Security for Quantum Networks
- URL: http://arxiv.org/abs/2109.14107v1
- Date: Wed, 29 Sep 2021 00:03:24 GMT
- Title: Security for Quantum Networks
- Authors: Salini Karuvade and Barry C. Sanders
- Abstract summary: We aim to construct a comprehensive framework for developing and assessing secure quantum networks.
Our work will lead to the development of a hardware-independent framework for securing general quantum networks.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Reliable and efficient functioning of a quantum network depends on
identifying and mitigating security risks originating from within and outside
the network. We aim to construct a comprehensive framework for developing and
assessing secure quantum networks. We articulate issues for making quantum
networks secure in general, summarise the state of the art and identify
priority directions for further investigation. Our analysis builds on the
secure communication protocols developed for classical layered network
architectures such as the open-systems interconnection (OSI) model and the
transmission control protocol/internet protocol (TCP/IP) model. Our work will
lead to the development of a hardware-independent framework for securing
general quantum networks that allows developers to identify mandatory security
mechanisms and incorporate additional security requirements of the clients
during design of the networks.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Navigating Quantum Security Risks in Networked Environments: A Comprehensive Study of Quantum-Safe Network Protocols [1.7887848708497236]
The emergence of quantum computing poses a formidable security challenge to network protocols.
This paper provides an exhaustive analysis of vulnerabilities introduced by quantum computing in a diverse array of widely utilized security protocols.
arXiv Detail & Related papers (2024-04-12T04:20:05Z) - Guarantees on the structure of experimental quantum networks [109.08741987555818]
Quantum networks connect and supply a large number of nodes with multi-party quantum resources for secure communication, networked quantum computing and distributed sensing.
As these networks grow in size, certification tools will be required to answer questions regarding their properties.
We demonstrate a general method to guarantee that certain correlations cannot be generated in a given quantum network.
arXiv Detail & Related papers (2024-03-04T19:00:00Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Strategies for the Integration of quantum networks for a future quantum
internet [0.0]
This article analyzes the possible integration strategies of already deployed networks or in the process of being deployed in order to reach a future global quantum network.
Two strategies based on the SDN paradigm are proposed, based on a hierarchical controller scheme and on a distributed model.
Several detected opportunities and challenges regarding security and technological aspects are presented.
arXiv Detail & Related papers (2024-01-12T08:32:50Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Practical quantum multiparty signatures using quantum-key-distribution
networks [0.0]
We develop an unconditionally secure signature scheme that guarantees authenticity and transferability of arbitrary length messages in a quantum key distribution network.
We provide a comprehensive security analysis of the developed scheme, perform an optimization of the scheme parameters with respect to the secret key consumption, and demonstrate that the developed scheme is compatible with the capabilities of currently available QKD devices.
arXiv Detail & Related papers (2021-07-27T17:41:40Z) - The Computational and Latency Advantage of Quantum Communication
Networks [70.01340727637825]
This article summarises the current status of classical communication networks.
It identifies some critical open research challenges that can only be solved by leveraging quantum technologies.
arXiv Detail & Related papers (2021-06-07T06:31:02Z) - Intelligent Zero Trust Architecture for 5G/6G Tactical Networks:
Principles, Challenges, and the Role of Machine Learning [4.314956204483074]
We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components.
This paper presents the architectural design of an i-ZTA upon which modern artificial intelligence (AI) algorithms can be developed to provide information security in untrusted networks.
arXiv Detail & Related papers (2021-05-04T13:14:29Z) - Attacking the Quantum Internet [0.7829352305480285]
We discuss and classify attacks on quantum repeaters, which will serve roles similar to those of classical Internet routers.
We point out attack vectors, then analyze attacks in terms of confidentiality, integrity and availability.
arXiv Detail & Related papers (2020-05-10T09:40:52Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.