical Standardization 6 July 2018 ETSI 2018 Contents

More information

Authentication and routing in simple Quantum Key Distribution networks

Authentication and routing in simple Quantum Key Distribution networks Authentication and routing in simple Quantum Key Distribution networks Andrea Pasquinucci UCCI.IT, via Olmo 26, I-23888 Rovagnate (LC), Italy arxiv:cs/0506003v1 [cs.ni] 1 Jun 2005 June 02, 2005 Abstract

More information

5G security activities and future plan in ITU-T SG17

5G security activities and future plan in ITU-T SG17 5G security activities and future plan in ITU-T SG17 Heung Youl Youm, PhD Chairman, ITU-T SG17 Professor, Soonchunhyang University, Korea(Rep. of) Content Strategic Vision for ITU-T SG17 Overview of 5G

More information

Performance and Security Evaluation of SDN Networks in OMNeT++/INET. Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini

Performance and Security Evaluation of SDN Networks in OMNeT++/INET. Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini Performance and Security Evaluation of SDN Networks in OMNeT++/INET Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini Software Defined Networking - Overview Key concepts Separation of Control plane and

More information

ETSI Zero touch network and Service Management (ZSM)

ETSI Zero touch network and Service Management (ZSM) ETSI Zero touch network and Service Management (ZSM) Enabling agile service delivery and new business opportunities Presented by: Nurit Sprecher ETSI ISG ZSM Vice Chair For: SDN NFV World Congress 2018

More information

ETSI Zero touch network and Service Management (ZSM)

ETSI Zero touch network and Service Management (ZSM) ETSI Zero touch network and Service Management (ZSM) Enabling agile service delivery and new business opportunities Presented by: Klaus Martiny, Chair, ETSI ISG ZSM For: NFV SDN World Congress 2018 11.10.2018

More information

Security analysis and assessment of threats in European signalling systems?

Security analysis and assessment of threats in European signalling systems? Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide

More information

A Quantum Cryptography Communication Network Based on Software Defined Network

A Quantum Cryptography Communication Network Based on Software Defined Network A Quantum Cryptography Communication Network Based on Software Defined Network Hongliang Zhang 1.*, Dongxiao Quan 1.*, Changhua Zhu 1.*, and Zhigang Li 1.* 1 Skate Key Laboratory of Integrated Services

More information

Security

Security Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from

More information

Dynamic program analysis

Dynamic program analysis Dynamic program analysis Pierre.Girard@gemalto.com RE-TRUST workshop Meudon, March 19, 2009 Mission of the day Give an overview of tools and procedures for dynamic software analysis in an industrial security

More information

Digital Platforms for 'Interoperable and smart homes and grids'

Digital Platforms for 'Interoperable and smart homes and grids' 25 October 2017, Brussels Digital Platforms for 'Interoperable and smart homes and grids' Focus Area "Digitising and Transforming European Industry and Services by Svet Mihaylov DG CONNECT WP 2018-2020

More information

SAFEcrypto: Secure Architectures of Future Emerging cryptography

SAFEcrypto: Secure Architectures of Future Emerging cryptography SAFEcrypto: Secure Architectures of Future Emerging cryptography Máire O Neill Queen s University Belfast This project has received funding from the European Union H2020 research and innovation programme

More information

TECHNICAL ORGANIZATION

TECHNICAL ORGANIZATION TECHNICAL ORGANIZATION Organizing the work ETSI Seminar ETSI 2013. All rights reserved Technical Organization, Technical Bodies The ETSI Technical Organization comprises three types of Technical Body (TB):

More information

Cyber-Physical Chain (CPChain) Light Paper

Cyber-Physical Chain (CPChain) Light Paper Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Patching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE

Patching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE Patching and Updating your VM SUSE Manager Donald Vosburg, Sales Engineer, SUSE dvosburg@suse.com Why should I care? I just clone my base VM image, and after that it is not my problem... Understand the

More information

ETSI Multi-Access Edge Computing

ETSI Multi-Access Edge Computing ETSI Multi-Access Edge Computing MEC POCS 1 Dario Sabella (Intel), ETSI ISG Secretary and Lead of Industry Group Global IoT Summit 2017 - June 8, 2017, Geneva, Switzerland Why Edge Computing? as in Real

More information

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in

More information

Research, development, and perspective of Tokyo QKD Network

Research, development, and perspective of Tokyo QKD Network Presentation at ETSI meeting on 26 th 27 th, Sep, 2013 Research, development, and perspective of Tokyo QKD Network Kiyoshi Tamaki NTT basic research lab, Japan Project overview of Tokyo QKD Network Main

More information

Evolving IoT with Smart Objects

Evolving IoT with Smart Objects Evolving IoT with Smart Objects John Soldatos (jsol@ait.gr) Associate Professor Athens Information Technology isprint Workshop, Brussels, September 19th, 2017 Monolithic IoT applications (2005-2010) IoT

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Atras Network Communications

Atras Network Communications Atras Network Communications Guide to Information and Communications Technology (ICT) Standards developed and published by the Telecommunications Industry Association (TIA) The Telecommunications Industry

More information

ITU-T Y Next generation network evolution phase 1 Overview

ITU-T Y Next generation network evolution phase 1 Overview I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

Bridging the gap. New initiatives at ETSI. World Class Standards. between research and standardisation

Bridging the gap. New initiatives at ETSI. World Class Standards. between research and standardisation Bridging the gap between research and standardisation New initiatives at ETSI 4 th e-infrastructure Concertation Meeting 5-6 December 2007 Ultan Mulligan Director, Strategy & New Initiatives, ETSI ETSI

More information

Software Development for B92 Quantum Key Distribution Communication Protocol

Software Development for B92 Quantum Key Distribution Communication Protocol Software Development for B92 Quantum Key Distribution Communication Protocol Shirantha Wijesekera Dr. Sajal Palit Dr. Bala Balachandran University of Canberra University of Canberra University of Canberra

More information

Digital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe

Digital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe Digital (Virtual) Identities in Daidalos and beyond Amardeo Sarma NEC Laboratories Europe Who wants to pay for more Bandwidth? More Access Bandwidth? No one pays extra for volume or time plain usage is

More information

Presentation of Industry Specification group on Augmented Reality Framework (ISG ARF)

Presentation of Industry Specification group on Augmented Reality Framework (ISG ARF) Presentation of Industry Specification group on Augmented Reality Framework (ISG ARF) Presented by: ARF Chairman For: ETSI 2018 The context AR is a promising market with high revenue forecast e.g. 80$B

More information

Smart Grid and Cyber Security

Smart Grid and Cyber Security Smart Grid and Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology December 10, 2009 President s Cyberspace Policy Review

More information

ISO/IEC JTC 1 Study Group on Smart Cities

ISO/IEC JTC 1 Study Group on Smart Cities ANSI WORKSHOP ISO/IEC JTC 1 Study Group on Smart Cities Presented by Alex Tarpinian Senior Manager, IBM ANSI WORKSHOP: Smart and Sustainable Cities November 21, 2013 1 Overview ISO/IEC JTC 1 Study Group

More information

Advances in the security analysis of CVQKD. Sébastien Kunz-Jacques

Advances in the security analysis of CVQKD. Sébastien Kunz-Jacques Advances in the security analysis of CVQKD Sébastien Kunz-Jacques SeQureNet 2013-09-26 1/17 CVQKD: Gaussian protocol Grosshans-Grangier 2002 Send coherent states with Gaussian distribution Measurement:

More information

Practical application of Quantum Key Distribution and wider security implications.

Practical application of Quantum Key Distribution and wider security implications. Practical application of Quantum Key Distribution and wider security implications. Luke Beeson, VP Security 1 The exploding threat landscape. BT's viewpoint. What really matters: Alignment to business

More information

Quantum Secure Network - Architecture and Applications -

Quantum Secure Network - Architecture and Applications - [NEC Group Internal Use Only] 4 th ETSI/IQS Workshop on Quantum-Safe Cryptography Quantum Secure Network - Architecture and Applications - A. Tajima 1, T. Kondoh 1, T. Ochi 1, M. Fujiwara 2, K. Yoshino

More information

Smart Manufacturing and Standards: The NIST Role

Smart Manufacturing and Standards: The NIST Role Smart Manufacturing and Standards: The NIST Role Al Wavering, Chief Intelligent Systems Division Engineering Laboratory National Institute of Standards and Technology U.S. Department of Commerce October

More information

Introduction. January 1, 2015

Introduction. January 1, 2015 Introduction January 1, 2015 Radio Frequency IDentification Technologies that enable the capture of data about objects remotely using radio energy Our Mission To promote the public good by promoting high

More information

Arabian Cloud Computing Project

Arabian Cloud Computing Project ITU Workshop on Standardization on IMT, M2M, IoT, Cloud Computing and SDN (Algiers, Algeria, 8 September 2013) Arabian Cloud Computing Project Algiers, Algeria, 8 September 2013 Miss. Soumaya Benbartaoui

More information

SEAMLESS AIR ALLIANCE CONNECTED SKIES

SEAMLESS AIR ALLIANCE CONNECTED SKIES SEAMLESS AIR ALLIANCE CONNECTED SKIES Seamless Air Alliance 2018 2018 SAFE HARBOR The following is intended to outline general information and direction only. It is intended for information purposes only,

More information

ITU Workshop on 5G Security

ITU Workshop on 5G Security All Sessions Outcome ITU Workshop on 5G Security Geneva, Switzerland, 19 March 2018 Session 1: Understanding threats and security requirements of 5G 1. Identified 5G security topics, such as threats, requirements,

More information

WORKSHOP WIRELESS FACTORY AGENDA

WORKSHOP WIRELESS FACTORY AGENDA WORKSHOP WIRELESS FACTORY ETSI 15-16 December 2008 Sophia Antipolis ETSI (www.etsi.org) produces globally-applicable standards for Information and Communications Technologies (ICT), including fixed, mobile,

More information

[Draft] RDA Resource Description and Access

[Draft] RDA Resource Description and Access 1 To: From: Subject: Joint Steering Committee for Revision of AACR Deirdre Kiorgaard, Chair, JSC Draft statement of objectives and principles for RDA [Draft] RDA Resource Description and Access Objectives

More information

Network Functions Virtualisation. Kazuaki OBANA Media Innovation Laboratory, NTT Network Innovation Laboratories

Network Functions Virtualisation. Kazuaki OBANA Media Innovation Laboratory, NTT Network Innovation Laboratories Network Functions Virtualisation Looking to the Future NFV ETSI Industry Specification Group Kazuaki OBANA Media Innovation Laboratory, NTT Network Innovation Laboratories Network Functions Virtualisation:

More information

Workshop on Smart Sustainable Cities Samarkand, Uzbekistan, 1-2 June 2017 ITU-T Focus Group on Data Processing and Management

Workshop on Smart Sustainable Cities Samarkand, Uzbekistan, 1-2 June 2017 ITU-T Focus Group on Data Processing and Management Workshop on Smart Sustainable Cities Samarkand, Uzbekistan, 1-2 June 2017 ITU-T Focus Group on Data Processing and Management Gyu Myoung Lee ITU-T Chair of FG-DPM, WP3/13 Co-chair, Q16/13 and Q4/20 Rapporteur

More information

IEEE Conformity Assessment Program (ICAP) June12, 2013

IEEE Conformity Assessment Program (ICAP) June12, 2013 IEEE Conformity Assessment Program (ICAP) June12, 2013 Understanding Conformity Assessment Understanding Conformity Assessment What is Conformity Assessment? Conformity Assessment is defined as the process

More information

Optical network virtualization. Optical network virtualization. Transport SDN for cloud-centric networking

Optical network virtualization. Optical network virtualization. Transport SDN for cloud-centric networking Optical network virtualization Optical network virtualization Transport SDN for cloud-centric networking 1 Transport SDN for the cloud Manually initiated and managed provisioning processes do not provide

More information

Third annual ITU IMT-2020/5G Workshop and Demo Day 2018

Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 All Sessions Outcome Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 Geneva, Switzerland, 18 July 2018 Session 1: IMT-2020/5G standardization (part 1): activities and future plan in ITU-T SGs 1.

More information

Cybersecurity Testing

Cybersecurity Testing Cybersecurity Testing Tim Palmer Chief Technical Advisor, SAS Business Unit Torch Technologies, Inc. EXPERTISE // INNOVATION // CUSTOMER FOCUS // EXCELLENCE // INTEGRITY // COOPERATION // RELIABILITY About

More information

IoT Week Workshop on Globally Interoperable IoT Identification and Data Processing Identifiers in IoT

IoT Week Workshop on Globally Interoperable IoT Identification and Data Processing Identifiers in IoT IoT Week 2017 - Workshop on Globally Interoperable IoT Identification and Data Processing Identifiers in IoT Juergen Heiles, Siemens AG AIOTI WG3 IoT Identifier Task Force Co-Chair 1 Introduction In any

More information

NFC Forum Certification Program. Mikko Saarisalo Nokia Vice Chairman, NFC Forum

NFC Forum Certification Program. Mikko Saarisalo Nokia Vice Chairman, NFC Forum NFC Forum Certification Program Mikko Saarisalo Nokia Vice Chairman, NFC Forum April 21, 2011 NFC Forum Certification is Good for Business 1. Brings together a set of addressable markets whose combined

More information

5G Initiative 5G Roadmap Working Group Proposal for Contribution

5G Initiative 5G Roadmap Working Group Proposal for Contribution 5G Initiative 5G Roadmap Working Group Proposal for Contribution Cagatay Buyukkoc, AT&T Meryem Simsek, ICSI IEEE 5G Initiative Roadmap Mission statement Based on horizon scanning, interviews and expert

More information

ASEAN Connectivity and Infrastructure Financing Challenges

ASEAN Connectivity and Infrastructure Financing Challenges ASEAN Connectivity and Infrastructure Financing Challenges Gizella Marie A. Herrera Senior Officer, Connectivity Division, ASEAN Secretariat Policy Dialogue on Infrastructure Financing Strategies for South-

More information

CDMA2000 Workshop. Paul Le Rossignol. Nortel Networks, OMA Board Director

CDMA2000 Workshop. Paul Le Rossignol. Nortel Networks, OMA Board Director CDMA2000 Workshop Paul Le Rossignol Nortel Networks, OMA Board Director Open Mobile Alliance 1 2 3 4 Vision and Mission of OMA OMA s Market Position & Industry Benefits Structure & Scope OMA Interoperability

More information

Reachback: A Crucial Cross-cutting Element of Nuclear Security Detection Architecture

Reachback: A Crucial Cross-cutting Element of Nuclear Security Detection Architecture Reachback: A Crucial Cross-cutting Element of Nuclear Security Detection Architecture Harri Toivonen HT Nuclear Ltd, Finland Magic Maggiore, Technical Reachback Workshop, EC/JRC/ERNCIP and GICNT ISPRA,

More information

Spoofing Attack Against an EPC Class One RFID System

Spoofing Attack Against an EPC Class One RFID System Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Spoofing Attack Against an EPC Class One RFID System Christopher

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation SOLUTIONS CENTER SOLUTION SUMMARY From digitalization initiatives

More information

ETSI GS ZSM 006 V1.1.1 ( )

ETSI GS ZSM 006 V1.1.1 ( ) GS ZSM 006 V1.1.1 (2018-05) GROUP SPECIFICATION Zero touch network and Service Management (ZSM); Proof of Concept Framework Disclaimer The present document has been produced and approved by the Zero touch

More information

Strong encryption and superior availability at the same time. Complies with the stringent demands posed by mission-critical systems (MCS)

Strong encryption and superior availability at the same time. Complies with the stringent demands posed by mission-critical systems (MCS) Strong encryption and superior availability at the same time Complies with the stringent demands posed by mission-critical systems (MCS) Fanless, robust hardware integrated in the C20 platform End-to-end

More information

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication

More information

General Framework for Secure IoT Systems

General Framework for Secure IoT Systems General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,

More information

Twilio cloud communications SECURITY

Twilio cloud communications SECURITY WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and

More information

Session 3: Lawful Interception

Session 3: Lawful Interception Session 3: Lawful Interception Secure, verifiable and intelligible audit logs to support computer forensics in lawful interception 3 rd ETSI Security Workshop Elena de la Calle Vian Ministry of Industry

More information

NFV and SDN. Andy Reid BT Research and Innovation

NFV and SDN. Andy Reid BT Research and Innovation NFV and SDN Andy Reid BT Research and Innovation Clarifying what we mean by: SDN Separation of control plane logic/processing data plane header look up and forwarding Motivation Development of new control

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

Open Group Security Forum Overview

Open Group Security Forum Overview Open Group Security Forum Overview To the I3C, July 23, 2003 Mike Jerbic Chair Security Forum Office: 408.257.1648 m.jerbic@opengroup.org www.opengroup.org The Open Group is... A global consortium committed

More information

Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK

Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK 1 ETSI 2013. All rights reserved Trends and market drivers Growth in mobile

More information

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

ITU-T SG 17 Q10/17. Trust Elevation Frameworks ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents

More information

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,

More information

ETSI Security Standards Workshop January 2006

ETSI Security Standards Workshop January 2006 ETSI Security Standards Workshop Adrian Scrase ETSI CTO adrian.scrase@etsi.org 1 Welcome to ETSI 2 ETSI is A European standards organization Active in all areas of ICT Setting globally-applicable standards

More information

A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed

A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed Michael Rosenstein / Frank Corvese Michael Rosenstein michael.rosenstein@securedecisions.com 631.759.3910

More information

ETSI GS MEC-IEG 005 V1.1.1 ( )

ETSI GS MEC-IEG 005 V1.1.1 ( ) GS MEC-IEG 005 V1.1.1 (2015-08) GROUP SPECIFICATION Mobile-Edge Computing (MEC); Proof of Concept Framework Disclaimer This document has been produced and approved by the Mobile-Edge Computing (MEC) Industry

More information

ITU-T FG-DPM: Key Activities and Future Plans

ITU-T FG-DPM: Key Activities and Future Plans 1st ITU Workshop on Data Processing and Management for IoT and Smart Cities & Communities (Brussels, Belgium, 19 February 2018) ITU-T FG-DPM: Key Activities and Future Plans Gyu Myoung Lee Chair, ITU-T

More information

AIR FORCE INSTITUTE OF TECHNOLOGY

AIR FORCE INSTITUTE OF TECHNOLOGY SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS Carole A. Harper, Captain, USAF AFIT/GSE/ENV/12-M05 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE

More information

UGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW

UGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW UGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW S/No. STANDARDS CODE TITLE(DESCRIPTION) SCOPE 1. DUS ISO/IEC 29151:2017 technology -- Security techniques -- Code of

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

1 Quantum Cryptography

1 Quantum Cryptography J. Rothberg March 3, 204 Quantum Cryptography. Quantum Key Distribution A better name for this application of Quantum Mechanics is Quantum Key Distribution since what is transmitted is not a message but

More information

European Responsible Care Forum. Security & Safe Maintenance

European Responsible Care Forum. Security & Safe Maintenance European Responsible Care Forum Security & Safe Maintenance Brussels, Thursday 7 April 2011 Mike Zeegers - Director Europe Agenda: History IMPROVE PROJECT To enhance Secure infrastructure Objective of

More information

Virtual Private Networks.

Virtual Private Networks. Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies

More information

Cisco Cloud Application Centric Infrastructure

Cisco Cloud Application Centric Infrastructure Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified

More information

Altice Labs 5G activities

Altice Labs 5G activities Altice Labs 5G activities IEEE 5G Summit Portugal, Lisbon, ISCTE Luis Miguel Silva 19 January 2017 Altice labs is an Information and Communications Technology company belonging to the Altice Group, a multinational

More information

COMPANION FINAL EVENT 14 TH & 15 TH September 2016

COMPANION FINAL EVENT 14 TH & 15 TH September 2016 COMPANION FINAL EVENT 14 TH & 15 TH September 2016 Update on recent developments related to Connected and Automated Driving Myriam COULON CANTUER Smart Mobility & Living Communication Networks, Content

More information

Cloud Systems 2018 Training Programs. Catalog of Course Descriptions

Cloud Systems 2018 Training Programs. Catalog of Course Descriptions Cloud Systems 2018 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 Open 2 2018 Introduction Ericsson has developed a comprehensive Training Programs service

More information

NFV ACCELERATION INTRODUCTION. Presenter Ning Zong

NFV ACCELERATION INTRODUCTION. Presenter Ning Zong NFV ACCELERATION INTRODUCTION Presenter Ning Zong (zongning@huawei.com) 1 Some History - Why Acceleration is Beneficial to NFV PoC#21 - Network Intensive and Compute Intensive Hardware Acceleration ETSI

More information

Natural Security Alliance

Natural Security Alliance Natural Security Alliance Business model and pilot projects ITU 14 & 15 October 2014 Philippe'Batard' Batard&&&Partners' Summary Natural Security Alliance: an initiative from retailers and banks The solution

More information

An Overview of ISO/IEC family of Information Security Management System Standards

An Overview of ISO/IEC family of Information Security Management System Standards What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information

More information

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WGPL AHG Document DL/13(Rev.2)- E 28 October 2014 English only WGPL Ad Hoc Group on Resolution 174 RESOLUTION 174 (GUADALAJARA, 2010REV.

More information

Company. Olivetel S.A is a certified manufacturer owner of the trademarks:

Company. Olivetel S.A is a certified manufacturer owner of the trademarks: Company Olivetel was set up on 1993 following the major development seen in information technology, telecommunications and energy sectors, in order to respond a specific and demanding customer needs and

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information