An approach for security evaluation and certification of a complete quantum communication system

Abstract Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining s...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Shihan Sajeed, Poompong Chaiwongkhot, Anqi Huang, Hao Qin, Vladimir Egorov, Anton Kozubov, Andrei Gaidash, Vladimir Chistiakov, Artur Vasiliev, Artur Gleim, Vadim Makarov
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2021
Materias:
R
Q
Acceso en línea:https://doaj.org/article/e530a5d77c29476d9ae10003ca3d2767
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:e530a5d77c29476d9ae10003ca3d2767
record_format dspace
spelling oai:doaj.org-article:e530a5d77c29476d9ae10003ca3d27672021-12-02T13:35:04ZAn approach for security evaluation and certification of a complete quantum communication system10.1038/s41598-021-84139-32045-2322https://doaj.org/article/e530a5d77c29476d9ae10003ca3d27672021-03-01T00:00:00Zhttps://doi.org/10.1038/s41598-021-84139-3https://doaj.org/toc/2045-2322Abstract Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.Shihan SajeedPoompong ChaiwongkhotAnqi HuangHao QinVladimir EgorovAnton KozubovAndrei GaidashVladimir ChistiakovArtur VasilievArtur GleimVadim MakarovNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 11, Iss 1, Pp 1-16 (2021)
institution DOAJ
collection DOAJ
language EN
topic Medicine
R
Science
Q
spellingShingle Medicine
R
Science
Q
Shihan Sajeed
Poompong Chaiwongkhot
Anqi Huang
Hao Qin
Vladimir Egorov
Anton Kozubov
Andrei Gaidash
Vladimir Chistiakov
Artur Vasiliev
Artur Gleim
Vadim Makarov
An approach for security evaluation and certification of a complete quantum communication system
description Abstract Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.
format article
author Shihan Sajeed
Poompong Chaiwongkhot
Anqi Huang
Hao Qin
Vladimir Egorov
Anton Kozubov
Andrei Gaidash
Vladimir Chistiakov
Artur Vasiliev
Artur Gleim
Vadim Makarov
author_facet Shihan Sajeed
Poompong Chaiwongkhot
Anqi Huang
Hao Qin
Vladimir Egorov
Anton Kozubov
Andrei Gaidash
Vladimir Chistiakov
Artur Vasiliev
Artur Gleim
Vadim Makarov
author_sort Shihan Sajeed
title An approach for security evaluation and certification of a complete quantum communication system
title_short An approach for security evaluation and certification of a complete quantum communication system
title_full An approach for security evaluation and certification of a complete quantum communication system
title_fullStr An approach for security evaluation and certification of a complete quantum communication system
title_full_unstemmed An approach for security evaluation and certification of a complete quantum communication system
title_sort approach for security evaluation and certification of a complete quantum communication system
publisher Nature Portfolio
publishDate 2021
url https://doaj.org/article/e530a5d77c29476d9ae10003ca3d2767
work_keys_str_mv AT shihansajeed anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT poompongchaiwongkhot anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT anqihuang anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT haoqin anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT vladimiregorov anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT antonkozubov anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT andreigaidash anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT vladimirchistiakov anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT arturvasiliev anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT arturgleim anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT vadimmakarov anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT shihansajeed approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT poompongchaiwongkhot approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT anqihuang approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT haoqin approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT vladimiregorov approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT antonkozubov approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT andreigaidash approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT vladimirchistiakov approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT arturvasiliev approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT arturgleim approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT vadimmakarov approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
_version_ 1718392707583311872