Quantum Secure Communication Networks:



Similar documents
1.Context What is the problem with current cryptographic techniques? Current Quantum Key Distribution (QKD)... 4

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Securing Your Data In Transit For The Long Term

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Spectrum Scarcity and Free Space Op1cal Communica1ons. Mohamed- Slim Alouini KAUST January 2014

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class

By: Mohsen Aminifar Fall 2014

Chapter 5. Data Communication And Internet Technology

COMPSCI 111 / 111G An introduc)on to prac)cal compu)ng

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

1.264 Lecture 35. Telecom: Fiber optics. Next class: Green chapter Exercise due before class

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

communication over wireless link handling mobile user who changes point of attachment to network

Security & Surveillance Cabling Systems

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Lucent VPN Firewall Security in x Wireless Networks

Network Design. Yiannos Mylonas

Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA

ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU.

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

Secure web transactions system

24 th IEEE Annual Computer Communications Workshop (CCW)

Network edge and network core. millions of connected compu?ng devices: hosts = end systems running network apps

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

1.264 Lecture 36 (Solutions)

High Speed Encryption Made in Germany

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Virtual Privacy vs. Real Security

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Enterprise Business Products 2014

How To Build A Network For Storage Area Network (San)

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

NEC Produktpor-olio. Compact ODU. ipasolink 400/400A. ipasolink EX. ipasolink 200. ipasolink 100E ipasolink ipasolink ix.

Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications

NEW WORLD TELECOMMUNICATIONS LIMITED. 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology

Value Proposition for Data Centers

Layer 3 Network + Dedicated Internet Connectivity

IT 3202 Internet Working (New)

EECC694 - Shaaban. Transmission Channel

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

Your Wide Area Network Just Got a Whole Lot Wider.

INTRODUCTION TO MEDIA CONVERSION

Network Topologies. Network Topologies

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

NETWORKING TECHNOLOGIES

Chapter 1 Instructor Version

Study on Remote Access for Library Based on SSL VPN

25 Years of Manufacturing Excellence. Premier Quatro Addressable Fire Alarm System. Assessed to ISO 9001: 2008

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

EXINDA NETWORKS. Deployment Topologies

The WI-PIE Program. Backbone Technical description

Failsafe WAN, VoIP, IVRS & LAN connectivity

The Seven Habits of State-of-the-Art Mobile App Security

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

CSE 3461 / 5461: Computer Networking & Internet Technologies

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Broadband Cable Service Deployment at WorldCall Telecom - Pakistan. Hassan Zaheer Manager Operations Broadband Division

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

Resilient Metropolitan Area Networks

10G CWDM Conversion Technology

Migration to 40/100G in the Data Center with OM3 and OM4 Optical Connectivity

White Paper. OPCOM3500 Multi-Service Access Platform INTRODUCTION CHARACTERISTICS

Market Central

Using Omnisec 422 and 423 IP Encryptors Over BGAN

Building Voice VPN with Simton IPX

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Appendix 3. Specifications for e-portal

November Defining the Value of MPLS VPNs

C Information Systems for Managers Fall 1999

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

Using BroadSAFE TM Technology 07/18/05

Chapter 4 Connecting to the Internet through an ISP

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Virtual Private Networks

Introduction. Background

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Flexible SDN Transport Networks With Optical Circuit Switching

University-Industry Interaction: The Case of Optical Communications in Brazil

Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center

LONI Provides UNO High Speed Business Con9nuity A=er Katrina. Speakers: Lonnie Leger, LONI Chris Marshall, UNO

Polish National Data Storage. Norbert Meyer, Maciej Brzeźniak, Maciej Stroiński PSNC

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Transcription:

QCrypt 2014 Quantum Secure Communication Networks: Products and Solutions Yong Zhao 2014-09- 04

1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Research Lab (USTC) Company (QuantumCTeK)

1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Hefei head quarter, three other branches Equip commercial fiber with QKD products Company (QuantumCTeK) Beijing Jinan Hefei Shanghai

Why QKD and Q- network Encryptor network Encryptor Encryptor Secure communica2on Tunnel Encryptor Key distribu2on Secure communica2on = Secure encryp2on + Secure key distribu2on

Why QKD and Q- network Cryptography at present For de/encrypt For key exchange Symmetric Cryptography AES IDEA Strong RC6 RSA RSA Asymmetric Cryptography ECC ECC Not Strong D- H n RSA512 is broken in 1999 n RSA768 is broken in 2009 n RSA1024 is broken in. n All Asymmetric Cryptography at present can be broken by Shor s quantum algorithm n No asymmetric Cryptography can be uncondi2onal secure

Why QKD and Q- network Cryptography at present For de/encrypt For key exchange Symmetric Cryptography AES One IDEA 2me pad? Strong RC6 RSA RSA Asymmetric Cryptography ECC ECC Not Strong D- H n RSA512 is broken in 1999 n RSA768 is broken in 2009 n RSA1024 is broken in. n All Asymmetric Cryptography at present can be broken by Shor s quantum algorithm n No asymmetric Cryptography can be uncondi2onal secure

Why QKD and Q- network Quantum key Distribu2on QKD seems to be the most outstanding Candidate for the future key infrastructure Post quantum cryptography achievable Low total cost Quantum Noise Encryp2on achievable Low cost Maybe an2- quantum afack Proved uncondi2onal security An2- quantum afack achievable Low cost

The goals: Secure communica2on networks over Quantum key infrastructure Service Applica2on Phone\Video\Data transmit\e- Bank\Smart Grid\... Encryp2on\Authen2ca2on\Signature\... Secure Communica2on networks Key Management QKD network Bofom tech Genera2on\distribu2on\Storage\usage\discard QLAN\QMAN\QWAN QKD Module\Convergence node\trusted Relay Op2cal Switch\Quantum Repeater Key infrastructure

The Roadmap of QKD network in China 2006 n World s first Decoy QKD experiment over 100km n Quantum phone network( 3- nodes) 2008 2009 2012 2013 2014 p Na2onal Quantum Backbone network (Over 2000km) n World s first Decoy QKD experiment over 200km n All pass Metro- area QKD network (5 nodes) n Hefei Metro- Quantum network(46 nodes) n Jinan Metro- Quantum network (56 nodes,>90users) 7 24 running for 9 month already S N

2 Product landscape and design QLAN QMAN QWAN Applica2on All- pass Op2cal Switch n 16 FC- PC op2cal interface n Op2cal loss less than 1.5dB n Ethernet Control interface QKG server Ethernet fiber fiber fiber QKD QKD. Maximally connect 16 QKD terminal QKD

2 Product landscape and design QLAN QMAN QWAN Applica2on Terminal QKD transceiver n BB84 Decoy state protocol n Special design for all- pass type QLAN n Higher rate and less cost n Resistant to all known quantum hacker n Fully hardware designed n Op2cal path loss tolerance up to 18dB LD OA VOA VOA OA LD Circulator Circulator EPC Bi- direc2on Quantum Channel EPC Mul2- channel SPD Mul2- channel SPD

2 Product landscape and design QLAN QMAN QWAN Applica2on Centralized Control Sta2on n Convergence node and trusted relay in MAN n Time Division Mul2plexing to reduce total- cost

2 Product landscape and design QLAN QMAN QWAN Applica2on Why trusted relay? There was a gap between the period of prac:cal Quantum computer and Quantum repeater, meanwhile the trusted relay is the best choice A huge quantum computer like this may be fatal to asymmetric cryptography But a quantum repeater of similar size can not be set up in the most today telecom carrier room

2 Product landscape and design QLAN QMAN QWAN Applica2on GHz QKD Module n Design for Backbone QKD network n Op2cal path Loss tolerance up to more than 25dB n Final key rate up to 1Mbps n Fully hardware designed n ATCA adapt n Easy installa2on and maintenance Data process module Single Photon Detector Module

2 Product landscape and design QLAN QMAN QWAN Applica2on Quantum Ethernet Encryptor n Integrated design(qkd and Encryptor in one Chassis) n Hardware(FPGA) Encryp2on up to 10Gbps n Key(128bits) refresh rate up to 1000key/s n Ethernet network interface n Comply with Chinese na2onal standards with the cer2ficate QNE- 1000D LAN QNE- 1000D QNE- 1000D LAN

2 Product landscape and design QLAN QMAN QWAN Applica2on Quantum VPN n Dual key(ike key and Quantum key) n encryp2on up to 10Gbps(CBC mode) n Key refresh rate up to 100key/s n Ethernet\SFP\XFP network interface n Stackable

3 Commercial service case Government applica2on case Government agency 1# GRE Tunnel B J B ranch SDH Link Office Quantum VPN Ethernet swi tch HA Internet (ChinaUnicom) Quantum VPN Ethernet swi tch HA Ethernet swi tch Keep al i ve HA Quantum VPN QKD and KM Client QKD and KM client QKD and KM client QMAN

3 Commercial service case Local bank applica2on case

3 Commercial service case Backbone Bank applica2on case

4 Collabora2on and Market CSRC

Thanks for your a@en:on! Website: www.quantum- info.com