实现量子安全的软件定义网络

IF 2.5 Q3 QUANTUM SCIENCE & TECHNOLOGY IET Quantum Communication Pub Date : 2023-09-14 DOI:10.1049/qtc2.12073
Mohammad Reza Nosouhi, Keshav Sood, Vinay Chamola, Jongkil Jay Jeong, Anuroop Gaddam
{"title":"实现量子安全的软件定义网络","authors":"Mohammad Reza Nosouhi,&nbsp;Keshav Sood,&nbsp;Vinay Chamola,&nbsp;Jongkil Jay Jeong,&nbsp;Anuroop Gaddam","doi":"10.1049/qtc2.12073","DOIUrl":null,"url":null,"abstract":"<p>The evolution of quantum computers is considered a serious threat to public-key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This is indeed a big concern for security of the Internet and other data communication and storage systems. The reason is that public-key schemes are the basis in the generation of shared symmetric keys that are used to perform data encryption/decryption in communication and data transfer protocols. One possible approach to address this issue is to use Quantum Key Distribution (QKD) (instead of public-key schemes) for the ultra-secure generation of symmetric keys. QKD is a physical layer technology that allows two parties (equipped with optical communication interfaces) to generate secure random keys over a quantum channel that is immune to eavesdropping threats. The keys are then used by symmetric encryption schemes (e.g. AES) to encrypt data over classical channels. This allows us to have data encryption/decryption without needing a public-key scheme. However, due to its inherent characteristics, the implementation of QKD has mostly been considered in particular contexts only (e.g. backhaul networks, point-to-point connections, optical networks, etc.). This indeed limits the utility of QKD technology to only some particular applications while it has the potential to be used in a wide range of used cases. Motivated by this (increasing the usability of QKD technology), in this study, the authors propose a model that enables SDN-based networks to utilise QKD technology and provide QKD security service (i.e., random key generation service) to network applications and security protocols in a practical and efficient way. In the proposed approach, secret keys are generated based on the distribution of quantum entanglement between QKD nodes deployed in the network. The significant characteristic of our proposed model is that it does not rely on quantum repeaters to operate. This also improves the efficiency of the employed QKD mechanisms in terms of the key generation rate.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 1","pages":"66-71"},"PeriodicalIF":2.5000,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12073","citationCount":"0","resultStr":"{\"title\":\"Towards quantum-secure software defined networks\",\"authors\":\"Mohammad Reza Nosouhi,&nbsp;Keshav Sood,&nbsp;Vinay Chamola,&nbsp;Jongkil Jay Jeong,&nbsp;Anuroop Gaddam\",\"doi\":\"10.1049/qtc2.12073\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The evolution of quantum computers is considered a serious threat to public-key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This is indeed a big concern for security of the Internet and other data communication and storage systems. The reason is that public-key schemes are the basis in the generation of shared symmetric keys that are used to perform data encryption/decryption in communication and data transfer protocols. One possible approach to address this issue is to use Quantum Key Distribution (QKD) (instead of public-key schemes) for the ultra-secure generation of symmetric keys. QKD is a physical layer technology that allows two parties (equipped with optical communication interfaces) to generate secure random keys over a quantum channel that is immune to eavesdropping threats. The keys are then used by symmetric encryption schemes (e.g. AES) to encrypt data over classical channels. This allows us to have data encryption/decryption without needing a public-key scheme. However, due to its inherent characteristics, the implementation of QKD has mostly been considered in particular contexts only (e.g. backhaul networks, point-to-point connections, optical networks, etc.). This indeed limits the utility of QKD technology to only some particular applications while it has the potential to be used in a wide range of used cases. Motivated by this (increasing the usability of QKD technology), in this study, the authors propose a model that enables SDN-based networks to utilise QKD technology and provide QKD security service (i.e., random key generation service) to network applications and security protocols in a practical and efficient way. In the proposed approach, secret keys are generated based on the distribution of quantum entanglement between QKD nodes deployed in the network. The significant characteristic of our proposed model is that it does not rely on quantum repeaters to operate. This also improves the efficiency of the employed QKD mechanisms in terms of the key generation rate.</p>\",\"PeriodicalId\":100651,\"journal\":{\"name\":\"IET Quantum Communication\",\"volume\":\"5 1\",\"pages\":\"66-71\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2023-09-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12073\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Quantum Communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/qtc2.12073\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"QUANTUM SCIENCE & TECHNOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Quantum Communication","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/qtc2.12073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"QUANTUM SCIENCE & TECHNOLOGY","Score":null,"Total":0}
引用次数: 0

摘要

量子计算机的发展被认为是对公钥密码系统(如 RSA、ECDSA、ECDH 等)的严重威胁。这的确是互联网和其他数据通信与存储系统安全的一大隐患。原因是公钥方案是生成共享对称密钥的基础,这些密钥用于在通信和数据传输协议中执行数据加密/解密。解决这个问题的一个可行方法是使用量子密钥分发(QKD)(而不是公钥方案)来超安全地生成对称密钥。QKD 是一种物理层技术,允许双方(配备光通信接口)通过量子信道生成安全的随机密钥,该信道不受窃听威胁。然后,对称加密方案(如 AES)使用这些密钥在经典信道上加密数据。这样,我们就可以在不需要公钥方案的情况下进行数据加密/解密。然而,由于其固有的特点,QKD 的实施大多只在特定情况下(如回程网络、点对点连接、光网络等)才被考虑。这确实限制了 QKD 技术的实用性,使其只能用于某些特定应用,而它却有潜力被广泛应用。为此(提高 QKD 技术的可用性),作者在本研究中提出了一个模型,使基于 SDN 的网络能够利用 QKD 技术,并以实用高效的方式为网络应用和安全协议提供 QKD 安全服务(即随机密钥生成服务)。在所提出的方法中,密钥是根据部署在网络中的 QKD 节点之间的量子纠缠分布生成的。我们提出的模型的显著特点是不依赖量子中继器运行。这也提高了所采用的 QKD 机制在密钥生成率方面的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Towards quantum-secure software defined networks

The evolution of quantum computers is considered a serious threat to public-key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This is indeed a big concern for security of the Internet and other data communication and storage systems. The reason is that public-key schemes are the basis in the generation of shared symmetric keys that are used to perform data encryption/decryption in communication and data transfer protocols. One possible approach to address this issue is to use Quantum Key Distribution (QKD) (instead of public-key schemes) for the ultra-secure generation of symmetric keys. QKD is a physical layer technology that allows two parties (equipped with optical communication interfaces) to generate secure random keys over a quantum channel that is immune to eavesdropping threats. The keys are then used by symmetric encryption schemes (e.g. AES) to encrypt data over classical channels. This allows us to have data encryption/decryption without needing a public-key scheme. However, due to its inherent characteristics, the implementation of QKD has mostly been considered in particular contexts only (e.g. backhaul networks, point-to-point connections, optical networks, etc.). This indeed limits the utility of QKD technology to only some particular applications while it has the potential to be used in a wide range of used cases. Motivated by this (increasing the usability of QKD technology), in this study, the authors propose a model that enables SDN-based networks to utilise QKD technology and provide QKD security service (i.e., random key generation service) to network applications and security protocols in a practical and efficient way. In the proposed approach, secret keys are generated based on the distribution of quantum entanglement between QKD nodes deployed in the network. The significant characteristic of our proposed model is that it does not rely on quantum repeaters to operate. This also improves the efficiency of the employed QKD mechanisms in terms of the key generation rate.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
6.70
自引率
0.00%
发文量
0
期刊最新文献
Quantum teleportation in higher dimension and entanglement distribution via quantum switches Real-time seedless post-processing for quantum random number generators Quantum blockchain: Trends, technologies, and future directions Quantum anonymous one vote veto protocol based on entanglement swapping Enhanced QSVM with elitist non-dominated sorting genetic optimisation algorithm for breast cancer diagnosis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1