ebook img

Quantum Key Distribution Networks. A Quality of Service Perspective PDF

232 Pages·2022·6.957 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Quantum Key Distribution Networks. A Quality of Service Perspective

Miralem Mehic Stefan Rass Peppino Fazio Miroslav Voznak Quantum Key Distribution Networks A Quality of Service Perspective Quantum Key Distribution Networks Miralem Mehic • Stefan Rass (cid:129) Peppino Fazio (cid:129) Miroslav Voznak Quantum Key Distribution Networks A Quality of Service Perspective MiralemMehic StefanRass DepartmentofTelecommunications, SecureSystemsGroup,LITSecureand FacultyofElectricalEngineering CorrectSystemsLab UniversityofSarajevo JohannesKeplerUniversity Sarajevo,BosniaandHerzegovina Linz,Austria PeppinoFazio MiroslavVoznak DepartmentofTelecommunications DepartmentofTelecommunications VSB-TechnicalUniversityofOstrava VSB-TechnicalUniversityofOstrava Ostrava,CzechRepublic Ostrava,CzechRepublic ISBN978-3-031-06607-8 ISBN978-3-031-06608-5 (eBook) https://doi.org/10.1007/978-3-031-06608-5 ©SpringerNatureSwitzerlandAG2022 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Miralem:toLejlaandmyfamily Stefan:dedicatedtomylovingfamily Peppino:tomylovelyfamily,mom,dad,and Francesco Miroslav:tomybelovedfamily Acknowledgments The research leading to the published results was supported by the Ministry of the Interior of the Czech Republic under grant ID VJ01010008 within the project NetworkCybersecurityinPost-QuantumEra. WewouldliketothankOliverMaurhart,MarcinNiemiec,andEmirDervisevic forhelpfuldiscussionsandcommentsonthemanuscript. vii Contents 1 FundamentalsofQuantumKeyDistribution............................. 1 1.1 Information-TheoreticSecrecy......................................... 4 1.2 QKDProtocols.......................................................... 6 1.2.1 BB84Protocol .................................................. 7 1.2.2 B92Protocol.................................................... 20 1.2.3 CV-QKD ........................................................ 21 1.3 KeyLength.............................................................. 23 1.4 Summary ................................................................ 24 References..................................................................... 24 2 QualityofServiceRequirements........................................... 29 2.1 QualityofService....................................................... 30 2.2 QualityofServiceConstraints.......................................... 30 2.3 QualityofServiceComponents........................................ 33 2.4 QKDNetworking ....................................................... 35 2.4.1 QKDNetworks ................................................. 37 2.4.2 QKDVirtualPrivateNetworking.............................. 42 2.4.3 IPsec............................................................. 45 2.4.4 IPsecandQKD ................................................. 53 2.4.5 PassiveandActiveEavesdropping............................. 61 2.4.6 QoSConstraintsinQKDNetwork............................. 62 2.5 SimilaritiesBetweenQKDandAdHocNetworking ................. 63 2.6 Summary ................................................................ 65 References..................................................................... 65 3 QualityofServiceArchitecturesofQuantumKeyDistribution Networks...................................................................... 73 3.1 IntegratedServices...................................................... 74 3.1.1 RSVPProtocol.................................................. 78 3.1.2 ETSI004:QKDApplicationInterface ........................ 84 3.2 DifferentiatedServices.................................................. 89 3.2.1 DiffServComponents .......................................... 90 ix x Contents 3.2.2 ThePerHopBehavior(PHB)Classes......................... 91 3.2.3 Per-DomainBehavior(PDB)Metrics ......................... 92 3.2.4 ETSI014:ProtocolandDataFormatofREST-Based KeyDeliveryAPI............................................... 93 3.3 MultiProtocolLabelSwitching......................................... 95 3.3.1 MPLSOperationandArchitectureBasics..................... 96 3.3.2 MPLSandQKD ................................................ 100 3.4 FlexibleQualityofServiceModel..................................... 102 3.5 Summary ................................................................ 104 References..................................................................... 105 4 QualityofServiceMediaAccessControlofQuantumKey DistributionNetworks....................................................... 109 4.1 Post-ProcessingApplications........................................... 110 4.1.1 ImprovingErrorReconciliation................................ 115 4.1.2 Out-of-BandAuthenticationandKeyValidation.............. 119 4.2 OverlayQKDNetworking.............................................. 123 4.3 ImpactofQKDKeyManagement ..................................... 126 4.4 Summary ................................................................ 131 References..................................................................... 131 5 Quality of Service Signaling Protocols in Quantum Key DistributionNetworks....................................................... 135 5.1 In-BandsignalingandQKD............................................ 137 5.1.1 QSIP:AQuantumKeyDistributionSignalingProtocol...... 137 5.2 Out-of-BandSignalingandQKD ...................................... 139 5.2.1 Q3P:QuantumPoint-to-PointProtocol........................ 140 5.2.2 RSVP............................................................ 144 5.3 Summary ................................................................ 147 References..................................................................... 147 6 QualityofServiceRoutinginQuantumKeyDistributionNetworks .. 151 6.1 RoutinginGeneral...................................................... 152 6.1.1 RoutingAlgorithms............................................. 152 6.1.2 RoutingArchitecture ........................................... 153 6.2 RoutingRequirementsinQKDNetworks............................. 154 6.3 AddressinginQKDNetworks.......................................... 158 6.4 RoutingProtocols....................................................... 159 6.4.1 DistanceVectorRoutingProtocols ............................ 160 6.4.2 LinkStateRoutingProtocols................................... 164 6.4.3 QKDRoutingBasedonLink-States........................... 167 6.5 GreedyPerimeterStatelessRoutingforQKDNetworks ............. 169 6.5.1 QKDLinkMetric............................................... 172 6.5.2 GreedyForwarding............................................. 176 6.5.3 Recovery-ModeForwarding ................................... 178 Contents xi 6.6 Summary ................................................................ 180 References..................................................................... 180 7 FromPoint-to-PointtoEnd-to-EndSecurityinQuantumKey DistributionNetworks....................................................... 183 7.1 Single-PathTransmission:TrustedRelay.............................. 183 7.2 RelaxingtheTrustAssumption:MultipathTransmission............. 186 7.2.1 QuantifyingtheProbabilityofEavesdropping................ 187 7.2.2 QuantifyingtheProbabilityforaDoS......................... 199 7.2.3 QuantifyingMultipleSecurityGoals.......................... 200 7.3 WeaponizingtheDetectionofEavesdropping......................... 204 7.4 Summary ................................................................ 206 References..................................................................... 206 8 ModernTrendsinQuantumKeyDistributionNetworks ............... 209 8.1 QKDin5GNetworks................................................... 209 8.2 Measurement-DeviceIndependentQKD .............................. 215 8.3 QuantumRepeater ...................................................... 219 8.4 Summary ................................................................ 219 References..................................................................... 220 Acronyms 5G Thefifthgenerationofcellularnetworks AAU ActiveAntennaUnit AES AdvancedEncryptionStandard AIT AustrianInstituteofTechnology API ApplicationProgrammersInterface ASMT ArbitrarilySecureMessageTransmission ATM AsynchronousTransferMode BBN BoltBeranekandNewman BBU BaseBandUnit BF Bellman-Ford BGP BorderGatewayProtocol CAC CallAdmissionControl CC CommonCriteria CIA Confidentiality-Integrity-Availability CLI CommandLineInterface CO CentralOffice CV-QKD Continuous-VariableQKD CVSS CommonVulnerabilityScoringSystem DDoS DistributedDenial-of-Service DH Diffie-Hellmankeyagreementprimitive DHE EphemeralDiffie-Hellman(DHE) DiffServ DifferentiatedServices DIQKD Device-IndependentQuantumKeyDistribution DoS Denial-of-Service DSCP DifferentiatedServicesCodePoint DSDV Destination-SequencedDistance-Vector DU DigitalUnit DV DistanceVector DV-QKD DiscreteVariablesQKD E2E End-to-End ECN ExplicitCongestionNotification xiii

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.