ETSI GR QSC 006 V1.1.1
The present document gives information on the long-term suitability of symmetric cryptographic primitives in the face of quantum computing.
The present document gives information on the long-term suitability of symmetric cryptographic primitives in the face of quantum computing.
The present document presents the results of a simplified threat assessment following the guidelines of ETSI TS 102 165-1 [i.3] for a number of use cases. The method and key results of the analysis is described in clause 4. The present document makes a number of assumptions regarding the timescale for the deployment of viable quantum computers, however the overriding assertion is that quantum computing will become viable in due course. This is examined in more detail in clause 5. The impact of quantum computing attacks on the cryptographic deployments used in a number of existing industrial deployment scenarios are considered in clause 7.
The present document examines a number of real-world uses cases for the deployment of quantum-safe cryptography (QSC). Specifically, it examines some typical applications where cryptographic primitives are deployed today and discusses some points for consideration by developers, highlighting features that may need change to accommodate quantum-safe cryptography. The main focus of the document is on options for upgrading public-key primitives for key establishment and authentication, although several alternative, non-public-key options are also discussed.
The present document gives an overview of the current understanding and best practice in academia and industry about quantum-safe cryptography (QSC). It focuses on identifying and assessing cryptographic primitives that have been proposed for efficient key establishment and authentication applications, and which may be suitable for standardization by ETSI and subsequent use by industry to develop quantum-safe solutions for real-world applications.
Information technology security techniques — Security requirements, test and evaluation methods for quantum key distribution — Part 2: Evaluation and testing methods
Information technology security techniques — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements
The SAREF extension for the wearables domain (SAREF4WEAR) is based on a limited set of use cases and from available existing data models.
This DTDL ontology is implemented based on the domain ontology RealEstateCore. RealEstateCore is a common language used to model and control buildings, simplifying the development of new services. The ontology is rich and complete, while providing simplicity and real-world applicability with proven industry solutions and partnerships. It has seen practical deployments across sizeable real estate portfolios over the past several years, and has gone through several revisions based on real-world feedback and learning. RealEstateCore specifically does not aim to be a new standard, but rather provides a common denominator and bridge with other building industry standards such as Brick Schema, Project Haystack, W3C Building Topology Ontology (W3C BOT), and more. Read more about our ontology alignment with standards. The original RealEstateCore ontology is represented using the W3C Web Ontology Language (OWL) and it can be visualized here. It has been converted into the DTDL syntax used in this repository using our universal OWL2DTDL tool.
This standard extends IEEE 1872-2015 Standard for Ontologies for Robotics and Automation to represent additional domain-specific concepts, definitions, and axioms commonly used in Autonomous Robotics (AuR). This standard is general and can be used in many ways - for example, to specify the domain knowledge needed to unambiguously describe the design patterns of AuR systems, to represent AuR system architectures in a unified way, or as a guideline to build autonomous systems consisting of robots operating in various environments.
ISO 10303 provides a representation of product information along with the necessary mechanisms and definitions to enable product data to be exchanged. The exchange is among different computer systems and environments associated with the complete product lifecycle, including product design, manufacture, use, maintenance, and final disposition of the product. This document defines the basic principles of product information representation and exchange used in ISO 10303. It specifies the characteristics of the various series of parts of ISO 10303 and the relationships among them.
Defines a formal logic based concept specialisation approach to support the development of manufacturing reference models that can underpin the necessary business specific knowledge models that are needed to support the configuration of global production networks.
ISO/IEC 15944-4:2015 provides a set of UML class diagrams and conceptual explanations that circumscribe the Open-edi Business Transaction Ontology (OeBTO). It explains the mechanics of a business transaction state machine, the procedural component of an OeBTO, and the (internal) constraint component of OeBTO, its repository for business rules. ISO/IEC 15944-4:2015 addresses collaborations among independent trading partners as defined in ISO/IEC 159441. ISO/IEC 15944-4:2015 applies to both binary collaborations (buyer and seller) and mediated collaborations (buyer, seller, third-party). The ontological features described herein propose standards only for the Business Operational View (BOV), that is, the business aspects of business transactions as they are defined in ISO/IEC 159441.