Andrew Shields (Toshiba Research Europe Ltd)

Size: px
Start display at page:

Download "Andrew Shields (Toshiba Research Europe Ltd)"

Transcription

1 ETSI S ROLE IN THE DEPLOYMENT OF QUANTUM KEY DISTRIBUTION Andrew Shields (Toshiba Research Europe Ltd) Industry Specification Group in Quantum Key Distribution

2 Quantum Key Distribution optical fibre Quantum Communications -each bit encoded on a single photon Secrecy can be tested directly!! -quantum theory dictates that eavesdropping unavoidably alters encoding of single photons Detect unauthorised tapping of optical fibre networks Distribute verifiably-secret digital keys

3 Quantum Key Distribution Use Cases data centre Link Encryption back-up centre National Security Healthcare Networks Quantum Key Distribution Critical Infrastructure Mobile devices Financial Sector

4 Long Term Perspective Quantum-Safe Cryptography Large-scale Quantum Computer would have devastating effect on e-commerce, e-government, critical infrastructure security, individual privacy etc Shor s algorithm will break security of current Public Key Crypto (based on integer factorisation problem) New crypto systems take long time to deploy, so need to plan now. Two Solutions for Quantum-Safe Crypto Research on new PK methods with resilience to Shor s algorithm Quantum Crypto based on Laws of Nature not threatened by quantum computer or any conventional computer Courtesy of D-Wave Systems Inc. Address different applications BOTH are important

5 Nearer Term: Physical Layer Quantum Encryption Using installed fibre in BT network Choi et al, Optics Exp 22, (2014) 26 km, 10dB loss Commercial 10G DWDM transmission multiple 10 Gb/s data channels wire speed data encryption using AES 40 Gb/s data 4x10G DWDM encrypted ( , , , nm) field fibre 40 Gb/s data QKD ( nm) Data bandwidths over 1 Tb/s possible in the future

6 Recent Advances in QKD Technology Remarkable technological advances in recent years Secure key rates Increased from kb/s to multiple Mb/s Single link range increased to> 300 km 2Mb/s Increase of secure bit rate Security Rigorous security proofs developed Failure probability now quantified Implementation security is better understood 1Mb/s 0b/s Quantum Networks Integration in core, metro, access, mobile now demonstrated No longer necessary to use expensive dedicated dark fibre

7 Global QKD Network Installations 270M investment (Dec 2013) in Quantum Technologies UK Quantum Technologies Programme (2014-9) Metro QKD network (Toshiba, Mitsubishi, NEC, NTT, & others) led by NICT Calgary Waterloo Batelle km link from Ohio to Washington Boston SECOQC Paris Consortium Madrid Geneva Durban Tokyo QKD Network Beijing-Shanghai 2000 km link ($100M) from Beijing to Shanghai, ~50 node networks in Jinan and Hefei CQC 2 T Pilot deployments are taking place - it is meaningful to define requirements and standards now

8 Industrial Standards Industrial Standards are essential for Interoperability of systems from different manufacturers Integration into ordinary telecom networks Stimulate application development on common interfaces Stimulate a component supply chain for Quantum Technologies Security assurance Ensure that QKD is implemented securely

9 ETSI Industry Specification Group in QKD ISG-QKD established in 2008 Published Group Standardisation Documents on QKD Use Cases, Application Interfaces, Security Proofs, QKD Module specification, Ontology, Components and Internal Interfaces Membership comprises large industry, telecom operators, SMEs, NMIs, government labs, universities New members are welcome

10 Current Work Items of ETSI ISG Deployment parameters User requirements for implementing QKD Combining classical and quantum channels on a common optical fibre Quantum component specification Parameters and test procedures for quantum components Impact on system security see talk by Chris Chunnilall Implementation security Ensure that implementations are secure and robust against attack

11 Implementation Security Objective: Investigate and close security loopholes of real QKD systems Motivation Deviations between ideal and real system could be exploited by Eve through either active or passive attacks Approach Study and quantify known attacks Introduce appropriate countermeasures Modify the QKD protocol if necessary encoded single photons optical fibre Eve Exploits difference between theory and practical implementation

12 Security by Measurement Secure key rate after privacy amplification (ideal system) For given ε = prob of key failure Typically ε = (< 1 bad key per years) Modified secure key rate (real system) Info leakage due to error correction Finite key size effect Info leakage due to imperfection 1 Info leakage due to imperfection 2 etc

13 Trojan Horse Attack Eve injects bright light (µ in ) and measures back-reflection (µ out ) to determine Alice s or Bob s phase modulator settings DFB laser Pulsed 1GHz α β 0 Alice Bob 1 Eve Recent experimental studies (reported at QCrypt, Paris, Sept 14) CV QKD : Khan et al, Erlangen, Paris Telecom Tech & SecureNet two-way QKD : Sajeed et al, IQC & IdQuantique one-way QKD : considered here

14 Trojan Horse Attack Eve injects bright light (µ in ) and measures back-reflection (µ out ) to determine Alice s or Bob s phase modulator settings DFB laser Pulsed 1GHz α β 0 Alice Bob 1 Consider extreme case Eve Upper bound µ in using fibre laser damage threshold* I < 10 7 J/cm 2. Require µ out <10-4 (can be mitigated by <1% privacy amplification) optical isolation > 150 db (*) R M Wood, Laser-induced damage of optical materials, Taylor & Francis (2003).

15 Shutting out the Trojan Horse 150dB Isolation provided by spectral filtering and optical isolator(s) Filter Isolator Extinction > 80dBm (limited by dynamic range of measurement) Insertion loss < 1dB Isolation > 60dB at quantum λ Reflectivity Attenuation Isolation Total Alice 40dB 2x25dB 60dB 150dB Bob 40dB 0 110dB 150dB Trojan horse attacks blocked both at Alice & Bob using passive components

16 Summary Several large QKD network deployments underway worldwide Standards are essential for future interoperability To assure customers that technology implemented securely And to stimulate markets for components, systems and applications Thank you! Contact:

Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd)

Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd) UPDATE ON ETSI ISG QKD Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd) Industry Specification Group in Quantum Key Distribution Global Deployments of Quantum Key Distribution

More information

An Update on ETSI ISG QKD

An Update on ETSI ISG QKD An Update on ETSI ISG QKD Andrew Shields (Chair) Industry Specification Group in Quantum Key Distribution Global Deployments of QKD EU Flagship Programme UK Quantum Network TREL Tokyo QKD Network Cambridge

More information

ETSI ISG QKD. Martin Ward. Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017

ETSI ISG QKD. Martin Ward. Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017 ETSI ISG QKD Martin Ward Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017 ETSI Industry Specification Group in QKD Mission: To develop ETSI Group

More information

Security Perspectives for Quantum Key Distribution

Security Perspectives for Quantum Key Distribution Security Perspectives for Quantum Key Distribution Norbert Lütkenhaus Institute for Quantum Computing & Department of Physics and Astronomy University of Waterloo, Canada Ontario Research Funds DARPA Office

More information

Advances in the security analysis of CVQKD. Sébastien Kunz-Jacques

Advances in the security analysis of CVQKD. Sébastien Kunz-Jacques Advances in the security analysis of CVQKD Sébastien Kunz-Jacques SeQureNet 2013-09-26 1/17 CVQKD: Gaussian protocol Grosshans-Grangier 2002 Send coherent states with Gaussian distribution Measurement:

More information

Research, development, and perspective of Tokyo QKD Network

Research, development, and perspective of Tokyo QKD Network Presentation at ETSI meeting on 26 th 27 th, Sep, 2013 Research, development, and perspective of Tokyo QKD Network Kiyoshi Tamaki NTT basic research lab, Japan Project overview of Tokyo QKD Network Main

More information

National Network of Quantum Technologies Hubs: Quantum Communications Hub. Director: Professor Tim Spiller Affiliation

National Network of Quantum Technologies Hubs: Quantum Communications Hub. Director: Professor Tim Spiller Affiliation National Network of Quantum Technologies Hubs: Quantum Communications Hub Director: Professor Tim Spiller Affiliation Quantum Communications Hub: Partners Academic partners: York (lead), Bristol, Cambridge,

More information

Quantum Secure Network - Architecture and Applications -

Quantum Secure Network - Architecture and Applications - [NEC Group Internal Use Only] 4 th ETSI/IQS Workshop on Quantum-Safe Cryptography Quantum Secure Network - Architecture and Applications - A. Tajima 1, T. Kondoh 1, T. Ochi 1, M. Fujiwara 2, K. Yoshino

More information

Practical application of Quantum Key Distribution and wider security implications.

Practical application of Quantum Key Distribution and wider security implications. Practical application of Quantum Key Distribution and wider security implications. Luke Beeson, VP Security 1 The exploding threat landscape. BT's viewpoint. What really matters: Alignment to business

More information

University of Bristol - Explore Bristol Research. Other version. Link to publication record in Explore Bristol Research PDF-document.

University of Bristol - Explore Bristol Research. Other version. Link to publication record in Explore Bristol Research PDF-document. Price, A., Aguado, A., Hugues Salas, E., Haigh, P. A., Sibson, P., Marhuenda, J.,... Erven, C. (2016). Practical integration of Quantum Key Distribution with Next-Generation Networks. Abstract from International

More information

Presentation of ID Quantique

Presentation of ID Quantique Presentation of ID Quantique Scrambled Message Alice Bob Symmetric Cryptography Secret Key Secret Key 2007: The first commercial QKD device 2017: A world leader in ground QKD systems 2 Why QKD; Why QuSAT

More information

Arista 7500E DWDM Solution and Use Cases

Arista 7500E DWDM Solution and Use Cases ARISTA WHITE PAPER Arista DWDM Solution and Use Cases The introduction of the Arista 7500E Series DWDM solution expands the capabilities of the Arista 7000 Series with a new, high-density, high-performance,

More information

Presentation at GLOBECOM After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise. Gregory Kanter and Prem Kumar

Presentation at GLOBECOM After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise. Gregory Kanter and Prem Kumar Presentation at GLOBECOM 2007 After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise By Gregory Kanter and Prem Kumar NuCrypt, LLC 1801 Maple Ave. #6322, Evanston, IL 60201-3135

More information

Marc Hentsch Sales Engineer

Marc Hentsch Sales Engineer Marc Hentsch Sales Engineer marc.hentsch@idquantique.com Ch. de la Marbrerie, 3 Tel: +41 (0)22 301 83 71 1227 Carouge / Geneva Fax: +41 (0)22 301 83 79 Switzerland www.idquantique.com Presentation outline

More information

Secure NFV Orchestration over an SDN- Controlled Optical Network with Time- Shared Quantum Key Distribution Resources

Secure NFV Orchestration over an SDN- Controlled Optical Network with Time- Shared Quantum Key Distribution Resources > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Secure NFV Orchestration over an SDN- Controlled Optical Network with Time- Shared Quantum Key Distribution Resources

More information

Public-Key Cryptography

Public-Key Cryptography Computer Security Spring 2008 Public-Key Cryptography Aggelos Kiayias University of Connecticut A paradox Classic cryptography (ciphers etc.) Alice and Bob share a short private key using a secure channel.

More information

REDUCING THE COST OF METRO FIBRE ACCESS A SOLUTION GUIDE FOR SERVICE PROVIDERS

REDUCING THE COST OF METRO FIBRE ACCESS A SOLUTION GUIDE FOR SERVICE PROVIDERS REDUCING THE COST OF METRO FIBRE ACCESS A SOLUTION GUIDE FOR SERVICE PROVIDERS THE FIBRE CHALLENGE FIBRE: PLENTIFUL COMMODITY OR SCARE & EXPENSIVE RESOURCE? For those Carriers able to lay their own fibre,

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major

More information

ETSI GS QKD 005 V1.1.1 ( ) Group Specification

ETSI GS QKD 005 V1.1.1 ( ) Group Specification GS QKD 005 V1.1.1 (2010-12) Group Specification Quantum Key Distribution (QKD); Security Proofs Disclaimer This document has been produced and approved by the Quantum Key Distribution (QKD) Industry Specification

More information

Fibre in access: a necessary revolution?

Fibre in access: a necessary revolution? Fibre in access: a necessary revolution? Pierpaolo Ghiggino VP - Central Research Cambridge, CRN Bi-annual conference 29th June - 1st July 2005...It is the entire innovation process, not just its inventive

More information

IP Video Surveillance Network Solution

IP Video Surveillance Network Solution IP Video Surveillance Network Solution Telesail Video Surveillance Network Solution Overview Over more than 20 years, video surveillance systems have undergone significant changes, shifting from the earliest

More information

Optical Transceivers for 100GE

Optical Transceivers for 100GE Optical Transceivers for 100GE F3: Transceiver Circuits for Optical Communications ISSCC 10 11 February 2010 Chris Cole chris.cole@finisar.com Outline Optical Interface Types DSP in Datacom Optical Datacom

More information

Demonstration of an Active Quantum Key Distribution Network 1

Demonstration of an Active Quantum Key Distribution Network 1 Demonstration of an Active Quantum Key Distribution Network 1 Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry Hershman, Joshua Bienfang, David Su, Ronald F. Boisvert, Charles Clark, and

More information

Signature Core Fiber Optic Cabling System

Signature Core Fiber Optic Cabling System White Paper June 2012 WP-17 Signature Core Fiber Optic Cabling System Multimode Fiber: Understanding Chromatic Dispersion Introduction The performance and reliability of networks within the Data Center

More information

A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography

A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 USA Abstract This paper presents

More information

Cryptography. Andreas Hülsing. 6 September 2016

Cryptography. Andreas Hülsing. 6 September 2016 Cryptography Andreas Hülsing 6 September 2016 1 / 21 Announcements Homepage: http: //www.hyperelliptic.org/tanja/teaching/crypto16/ Lecture is recorded First row might be on recordings. Anything organizational:

More information

Authentication and routing in simple Quantum Key Distribution networks

Authentication and routing in simple Quantum Key Distribution networks Authentication and routing in simple Quantum Key Distribution networks Andrea Pasquinucci UCCI.IT, via Olmo 26, I-23888 Rovagnate (LC), Italy arxiv:cs/0506003v1 [cs.ni] 1 Jun 2005 June 02, 2005 Abstract

More information

Singlemode vs Multimode Optical Fibre

Singlemode vs Multimode Optical Fibre Singlemode vs Multimode Optical Fibre White paper White Paper Singlemode vs Multimode Optical Fibre v1.0 EN 1 Introduction Fibre optics, or optical fibre, refers to the medium and the technology associated

More information

Custom Hardware to Eliminate Bottlenecks in QKD Throughput Performance *

Custom Hardware to Eliminate Bottlenecks in QKD Throughput Performance * Custom Hardware to Eliminate Bottlenecks in QKD Throughput Performance * Alan Mink National Institute of Standards and Technology, 100 Bureau Dr., Gaithersburg, MD 20899 alan.mink@nist.gov ABSTRACT The

More information

New directions in Quantum Cryptography

New directions in Quantum Cryptography New directions in Quantum Cryptography dr. Mario Stipevi, Institut Ruer Boškovi CARNet Users Conference 2004 27-29 September 2004, FER, Zagreb Final version E-mail: Mario.Stipcevic@irb.hr 1 Why do we need

More information

100G DWDM QSFP Datasheet

100G DWDM QSFP Datasheet 100G DWDM QSFP Datasheet Product Overview The Arista Dense Wavelength-Division Multiplexing (DWDM) 100G QSFP pluggable module (Figure 1) offers cost effective solution for metro Data Center Interconnect

More information

Terminology. John D Ambrosia Futurewei, Subsidiary of Huawei Jan 24, 2018

Terminology. John D Ambrosia Futurewei, Subsidiary of Huawei Jan 24, 2018 Terminology John D Ambrosia Futurewei, Subsidiary of Huawei Jan 24, 2018 Introduction At Sept SG Meeting the following objectives were proposed (http://www.ieee802.org/3/b10k/public/17_09/villarruel_b10k_01b_0917.pdf)

More information

Global Crossing Optical. Lambdasphere Lambdaline Managed Fibre

Global Crossing Optical. Lambdasphere Lambdaline Managed Fibre Global Crossing Optical Lambdasphere Lambdaline Managed Fibre Global Crossing Optical What are Global Crossing Optical Services? The optical network within and between data centres is the critical fabric

More information

Extensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013

Extensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Extensible standards and impact on technology switching costs Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Agenda Why standardize? Impact of standardization on adoption

More information

Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018

Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018 Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018 Junichi Tomida (NTT), Katsuyuki Takashima (Mitsubishi Electric) Functional Encryption[OʼNeill10, BSW11] msk Bob f(x) sk f

More information

Software Development for B92 Quantum Key Distribution Communication Protocol

Software Development for B92 Quantum Key Distribution Communication Protocol Software Development for B92 Quantum Key Distribution Communication Protocol Shirantha Wijesekera Dr. Sajal Palit Dr. Bala Balachandran University of Canberra University of Canberra University of Canberra

More information

MetroWAVE CWDM REFERENCE GUIDE

MetroWAVE CWDM REFERENCE GUIDE MetroWAVE CWDM REFERENCE GUIDE INTRODUCTION WAVELENGTH DIVISION MULTIPLEXING Wavelength Division Multiplexing (WDM) is an optical network technology in which different service interfaces are allocated

More information

arxiv:quant-ph/ v2 2 Apr 2006

arxiv:quant-ph/ v2 2 Apr 2006 QKD Quantum Channel Authentication J.T. Kosloski National Security Agency, 9800 Savage Road, Fort George G. Meade, Maryland 20755 (Dated: February 1, 2008) arxiv:quant-ph/0603101v2 2 Apr 2006 Abstract

More information

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD ERIK JONSSON SCHOOL OF ENGINEERING & COMPUTER SCIENCE Cyber Security Research and Education Institute CS 6324: Information Security Dr. Junia Valente Department of Computer Science The University of Texas

More information

Open Cloud Interconnect: Use Cases for the QFX10000 Coherent DWDM Line Card

Open Cloud Interconnect: Use Cases for the QFX10000 Coherent DWDM Line Card Open Cloud Interconnect: Use Cases for the QFX10000 DWDM Delivering Scale, Security, and Resiliency to Metro, Regional, and Long-Haul Data Center Interconnect 1 Open Cloud Interconnect: Use Cases for the

More information

24 GHz Point-to-Point 1.4+ Gbps Radio. Datasheet. 4Gon Tel: +44 (0) Fax: +44 (0)

24 GHz Point-to-Point 1.4+ Gbps Radio. Datasheet. 4Gon   Tel: +44 (0) Fax: +44 (0) 24 GHz Point-to-Point 1.4+ Gbps Radio Model: AF24 High Performance Wireless Backhaul Long Range of 13+ km Worldwide License-Free 24 GHz Operation Revolutionary Wireless Technology Introducing airfiber,

More information

100GBPS, ULTRA-FAST, CERTIFIED HIGH- ASSURANCE NETWORK ENCRYPTION FOR MEGA DATA

100GBPS, ULTRA-FAST, CERTIFIED HIGH- ASSURANCE NETWORK ENCRYPTION FOR MEGA DATA 100GBPS, ULTRA-FAST, CERTIFIED HIGH- ASSURANCE NETWORK ENCRYPTION FOR MEGA DATA Common use case scenarios for 100Gbps certified high-assurance encryption security demanding full line-rate network performance.

More information

Certificateless Public Key Cryptography

Certificateless Public Key Cryptography Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.

More information

Global Leased Line Service

Global Leased Line Service SERVICE BROCHURE Global Leased Line Service from NTT Communications Predictable, low latency global networking with the highest quality A global managed bandwidth solution from NTT Communications (NTT

More information

Next Generation Requirements for DWDM network

Next Generation Requirements for DWDM network Next Generation Requirements for DWDM network Roman Egorov Verizon Laboratories May 3, 2011 Verizon copyright 2011. NG Requirements for DWDM network: Outline Optical Transport Network Metro vs. Long-Haul

More information

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer

More information

Lean Disaggregated Regional Optical Transport. Nick Plunket, Interconnection Engineer NANOG 74 October 2 or 3, 2018

Lean Disaggregated Regional Optical Transport. Nick Plunket, Interconnection Engineer NANOG 74 October 2 or 3, 2018 Lean Disaggregated Regional Optical Transport Nick Plunket, Interconnection Engineer NANOG 74 October 2 or 3, 2018 CENIC is a 501(c)(3) with the mission to advance education and research

More information

Surface bound data transfer. roke.co.uk

Surface bound data transfer. roke.co.uk Surface bound data transfer roke.co.uk is an alternative wireless solution enabling communication between devices over a surface. Using surface wave technology it offers a robust alternative to cables.

More information

Post-Quantum Cryptography

Post-Quantum Cryptography Post-Quantum Cryptography Professor Máire O Neill www.csit.qub.ac.uk CSIT is a Research Centre of the ECIT Institute 1 Rationale What happens if/when quantum computers become a reality? Commonly used Public-key

More information

Capability beyond equipment. Tardis plc Faber House Eastern Road Romford Essex RM1 3PJ

Capability beyond equipment. Tardis plc Faber House Eastern Road Romford Essex RM1 3PJ Tardis plc Tardis plc Faber House Eastern Road Romford Essex RM1 3PJ www.tardis.londom POC: Bob Speller Tel: 01708 774420 or 07831 220174 Email: bob.speller@tardis.uk.com PICTURE The SHS-24F White Paper

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

A (sample) computerized system for publishing the daily currency exchange rates

A (sample) computerized system for publishing the daily currency exchange rates A (sample) computerized system for publishing the daily currency exchange rates The Treasury Department has constructed a computerized system that publishes the daily exchange rates of the local currency

More information

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes What is Encryption Parties involved: Alice: The Sender Bob: The Receiver Eve: The Eavesdropper Aim of Encryption Alice wants to send a message to Bob The message should remain hidden from Eve What distinguishes

More information

ProLabs Introduction. Tuesday 11th October,

ProLabs Introduction. Tuesday 11th October, ProLabs Introduction Tuesday 11th October, 2016 www.prolabs.com 1 What products do ProLabs sell? OEM Compatibility verified and tested in target equipment Transceivers DACs & AOCs Media Converters Mux/DeMux

More information

Dell Networking Optics and Cables Connectivity Guide

Dell Networking Optics and Cables Connectivity Guide Dell Networking and Cables Connectivity Guide 1 Gigabit Ethernet (1GbE) 10 Gigabit Ethernet (10GbE) 40 Gigabit Ethernet (40GbE) 100 Gigabit Ethernet (100GbE) Fibre Channel Networking I/O Connectivity Options

More information

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC. Encryption Providing Perfect Secrecy Presented at Calgary Unix Users Group. November 27, 2001 by: Mario Forcinito, PEng, PhD With many thanks to Prof. Aiden Bruen from the Mathematics Department, University

More information

SWITCHlambda Update Felix Kugler, SWITCH

SWITCHlambda Update Felix Kugler, SWITCH SWITCHlambda Update Felix Kugler, SWITCH 2003 SWITCH Topics SWITCHlan network topology & technology 10Gigabit Ethernet testing on DWDM links Single Fiber Gigabit Ethernet 2 SWITCHlan topology by end of

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Digital Signatures. Luke Anderson. 7 th April University Of Sydney.

Digital Signatures. Luke Anderson. 7 th April University Of Sydney. Digital Signatures Luke Anderson luke@lukeanderson.com.au 7 th April 2017 University Of Sydney Overview 1. Digital Signatures 1.1 Background 1.2 Basic Operation 1.3 Attack Models Replay Naïve RSA 2. PKCS#1

More information

Cryptography for the Internet of Things. Kenny Paterson Information Security

Cryptography for the Internet of Things. Kenny Paterson Information Security Cryptography for the Internet of Things Kenny Paterson Information Security Group @kennyog; www.isg.rhul.ac.uk/~kp What is the Internet of Things? The Internet of Things (IoT) is the network of physical

More information

SENETAS CERTIFIED HIGH-ASSURANCE NETWORK ENCRYPTION FOR GOVERNMENT

SENETAS CERTIFIED HIGH-ASSURANCE NETWORK ENCRYPTION FOR GOVERNMENT SENETAS CERTIFIED HIGH-ASSURANCE NETWORK ENCRYPTION FOR GOVERNMENT WHO SHOULD READ THIS DOCUMENT Layer 2 Data Networks Managers and Support staff, Data Network Architects, Data Security Managers and staff,

More information

Making and Breaking Ciphers

Making and Breaking Ciphers Making and Breaking Ciphers Ralph Morelli Trinity College, Hartford (ralph.morelli@trincoll.edu) Smithsonian Institute October 31, 2009 2009 Ralph Morelli You are free to reuse and remix this presentation

More information

Sharing optical infrastructure - from small site integration to multi-domain backbone links

Sharing optical infrastructure - from small site integration to multi-domain backbone links Sharing optical infrastructure - from small site integration to multi-domain backbone links Felix Kugler felix.kugler@switch.ch Prague, September 11, 2017 2017 SWITCH 1 1 This talk is about SWITCHlan optical

More information

AIR FORCE INSTITUTE OF TECHNOLOGY

AIR FORCE INSTITUTE OF TECHNOLOGY SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS Carole A. Harper, Captain, USAF AFIT/GSE/ENV/12-M05 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE

More information

This document is devoted mainly to solve confusions and. (QKD), and we also give some case studies where the use of QKD deserves to be considered.

This document is devoted mainly to solve confusions and. (QKD), and we also give some case studies where the use of QKD deserves to be considered. On Security Issues of QKD This document is devoted mainly to solve confusions and doubts about the security of Quantum Key Distribution (QKD), and we also give some case studies where the use of QKD deserves

More information

2 Secure Communication in Private Key Setting

2 Secure Communication in Private Key Setting CSA E0 235: Cryptography January 11, 2016 Instructor: Arpita Patra Scribe for Lecture 2 Submitted by: Jayam Modi 1 Discrete Probability Background Probability Distribution -A probability distribution over

More information

VEEAM. Accelerating virtual machine replication with PORTrockIT

VEEAM. Accelerating virtual machine replication with PORTrockIT VEEAM Accelerating virtual machine replication with PORTrockIT EXECUTIVE SUMMARY Business continuity solutions such as Veeam offer the ability to recover quickly from disaster by creating a replica of

More information

Ethekwini Municipality

Ethekwini Municipality Ethekwini Municipality Next Generation Fibre Network Immanuel Pillay: IT 11 February 2009 Future Comms related Projects Spread spectrum radio in CBD to replace copper Use of metro wide fiber network Vehicle

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Cryptography Introduction to Computer Security. Chapter 8

Cryptography Introduction to Computer Security. Chapter 8 Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure

More information

POST-QUANTUM CRYPTOGRAPHY VIENNA CYBER SECURITY WEEK DR. DANIEL SLAMANIG

POST-QUANTUM CRYPTOGRAPHY VIENNA CYBER SECURITY WEEK DR. DANIEL SLAMANIG POST-QUANTUM CRYPTOGRAPHY VIENNA CYBER SECURITY WEEK 2018 02.02.2018 DR. DANIEL SLAMANIG WHAT IS POST-QUANTUM CRYPTOGRAPHY? Also called quantum safe/resistant cryptography NOT quantum cryptography (= quantum

More information

CHAPTER TWO LITERATURE REVIEW

CHAPTER TWO LITERATURE REVIEW CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access

More information

Next Generation Internet Program

Next Generation Internet Program Next Generation Internet Program Bert Hui Hilarie Orman Mari Maeda Approved for Public Release, Distribution Unlimited 1 GOVERNMENT-WIDE NGI GOALS NSF NIH DARPA NASA NIST Goal 1 Goal 2.1 Goal 2.2 Goal

More information

ECRYPT II Workshop on Physical Attacks November 27 th, Graz, Austria. Stefan Mangard.

ECRYPT II Workshop on Physical Attacks November 27 th, Graz, Austria. Stefan Mangard. Building Secure Hardware ECRYPT II Workshop on Physical Attacks November 27 th, Graz, Austria Stefan Mangard Infineon Technologies, Munich, Germany Stefan.Mangard@infineon.com Outline Assets and Requirements

More information

TECHNOLOGY PAPER ON HIGH CAPACITY DWDM NETWORK

TECHNOLOGY PAPER ON HIGH CAPACITY DWDM NETWORK DOCUMENT NO.: PBT 132 Copyright Commtel D. N. S. (India) Pvt. Ltd. TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SCOPE... 3 3 DWDM TECHNOLOGY... 3 4 FIBERS SUPPORTING DWDM... 5 5 DWDM ARCHITECTURES... 6 6 NOKIA

More information

The IP & Power over Coax FORUM

The IP & Power over Coax FORUM The IP & Power over Coax FORUM October 9, 2018 KEEP YOUR CABLES! ENABLE IP & POWER! 1 09/10/2018 Video Security Market Observation The need for high quality Video Security has never been so high! The number

More information

SIDE CHANNEL ANALYSIS : LOW COST PLATFORM. ETSI SECURITY WEEK Driss ABOULKASSIM Jacques FOURNIERI

SIDE CHANNEL ANALYSIS : LOW COST PLATFORM. ETSI SECURITY WEEK Driss ABOULKASSIM Jacques FOURNIERI SIDE CHANNEL ANALYSIS : LOW COST PLATFORM ETSI SECURITY WEEK Driss ABOULKASSIM Jacques FOURNIERI THE CEA Military Applications Division (DAM) Nuclear Energy Division (DEN) Technological Research Division

More information

Chapter 10 : Private-Key Management and the Public-Key Revolution

Chapter 10 : Private-Key Management and the Public-Key Revolution COMP547 Claude Crépeau INTRODUCTION TO MODERN CRYPTOGRAPHY _ Second Edition _ Jonathan Katz Yehuda Lindell Chapter 10 : Private-Key Management and the Public-Key Revolution 1 Chapter 10 Private-Key Management

More information

EC500. Design of Secure and Reliable Hardware. Lecture 1 & 2

EC500. Design of Secure and Reliable Hardware. Lecture 1 & 2 EC500 Design of Secure and Reliable Hardware Lecture 1 & 2 Mark Karpovsky January 17 th, 2013 1 Security Errors injected by the attacker (active attacks) Reliability Errors injected by random sources e.g.

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Goverment CCTV security HD video transmission in real time Layer

More information

GRIDS INTRODUCTION TO GRID INFRASTRUCTURES. Fabrizio Gagliardi

GRIDS INTRODUCTION TO GRID INFRASTRUCTURES. Fabrizio Gagliardi GRIDS INTRODUCTION TO GRID INFRASTRUCTURES Fabrizio Gagliardi Dr. Fabrizio Gagliardi is the leader of the EU DataGrid project and designated director of the proposed EGEE (Enabling Grids for E-science

More information

Security and Architecture SUZANNE GRAHAM

Security and Architecture SUZANNE GRAHAM Security and Architecture SUZANNE GRAHAM Why What How When Why Information Security Information Assurance has been more involved with assessing the overall risk of an organisation's technology and working

More information

Crypto Background & Concepts SGX Software Attestation

Crypto Background & Concepts SGX Software Attestation CSE 5095 & ECE 4451 & ECE 5451 Spring 2017 Lecture 4b Slide deck extracted from Kamran s tutorial on SGX, presented during ECE 6095 Spring 2017 on Secure Computation and Storage, a precursor to this course

More information

Fast and Easy CWDM Network Assessment, Using ITU-T G.695 application codes

Fast and Easy CWDM Network Assessment, Using ITU-T G.695 application codes Application Note Fast and Easy CWDM Network Assessment, Using ITU-T G.695 application codes MU909020A Network Master Optical Channel Analyzer Introduction Although Coarse wavelength-division multiplexing

More information

IoT and Privacy by Design

IoT and Privacy by Design IoT and Privacy by Design A recap on previous presentation More recent work on GDPR, NIS Cyber Security, and the Human Right to Privacy The design process for consumer goods and services 2 current examples

More information

arxiv: v1 [quant-ph] 15 Apr 2013

arxiv: v1 [quant-ph] 15 Apr 2013 1 Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters David Elkouss, Jesus Martinez-Mateo, Alex Ciurana, Vicente Martin arxiv:1304.4048v1 [quant-ph] 15 Apr 2013 Abstract

More information

Decentralised Communication: The challenge of balancing interoperability and privacy.

Decentralised Communication: The challenge of balancing interoperability and privacy. Decentralised Communication: The challenge of balancing interoperability and privacy. matthew@matrix.org http://www.matrix.org Privacy in Matrix 2 Two basic types of privacy: 1. Can attackers see what

More information

A NOTE ON AN ARBITRATED QUANTUM SIGNATURE SCHEME

A NOTE ON AN ARBITRATED QUANTUM SIGNATURE SCHEME International Journal of Quantum Information Vol. 7, No. 6 (2009) 1205 1209 c World Scientific Publishing Company A NOTE ON AN ARBITRATED QUANTUM SIGNATURE SCHEME ZHENGJUN CAO Département d informatique,

More information

BT Connect Networks that think Optical Connect UK

BT Connect Networks that think Optical Connect UK BT Connect Networks that think Optical Connect UK Fast, reliable, secure and affordable Connecting the heart of your organisation Your organisation and its people rely on its applications email, databases,

More information

Towards a Key Consuming Detection in QKD-VoIP Systems

Towards a Key Consuming Detection in QKD-VoIP Systems Towards a Key Consuming Detection in QKD-VoIP Systems Guohong Zhao, Wanrong Yu, Baokang Zhao, and Chunqing Wu School of Computer Science, National University of Defense Technology, Changsha, Hunan, China

More information

Group Key Establishment Protocols

Group Key Establishment Protocols Group Key Establishment Protocols Ruxandra F. Olimid EBSIS Summer School on Distributed Event Based Systems and Related Topics 2016 July 14, 2016 Sinaia, Romania Outline 1. Context and Motivation 2. Classifications

More information

HPC & Quantum Technologies in Europe

HPC & Quantum Technologies in Europe 64 th HPC User Forum HPC & Quantum Technologies in Europe Dr Gustav Kalbe Head of Unit High Performance Computing & Quantum Technologies DG CONNECT, European Commission European HPC Strategy & Support

More information

SENETAS CERTIFIED HIGH-ASSURANCE ENCRYPTION FOR THE DEFENCE INDUSTRY

SENETAS CERTIFIED HIGH-ASSURANCE ENCRYPTION FOR THE DEFENCE INDUSTRY SENETAS CERTIFIED HIGH-ASSURANCE ENCRYPTION FOR THE DEFENCE INDUSTRY XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXX-SP0817 The defence industry has become dependent upon the fixed, high-speed

More information

HIGH-ASSURANCE FLEXIBLE 1-10GBPS ENCRYPTION CN6000 SERIES

HIGH-ASSURANCE FLEXIBLE 1-10GBPS ENCRYPTION CN6000 SERIES HIGH-ASSURANCE FLEXIBLE 1-10GBPS ENCRYPTION CN6000 SERIES WHO SHOULD READ THIS DOCUMENT Layer 2 Data Networks Managers and Support staff; Data Network Architects, Data Security Managers and staff, Chief

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

BIG DATA INDUSTRY PAPER

BIG DATA INDUSTRY PAPER BIG DATA INDUSTRY PAPER Encryption Key Management INFORMATION-RICH BIG DATA IS UNDER INCREASING THREAT OF THEFT AND BUSINESS DISRUPTION. AS THE NETWORKS AND TECHNOLOGIES THAT ENABLE BIG DATA COLLECTION,

More information

Digital Platforms for 'Interoperable and smart homes and grids'

Digital Platforms for 'Interoperable and smart homes and grids' 25 October 2017, Brussels Digital Platforms for 'Interoperable and smart homes and grids' Focus Area "Digitising and Transforming European Industry and Services by Svet Mihaylov DG CONNECT WP 2018-2020

More information

Network Media and Layer 1 Functionality

Network Media and Layer 1 Functionality Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)

More information

WORK IN PROGRESS A Multiplexed Many-Point PDV (MPDV) Techniques and Technologies

WORK IN PROGRESS A Multiplexed Many-Point PDV (MPDV) Techniques and Technologies DOE/NV/25946--1071 WORK IN ROGRESS A Multiplexed Many-oint DV (MDV) Techniques and Technologies Edward Daykin* Abel Diaz, Cenobio Gallegos, Carlos erez, Araceli Rutkowski (* Daykinep@NV.DOE.GOV) resented

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information