Cargando…
An approach for security evaluation and certification of a complete quantum communication system
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven syst...
Autores principales: | , , , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7930270/ https://www.ncbi.nlm.nih.gov/pubmed/33658528 http://dx.doi.org/10.1038/s41598-021-84139-3 |
_version_ | 1783660076008996864 |
---|---|
author | Sajeed, Shihan Chaiwongkhot, Poompong Huang, Anqi Qin, Hao Egorov, Vladimir Kozubov, Anton Gaidash, Andrei Chistiakov, Vladimir Vasiliev, Artur Gleim, Artur Makarov, Vadim |
author_facet | Sajeed, Shihan Chaiwongkhot, Poompong Huang, Anqi Qin, Hao Egorov, Vladimir Kozubov, Anton Gaidash, Andrei Chistiakov, Vladimir Vasiliev, Artur Gleim, Artur Makarov, Vadim |
author_sort | Sajeed, Shihan |
collection | PubMed |
description | Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards. |
format | Online Article Text |
id | pubmed-7930270 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-79302702021-03-05 An approach for security evaluation and certification of a complete quantum communication system Sajeed, Shihan Chaiwongkhot, Poompong Huang, Anqi Qin, Hao Egorov, Vladimir Kozubov, Anton Gaidash, Andrei Chistiakov, Vladimir Vasiliev, Artur Gleim, Artur Makarov, Vadim Sci Rep Article Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards. Nature Publishing Group UK 2021-03-03 /pmc/articles/PMC7930270/ /pubmed/33658528 http://dx.doi.org/10.1038/s41598-021-84139-3 Text en © The Author(s) 2021 Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Sajeed, Shihan Chaiwongkhot, Poompong Huang, Anqi Qin, Hao Egorov, Vladimir Kozubov, Anton Gaidash, Andrei Chistiakov, Vladimir Vasiliev, Artur Gleim, Artur Makarov, Vadim An approach for security evaluation and certification of a complete quantum communication system |
title | An approach for security evaluation and certification of a complete quantum communication system |
title_full | An approach for security evaluation and certification of a complete quantum communication system |
title_fullStr | An approach for security evaluation and certification of a complete quantum communication system |
title_full_unstemmed | An approach for security evaluation and certification of a complete quantum communication system |
title_short | An approach for security evaluation and certification of a complete quantum communication system |
title_sort | approach for security evaluation and certification of a complete quantum communication system |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7930270/ https://www.ncbi.nlm.nih.gov/pubmed/33658528 http://dx.doi.org/10.1038/s41598-021-84139-3 |
work_keys_str_mv | AT sajeedshihan anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT chaiwongkhotpoompong anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT huanganqi anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT qinhao anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT egorovvladimir anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT kozubovanton anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT gaidashandrei anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT chistiakovvladimir anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT vasilievartur anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT gleimartur anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT makarovvadim anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT sajeedshihan approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT chaiwongkhotpoompong approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT huanganqi approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT qinhao approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT egorovvladimir approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT kozubovanton approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT gaidashandrei approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT chistiakovvladimir approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT vasilievartur approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT gleimartur approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem AT makarovvadim approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem |