Cargando…

An approach for security evaluation and certification of a complete quantum communication system

Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven syst...

Descripción completa

Detalles Bibliográficos
Autores principales: Sajeed, Shihan, Chaiwongkhot, Poompong, Huang, Anqi, Qin, Hao, Egorov, Vladimir, Kozubov, Anton, Gaidash, Andrei, Chistiakov, Vladimir, Vasiliev, Artur, Gleim, Artur, Makarov, Vadim
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7930270/
https://www.ncbi.nlm.nih.gov/pubmed/33658528
http://dx.doi.org/10.1038/s41598-021-84139-3
_version_ 1783660076008996864
author Sajeed, Shihan
Chaiwongkhot, Poompong
Huang, Anqi
Qin, Hao
Egorov, Vladimir
Kozubov, Anton
Gaidash, Andrei
Chistiakov, Vladimir
Vasiliev, Artur
Gleim, Artur
Makarov, Vadim
author_facet Sajeed, Shihan
Chaiwongkhot, Poompong
Huang, Anqi
Qin, Hao
Egorov, Vladimir
Kozubov, Anton
Gaidash, Andrei
Chistiakov, Vladimir
Vasiliev, Artur
Gleim, Artur
Makarov, Vadim
author_sort Sajeed, Shihan
collection PubMed
description Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.
format Online
Article
Text
id pubmed-7930270
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-79302702021-03-05 An approach for security evaluation and certification of a complete quantum communication system Sajeed, Shihan Chaiwongkhot, Poompong Huang, Anqi Qin, Hao Egorov, Vladimir Kozubov, Anton Gaidash, Andrei Chistiakov, Vladimir Vasiliev, Artur Gleim, Artur Makarov, Vadim Sci Rep Article Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards. Nature Publishing Group UK 2021-03-03 /pmc/articles/PMC7930270/ /pubmed/33658528 http://dx.doi.org/10.1038/s41598-021-84139-3 Text en © The Author(s) 2021 Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Sajeed, Shihan
Chaiwongkhot, Poompong
Huang, Anqi
Qin, Hao
Egorov, Vladimir
Kozubov, Anton
Gaidash, Andrei
Chistiakov, Vladimir
Vasiliev, Artur
Gleim, Artur
Makarov, Vadim
An approach for security evaluation and certification of a complete quantum communication system
title An approach for security evaluation and certification of a complete quantum communication system
title_full An approach for security evaluation and certification of a complete quantum communication system
title_fullStr An approach for security evaluation and certification of a complete quantum communication system
title_full_unstemmed An approach for security evaluation and certification of a complete quantum communication system
title_short An approach for security evaluation and certification of a complete quantum communication system
title_sort approach for security evaluation and certification of a complete quantum communication system
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7930270/
https://www.ncbi.nlm.nih.gov/pubmed/33658528
http://dx.doi.org/10.1038/s41598-021-84139-3
work_keys_str_mv AT sajeedshihan anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT chaiwongkhotpoompong anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT huanganqi anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT qinhao anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT egorovvladimir anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT kozubovanton anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT gaidashandrei anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT chistiakovvladimir anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT vasilievartur anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT gleimartur anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT makarovvadim anapproachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT sajeedshihan approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT chaiwongkhotpoompong approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT huanganqi approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT qinhao approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT egorovvladimir approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT kozubovanton approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT gaidashandrei approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT chistiakovvladimir approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT vasilievartur approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT gleimartur approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem
AT makarovvadim approachforsecurityevaluationandcertificationofacompletequantumcommunicationsystem