SlideShare a Scribd company logo
1 of 17
The quantum age – secure transport networks
June, 22nd 2022 – NAMEX Workshop
Christoph Glingener
2 © 2022 ADVA. All rights reserved. Confidential.
Recommend to prepare
for quantum era
Why care about future quantum computers?
The quantum computer threat
© 2022 ADVA. All rights reserved.
3
Public key cryptography is vulnerable
Quantum computers break present crypto systems
AES-GCM-256 AES-GCM-256
Secret
Diffie-
Hellman
Diffie-
Hellman
Session
key
Key exchange
Secret
Plaintext Ciphertext Plaintext
Alice Bob
Session
key
© 2022 ADVA. All rights reserved.
4
• Provides computational security
• Is based on hardness of math problems
• Works on any communication channel
• Requires endpoint protocol access only
• Is independent of optical layer
• Provides information-theoretic security
• Is based on laws of quantum physics
• Needs optical fiber or free-space channel
• Requires access to physical infrastructure
• Depends on optical link performance
Quantum-key distribution (QKD)
Post-quantum cryptography (PQC)
Standardization activities are taking place for both options
How can we make the key exchange quantum-safe?
© 2022 ADVA. All rights reserved.
5
Code- and lattice-based asymmetrical encryption algorithms
Option 1 (must-have): post-quatum cryptography
Alice
Bob
Session
key
Session
key
Quantum-safe key
exchange protocol
Quantum-safe key
exchange protocol
Key exchange
NIST, July 2020: Candidates for standardization of quantum-safe protocols are Classic
McEliece, CRYSTALS-Kyber, NTRU, SABER
BSI, August 2020: Recommends hybrid algorithms, Classic McEliece among others
© 2022 ADVA. All rights reserved.
6
Quantum key distribution (QKD) protocol distills a secure key out of a quantum signal
Option 2 (nice-to-have): quantum key distribution
Alice
Bob recognizes the
observation
Session
key
Session
key
Quantum channel
+Service channel
© 2022 ADVA. All rights reserved.
7
Hybrid key exchange
Plaintext Plaintext
Alice Bob
AES encryption AES encryption
Secret
Diffie-
Hellman
Diffie-
Hellman
Session
key
Key exchange
Secret
Ciphertext
Session
key
PQC PQC
Key exchange
QKD QKD
Key exchange
Combining key exchange schemes to provide robust quantum-safe solutions
© 2022 ADVA. All rights reserved.
8
Practical implementation
Network
element A
QKD Tx
Network
element B
QKD Rx
Key delivery API
QKD Rx QKD Tx
Trusted node 1..N (oder Repeater)
KMS KMS KMS
Auxiliary channel
Quantum channel
Management
channel
AES-encrypted
data channel(s)
In-line amplifier
1..N (optional)
Additional
fiber*
Grey or DWDM link
Fiber pair
*Co-propagation option
with data channels
Trusted site A Trusted site B
AES: Advanced encryption standard
KMS: Key management system
PQC PQC
QKD Repeater
© 2022 ADVA. All rights reserved.
9
Practical implementation 2
DWDM System
Optical layer
10G/100G/200G/400G…
Quantum Channel
Service Channel
QKD Alice
Ethernet device
QKD Bob
Ethernet layer
ETSI GS014
REST API
ETSI GS014
REST API
1G/10G
OTNsec
MACsec
Quantum key
delivery API
Quantum key
delivery API
© 2022 ADVA. All rights reserved.
10
Multiple candidates
• Code-based (e.g. McEliece)
• Latice-based (e.g. FrodoKEM)
• Etc.
BSI
• TR-02102-1 (hybrid with McEliece or
FrodoKEM)
NIST
• SP800-65C Rev2, hybrid with PQC
• Ongoing PQC project / challenge
Quantum Key Distribution
Post Quantum Cryptography
Standards and certifications necessary!
Quantum communication technologies
CV DV
Protocol CV-
QPSK
Decoy
BB84
BBM92
(Ent.)
Twin
Field
Key rate 1/ 1/ 1/ 1/√
Complexity
side channels
ecurity
Topology p2p p2p p2mp p2mp
Fiber
Free space
Costs
© 2022 ADVA. All rights reserved.
11
Safety based on known
cryptographic principles
No Distance limitation
No Need for another fiber
Computational complexity
Standardization in progress
Safety based on quantum-physics
Impossible to eavesdrop
Distance limitation
Need for additional fiber
Integration with existing networks
Standardization in progress
Quantum Key Distribution
Post Quantum Cryptography
Quantum communication – lessons learned
© 2022 ADVA. All rights reserved.
12
Quantum communication initiatives
• Germany (Research)
• R: QuNET, QR.X, QUBE, …
• E: DemoQuanDT, DE-QOR, …
Public Funding QT
(22 Mrd$ globally, 3,1 Mrd$ in D)
Yole, 2021
QEYSSAT mission
DOE: Quantum
internet blueprint
EuroQCI
Quantum
Comunications Hub
Space+terrestrial Q
KD net, MICIUS
© 2022 ADVA. All rights reserved.
13
Operators are taking action …
© 2022 ADVA. All rights reserved.
14
Protecting networks against tomorrow‘s threats, today
… so do we!
© 2022 ADVA. All rights reserved.
15
There’s more … joint communication and sensing
© 2021 ADVA. All rights reserved. Confidential.
15
Protect communication infrastructure against failures, attacks and natural disasters
Photo: Sebastian Schmitt/dpa
Photo: dpa
Optical JC&S*:
Phase-sensitive OTDR for
infrastructure monitoring
*Joint communicaton & sensing
Photo: Sebastian Schmitt/dpa
© 2022 ADVA. All rights reserved.
16
• Quantum-resistant approaches needed for long-term security of data
• Technologies: PQC (must-have) and QKD (nice-to-have)
• Crypto-agility for future updates to reflect advances in technology
• Highly funded (public incl. pre-commercial public procurement)
• First commercial products and installations
Challenges:
• Security proofs, atandards & certifications
• QKD robustness, performance, stability … need to improve!
• QKD costs – Quantum-PICs, RNGs
• QKD – Trusted Nodes vs Repeater?
The quantum age – secure transport networks
ADVA IC-TROSA
Thank you
IMPORTANT NOTICE
ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation,
direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA.
info@adva.com

More Related Content

What's hot

CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersSam Bowne
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesisSamy Shehata
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information TechnologyFenny Thakrar
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT SecurityNUS-ISS
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographySamy Shehata
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxRohanTakke
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationVittorio Giovara
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Beginners: 5G Terminology
Beginners: 5G TerminologyBeginners: 5G Terminology
Beginners: 5G Terminology3G4G
 

What's hot (20)

CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT Security
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Beginners: 5G Terminology
Beginners: 5G TerminologyBeginners: 5G Terminology
Beginners: 5G Terminology
 

Similar to The quantum age - secure transport networks

Quantum-safe data center interconnects
Quantum-safe data center interconnectsQuantum-safe data center interconnects
Quantum-safe data center interconnectsADVA
 
ADVA Webinar to Netwell.pdf
ADVA Webinar to Netwell.pdfADVA Webinar to Netwell.pdf
ADVA Webinar to Netwell.pdfOlam21
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA
 
Design and deployment of optical white box
Design and deployment of optical white boxDesign and deployment of optical white box
Design and deployment of optical white boxADVA
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceADVA
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud ADVA
 
Cloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorCloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorADVA
 
Scalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionADVA
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsADVA
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
Light Reading Webinar: Defining the 5G Network Connectivity Challenge
Light Reading Webinar: Defining the 5G Network Connectivity Challenge Light Reading Webinar: Defining the 5G Network Connectivity Challenge
Light Reading Webinar: Defining the 5G Network Connectivity Challenge ECI – THE ELASTIC NETWORK™
 
(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe NetworksPriyanka Aash
 
ADVA Disaggregated NOS
ADVA Disaggregated NOSADVA Disaggregated NOS
ADVA Disaggregated NOSDan Dovolsky
 
Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureADVA
 
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA
 
Best practices for secure synchronization in smart grids
Best practices for secure synchronization in smart gridsBest practices for secure synchronization in smart grids
Best practices for secure synchronization in smart gridsADVA
 
Vsat day-2008-gilat
Vsat day-2008-gilatVsat day-2008-gilat
Vsat day-2008-gilatSSPI Brasil
 
Hao_Qin_Presentation-秦博士.pdf
Hao_Qin_Presentation-秦博士.pdfHao_Qin_Presentation-秦博士.pdf
Hao_Qin_Presentation-秦博士.pdflstclstc
 

Similar to The quantum age - secure transport networks (20)

Quantum-safe data center interconnects
Quantum-safe data center interconnectsQuantum-safe data center interconnects
Quantum-safe data center interconnects
 
ADVA Webinar to Netwell.pdf
ADVA Webinar to Netwell.pdfADVA Webinar to Netwell.pdf
ADVA Webinar to Netwell.pdf
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
Design and deployment of optical white box
Design and deployment of optical white boxDesign and deployment of optical white box
Design and deployment of optical white box
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
 
Cloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorCloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or Differentiator
 
Scalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud Evolution
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport Systems
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Light Reading Webinar: Defining the 5G Network Connectivity Challenge
Light Reading Webinar: Defining the 5G Network Connectivity Challenge Light Reading Webinar: Defining the 5G Network Connectivity Challenge
Light Reading Webinar: Defining the 5G Network Connectivity Challenge
 
(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
ADVA Disaggregated NOS
ADVA Disaggregated NOSADVA Disaggregated NOS
ADVA Disaggregated NOS
 
Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the Future
 
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
 
Best practices for secure synchronization in smart grids
Best practices for secure synchronization in smart gridsBest practices for secure synchronization in smart grids
Best practices for secure synchronization in smart grids
 
Vsat day-2008-gilat
Vsat day-2008-gilatVsat day-2008-gilat
Vsat day-2008-gilat
 
Hao_Qin_Presentation-秦博士.pdf
Hao_Qin_Presentation-秦博士.pdfHao_Qin_Presentation-秦博士.pdf
Hao_Qin_Presentation-秦博士.pdf
 

More from ADVA

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockADVA
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...ADVA
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clockADVA
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureADVA
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networksADVA
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandADVA
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ADVA
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareADVA
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingADVA
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...ADVA
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)ADVA
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networksADVA
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorADVA
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceADVA
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™ADVA
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environmentsADVA
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum servicesADVA
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edgeADVA
 
Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!ADVA
 
Introducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockIntroducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockADVA
 

More from ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edge
 
Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!
 
Introducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockIntroducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clock
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

The quantum age - secure transport networks

  • 1. The quantum age – secure transport networks June, 22nd 2022 – NAMEX Workshop Christoph Glingener
  • 2. 2 © 2022 ADVA. All rights reserved. Confidential. Recommend to prepare for quantum era Why care about future quantum computers? The quantum computer threat
  • 3. © 2022 ADVA. All rights reserved. 3 Public key cryptography is vulnerable Quantum computers break present crypto systems AES-GCM-256 AES-GCM-256 Secret Diffie- Hellman Diffie- Hellman Session key Key exchange Secret Plaintext Ciphertext Plaintext Alice Bob Session key
  • 4. © 2022 ADVA. All rights reserved. 4 • Provides computational security • Is based on hardness of math problems • Works on any communication channel • Requires endpoint protocol access only • Is independent of optical layer • Provides information-theoretic security • Is based on laws of quantum physics • Needs optical fiber or free-space channel • Requires access to physical infrastructure • Depends on optical link performance Quantum-key distribution (QKD) Post-quantum cryptography (PQC) Standardization activities are taking place for both options How can we make the key exchange quantum-safe?
  • 5. © 2022 ADVA. All rights reserved. 5 Code- and lattice-based asymmetrical encryption algorithms Option 1 (must-have): post-quatum cryptography Alice Bob Session key Session key Quantum-safe key exchange protocol Quantum-safe key exchange protocol Key exchange NIST, July 2020: Candidates for standardization of quantum-safe protocols are Classic McEliece, CRYSTALS-Kyber, NTRU, SABER BSI, August 2020: Recommends hybrid algorithms, Classic McEliece among others
  • 6. © 2022 ADVA. All rights reserved. 6 Quantum key distribution (QKD) protocol distills a secure key out of a quantum signal Option 2 (nice-to-have): quantum key distribution Alice Bob recognizes the observation Session key Session key Quantum channel +Service channel
  • 7. © 2022 ADVA. All rights reserved. 7 Hybrid key exchange Plaintext Plaintext Alice Bob AES encryption AES encryption Secret Diffie- Hellman Diffie- Hellman Session key Key exchange Secret Ciphertext Session key PQC PQC Key exchange QKD QKD Key exchange Combining key exchange schemes to provide robust quantum-safe solutions
  • 8. © 2022 ADVA. All rights reserved. 8 Practical implementation Network element A QKD Tx Network element B QKD Rx Key delivery API QKD Rx QKD Tx Trusted node 1..N (oder Repeater) KMS KMS KMS Auxiliary channel Quantum channel Management channel AES-encrypted data channel(s) In-line amplifier 1..N (optional) Additional fiber* Grey or DWDM link Fiber pair *Co-propagation option with data channels Trusted site A Trusted site B AES: Advanced encryption standard KMS: Key management system PQC PQC QKD Repeater
  • 9. © 2022 ADVA. All rights reserved. 9 Practical implementation 2 DWDM System Optical layer 10G/100G/200G/400G… Quantum Channel Service Channel QKD Alice Ethernet device QKD Bob Ethernet layer ETSI GS014 REST API ETSI GS014 REST API 1G/10G OTNsec MACsec Quantum key delivery API Quantum key delivery API
  • 10. © 2022 ADVA. All rights reserved. 10 Multiple candidates • Code-based (e.g. McEliece) • Latice-based (e.g. FrodoKEM) • Etc. BSI • TR-02102-1 (hybrid with McEliece or FrodoKEM) NIST • SP800-65C Rev2, hybrid with PQC • Ongoing PQC project / challenge Quantum Key Distribution Post Quantum Cryptography Standards and certifications necessary! Quantum communication technologies CV DV Protocol CV- QPSK Decoy BB84 BBM92 (Ent.) Twin Field Key rate 1/ 1/ 1/ 1/√ Complexity side channels ecurity Topology p2p p2p p2mp p2mp Fiber Free space Costs
  • 11. © 2022 ADVA. All rights reserved. 11 Safety based on known cryptographic principles No Distance limitation No Need for another fiber Computational complexity Standardization in progress Safety based on quantum-physics Impossible to eavesdrop Distance limitation Need for additional fiber Integration with existing networks Standardization in progress Quantum Key Distribution Post Quantum Cryptography Quantum communication – lessons learned
  • 12. © 2022 ADVA. All rights reserved. 12 Quantum communication initiatives • Germany (Research) • R: QuNET, QR.X, QUBE, … • E: DemoQuanDT, DE-QOR, … Public Funding QT (22 Mrd$ globally, 3,1 Mrd$ in D) Yole, 2021 QEYSSAT mission DOE: Quantum internet blueprint EuroQCI Quantum Comunications Hub Space+terrestrial Q KD net, MICIUS
  • 13. © 2022 ADVA. All rights reserved. 13 Operators are taking action …
  • 14. © 2022 ADVA. All rights reserved. 14 Protecting networks against tomorrow‘s threats, today … so do we!
  • 15. © 2022 ADVA. All rights reserved. 15 There’s more … joint communication and sensing © 2021 ADVA. All rights reserved. Confidential. 15 Protect communication infrastructure against failures, attacks and natural disasters Photo: Sebastian Schmitt/dpa Photo: dpa Optical JC&S*: Phase-sensitive OTDR for infrastructure monitoring *Joint communicaton & sensing Photo: Sebastian Schmitt/dpa
  • 16. © 2022 ADVA. All rights reserved. 16 • Quantum-resistant approaches needed for long-term security of data • Technologies: PQC (must-have) and QKD (nice-to-have) • Crypto-agility for future updates to reflect advances in technology • Highly funded (public incl. pre-commercial public procurement) • First commercial products and installations Challenges: • Security proofs, atandards & certifications • QKD robustness, performance, stability … need to improve! • QKD costs – Quantum-PICs, RNGs • QKD – Trusted Nodes vs Repeater? The quantum age – secure transport networks ADVA IC-TROSA
  • 17. Thank you IMPORTANT NOTICE ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA. info@adva.com