Quantum Computing

Available (52)

Showing 25 - 36 per page



ETSI GS QKD 010 V0.4.1 (Draft)

The present document specifies protection of QKD modules against Trojan horse attacks launched against a time-varying phase, polarisation or intensity modulator that encodes or decodes at least one of bit values, basis values or the intensities of signal, decoy or vacuum states from the quantum channel.

GS QKD 010

ITU-T Y.3804

To realize secure, stable, efficient, and robust operations of and services by a quantum key distribution (QKD) network as well as to manage a QKD network (QKDN) as a whole and support user network management, Recommendation ITU-T Y.3804 specifies functions and procedures for QKDN control and management based on the requirements specified in Recommendation ITU-T Y.3801.

Y.3804 (Recommendation)

ITU-T Y.3800

Recommendation ITU-T Y.3800 specifies an overview on networks supporting quantum key distribution (QKD).

This Recommendation aims to provide support for design, deployment, operation and maintenance to implement QKD networks (QKDNs) in terms of standardized technologies.

The relevant network aspects for conceptual structure, layered model and basic functions are within the scope of the Recommendation to support its implementation.

Y.3800 (Recommendation)

Security considerations for quantum key distribution networks

This Technical Report provides security considerations for quantum key distribution (QKD) network. It describes the following:

  • Introduction to the QKD network (QKDN);
  • Security considerations in communications between the QKD systems and (cryptographic) applications;
  • Security considerations in communications between QKD systems and management (and monitoring) systems; and
  • Standardization issues and suggestions for future works.
XSTR-SEC-QKD (Technical Report)

ITU-T X.1710

Recommendation ITU-T X.1710 specifies a framework including requirements and measures to combat security threats for quantum key distribution networks (QKDNs).

It specifies a simplified QKDN structure for analysis of the relevant security threats. Security requirements and corresponding security measures are then specified on that basis.

X.1710 (Recommendation)

ETSI TR 103 570 V1.1.1

The present document compares a selection of proposals for quantum-safe key exchanges taken from the academic literature. In particular, it includes key exchanges based on the Learning with Errors (LWE), Ring-LWE and Supersingular Isogeny Diffie-Hellman (SIDH) problems, as well as key exchanges constructed from the Niederreiter and NTRU key transport schemes.

The present document gives an overview of each key exchange, lists proposed parameters and gives software performance estimates on a range of processors. It also discusses various security and implementation considerations such as active attacks and side-channel vulnerabilities.

TR 103 570 (Technical Report)

ETSI GS QKD 015 V1.1.1

The present document provides a definition of management interfaces for the integration of QKD in disaggregated network control plane architectures, in particular with Software-Defined Networking (SDN). It defines abstraction models and workflows between a SDN-enabled QKD node and the SDN controller, including resource discovery, capabilities dissemination and system configuration operations. Application layer interfaces and quantum-channel interfaces are out of scope.

GS QKD 015