The Engineering of Software-Defined Quantum Key Distribution Networks

by   Alejandro Aguado, et al.

Quantum computers will change the cryptographic panorama. A technology once believed to lay far away into the future is increasingly closer to real world applications. Quantum computers will break the algorithms used in our public key infrastructure and in our key exchange protocols, forcing a complete retooling of the cryptography as we know it. Quantum Key distribution is a physical layer technology immune to quantum or classical computational threats. However, it requires a physical substrate, and optical fiber has been the usual choice. Most of the time used just as a point to point link for the exclusive transport of the delicate quantum signals. Its integration in a real-world shared network has not been attempted so far. Here we show how the new programmable software network architectures, together with specially designed quantum systems can be used to produce a network that integrates classical and quantum communications, including management, in a single, production-level infrastructure. The network can also incorporate new quantum-safe algorithms and use the existing security protocols, thus bridging the gap between today's network security and the quantum-safe network of the future. This can be done in an evolutionary way, without zero-day migrations and the corresponding upfront costs. We also present how the technologies have been deployed in practice using a production network.


page 1

page 3

page 4


Post-Quantum Cryptography Algorithms Standardization and Performance Analysis

Quantum computer is no longer a hypothetical idea. It is the worlds most...

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

Quantum computing technologies pose a significant threat to the currentl...

Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken

Quantum computers could break currently used asymmetric cryptographic sc...

Schrödinger's Man

What if someone built a "box" that applies quantum superposition not jus...

A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario

Millions of devices are going to participate in 5G producing a huge spac...

Making Existing Software Quantum Safe: Lessons Learned

In the era of quantum computing, Shor's algorithm running on quantum com...

Quantum Network Planning for Utility Maximization

Existing classical optical network infrastructure cannot be immediately ...

Please sign up or login with your details

Forgot password? Click here to reset