An approach for security evaluation and certification of a complete quantum communication system
Abstract Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining s...
Guardado en:
Autores principales: | , , , , , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/e530a5d77c29476d9ae10003ca3d2767 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:e530a5d77c29476d9ae10003ca3d2767 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:e530a5d77c29476d9ae10003ca3d27672021-12-02T13:35:04ZAn approach for security evaluation and certification of a complete quantum communication system10.1038/s41598-021-84139-32045-2322https://doaj.org/article/e530a5d77c29476d9ae10003ca3d27672021-03-01T00:00:00Zhttps://doi.org/10.1038/s41598-021-84139-3https://doaj.org/toc/2045-2322Abstract Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.Shihan SajeedPoompong ChaiwongkhotAnqi HuangHao QinVladimir EgorovAnton KozubovAndrei GaidashVladimir ChistiakovArtur VasilievArtur GleimVadim MakarovNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 11, Iss 1, Pp 1-16 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Shihan Sajeed Poompong Chaiwongkhot Anqi Huang Hao Qin Vladimir Egorov Anton Kozubov Andrei Gaidash Vladimir Chistiakov Artur Vasiliev Artur Gleim Vadim Makarov An approach for security evaluation and certification of a complete quantum communication system |
description |
Abstract Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards. |
format |
article |
author |
Shihan Sajeed Poompong Chaiwongkhot Anqi Huang Hao Qin Vladimir Egorov Anton Kozubov Andrei Gaidash Vladimir Chistiakov Artur Vasiliev Artur Gleim Vadim Makarov |
author_facet |
Shihan Sajeed Poompong Chaiwongkhot Anqi Huang Hao Qin Vladimir Egorov Anton Kozubov Andrei Gaidash Vladimir Chistiakov Artur Vasiliev Artur Gleim Vadim Makarov |
author_sort |
Shihan Sajeed |
title |
An approach for security evaluation and certification of a complete quantum communication system |
title_short |
An approach for security evaluation and certification of a complete quantum communication system |
title_full |
An approach for security evaluation and certification of a complete quantum communication system |
title_fullStr |
An approach for security evaluation and certification of a complete quantum communication system |
title_full_unstemmed |
An approach for security evaluation and certification of a complete quantum communication system |
title_sort |
approach for security evaluation and certification of a complete quantum communication system |
publisher |
Nature Portfolio |
publishDate |
2021 |
url |
https://doaj.org/article/e530a5d77c29476d9ae10003ca3d2767 |
work_keys_str_mv |
AT shihansajeed anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT poompongchaiwongkhot anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT anqihuang anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT haoqin anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT vladimiregorov anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT antonkozubov anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT andreigaidash anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT vladimirchistiakov anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT arturvasiliev anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT arturgleim anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT vadimmakarov anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT shihansajeed approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT poompongchaiwongkhot approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT anqihuang approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT haoqin approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT vladimiregorov approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT antonkozubov approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT andreigaidash approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT vladimirchistiakov approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT arturvasiliev approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT arturgleim approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT vadimmakarov approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem |
_version_ |
1718392707583311872 |