Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios ....
Transcript of Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios ....
![Page 1: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/1.jpg)
Next steps in QKD from a network operator perspective Quantum technologies in Spain. The future is now
Victor Lopez - gCTIO 08.05.2019
![Page 2: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/2.jpg)
2
Telcos have different network scenarios…
Submarine and satellite Backbone Metro Access
…, technologies…
… and planes
Data Plane
Control Plane
Management Plane
![Page 3: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/3.jpg)
3
Quantum Key Distribution system
Bob Alice
Encrypt Decrypt
Key exchange
Message Exchange
Message encryption
Eve
QKD System
QKD System
Public Authenticated/integrity Channel
Quantum Channel
Data Channel
Ingredients: • Qubit transmitter: Alice • Single qubit receiver: Bob • Quantum channel (capable of
transmitting qubits from Alice to Bob)
• Public authenticated channel Main steps: • Raw key exchange (using the
quantum channel) – Qubit transmission – Sifting (basis reconciliation)
• Key post-processing (using the public authenticated channel)
– Information reconciliation – Error verification – Privacy amplification
![Page 4: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/4.jpg)
4
Limited reach, point to point.
Δλ = 0.2~0.8 nm (DWDM) Δλ = 3~20 nm (CWDM)
Comm. laser
Single photon (not to scale)
extremely weak signals.
Noise in the fibre: Raman
Raman backscattering of a signal at 1549 nm [ DOI: 10.1063/1.1842862]
Single Photon (approx. scale)
It is a delicate technology.
R. Doisneau
• Difficult to detect. • Absorpions • Masked by the noise
150 nm
Quantum communications and networks, why is it difficult?
![Page 5: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/5.jpg)
5
Quantum Cryptography with Continuous Variables: CV-QKD
• Continuous Variables based on the quadratures of the electric field of an electromagnetic wave o Also subject to the Heisenberg indeterminacy principle.
Advantages
• Lower key rate than DV-QKD • Can be higher at low distance/losses
• Tolerate less losses • Less reach/tolerant to bad channels
• Computationally heavy postprocessing
Disadvantages
• Homodyne/heterodyne detection • Forget about bulky/expensive/cold
single photon detectors. • Better co-propagation with classical
signals (works as noise filter) • Piggybacking on standard telco
technology. • Better industrialization possibilities • Better miniaturization possibilities • Cheaper/better potential to take over
the market
![Page 6: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/6.jpg)
6
Quantum Key Distribution can help operator…
… to improve security solutions in many network aspects
Customer
Access
Transport
Virtualization
Operations
Net
wor
k Ev
olut
ion
Axes
![Page 7: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/7.jpg)
7
Software Defined QKD Networks
Software Defined QKD Node Control plane protocols and interfaces within a transport network
Operations
• Software Defined Networks (SDN) enables the automation of service provisioning within network operator infrastructures.
• With the dynamic network requirements, operators can not anymore deploy their services based on manual intervention or using proprietary vendor solutions.
• Standard programmability is key in the next-generation network infrastructure and any new technology must be integrated with this paradigm.
![Page 8: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/8.jpg)
8
Network management secured with QKD
Planes in operator’s network Control plane protocols and interfaces within a transport network
• Management and control plane become critical in virtualization environments.
• Security mechanisms are meant to be implemented in the network management plane, to securely handle any centralized operation, including the communications channels between NFV platforms, the communication between an SDN controller and a network device, etc.
Virtualization
![Page 9: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/9.jpg)
9
End-to-end quantum-encrypted connections
Quantum security embedded in network elements Quantum cryptography for IPSec via SDN
• Aggregate up to cyphered OTN channels plus the quantum channel
Transport
OTN OTN
• SDN controller integrates the management and generation of keys (based on a QKD infrastructure) used by IPsec.
![Page 10: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/10.jpg)
10
Enhance last mile services ©
Access
Improve security in Business Offers Point to Point connections for local business access
• FTTH (Fiber To The Home) deployments are ongoing based on Passive Optical Network (PON) equipment and the number of homes connected is increasing.
• In GPON systems, an encryption mechanism is integrated and it is based on AES-128 encryption.
OLT
ONU 1
ONU N
…
Customer
• Point to point connections encompass many business offers.
• This architecture allows business customers to benefit from a dedicated fiber resource that will not be shared with another customer.
• These customers are generally very demanding for a connection with a high security level.
• QKD can thus be a way to offer them a more secured transport resource.
Central Office
Customer 1
Customer N
…
![Page 11: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/11.jpg)
11
Quantum Key Distribution Scenarios
Customer
Access
Transport
Virtualization
Operations
Net
wor
k Ev
olut
ion
Axes
PtP connections for local business access Passive Optical Networks
End-to-end quantum-encrypted connections
Network management secured with QKD Software Defined QKD Networks
![Page 12: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections](https://reader034.fdocuments.net/reader034/viewer/2022052009/601ec03511d59f766d79ac24/html5/thumbnails/12.jpg)
THANK YOU !!! This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 820466 This text reflects only the author's view and the Commission is not responsible for any use that may be made of the information it contains.
Cartoon from NIST