ISO/IEC CD 23837-2.2
Information technology security techniques — Security requirements, test and evaluation methods for quantum key distribution — Part 2: Evaluation and testing methods
Information technology security techniques — Security requirements, test and evaluation methods for quantum key distribution — Part 2: Evaluation and testing methods
Information technology security techniques — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements
Recommendation ITU-T X.1714 describes key combination methods for quantum key distribution network (QKDN) and specifies security requirements for both the key combination and the key supply from QKDN to cryptographic applications.
ITU T Y.QKDN_frint "Framework for integration of QKDN and secure network infrastructures"
For quantum key distribution networks (QKDN), Recommendation ITU-T X.sec_QKDN_intrq specifies security requirements for integration of QKDN with various user networks (e.g., storage, cloud, sensor, content, etc.).
The present document specifies protection of QKD modules against Trojan horse attacks launched against a time-varying phase, polarisation or intensity modulator that encodes or decodes at least one of bit values, basis values or the intensities of signal, decoy or vacuum states from the quantum channel.