Quantum Key Distribution Protocols and Applications

Total Page:16

File Type:pdf, Size:1020Kb

Quantum Key Distribution Protocols and Applications Quantum Key Distribution Protocols and Applications Sheila Cobourne Technical Report RHUL{MA{2011{05 8th March 2011 Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX, England http://www.rhul.ac.uk/mathematics/techreports Title: Quantum Key Distribution – Protocols and Applications Name: Sheila Cobourne Student Number: 100627811 Supervisor: Carlos Cid Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished works of other people. I declare that I have also read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences and in accordance with it I submit this project report as my own work. Signature: Date: Acknowledgements I would like to thank Carlos Cid for his helpful suggestions and guidance during this project. Also, I would like to express my appreciation to the lecturers at Royal Holloway who have increased my understanding of Information Security immensely over the course of the MSc, without which this project would not have been possible. Contents Table of Figures ................................................................................................... 6 Executive Summary ............................................................................................. 7 Chapter 1 Introduction .................................................................................... 8 1.1 Background ..................................................................................................... 8 1.2 Objective of the Report ................................................................................... 9 1.3 Structure of the Report .................................................................................. 10 Chapter 2 Some Security Concepts ................................................................. 11 2.1 Cryptographic Theory and Practice ................................................................. 11 2.2 Symmetric and Asymmetric Cryptographic Keys ............................................. 11 2.2.1 Symmetric Cryptography ................................................................................................ 11 2.2.2 Asymmetric or “Public Key” Cryptography ..................................................................... 11 2.3 Types of Security ........................................................................................... 12 2.3.1 Computational Security .................................................................................................. 12 2.3.2 Information-theoretic Security ....................................................................................... 12 2.4 The One Time Pad and the Vernam Cipher ..................................................... 12 2.5 Kerckhoff’s Principle ...................................................................................... 13 2.6 Key Establishment Protocols .......................................................................... 13 2.7 Key Distribution ............................................................................................ 14 2.8 Where Does Quantum Key Distribution Fit In? ............................................... 14 Chapter 3 The Quantum World ...................................................................... 15 3.1 Quantum Theory Historical Background ......................................................... 15 3.2 Quantum Properties ...................................................................................... 15 3.2.1 Quantum Superposition ................................................................................................. 15 3.2.2 Heisenberg’s Uncertainty Principle ................................................................................ 17 3.2.3 Quantum Entanglement ................................................................................................. 17 3.2.4 Bell’s Theorem ................................................................................................................ 18 3.3 Quantum Computers ..................................................................................... 18 Page 1 3.4 Quantum Decoherence .................................................................................. 19 3.5 Quantum Channels ........................................................................................ 19 3.6 Photon Polarisation ....................................................................................... 19 3.7 Quantum No-Cloning ..................................................................................... 21 3.8 Quantum Theory and Quantum Key Distribution ............................................ 21 Chapter 4 Quantum Key Distribution Protocols .............................................. 22 4.1 General methodology for QKD ....................................................................... 22 4.1.1 Raw Key Exchange .......................................................................................................... 22 4.1.2 Key Sifting ....................................................................................................................... 23 4.1.3 Key Distillation ................................................................................................................ 23 4.1.4 Useable Key Size ............................................................................................................. 24 4.2 Quantum Security ......................................................................................... 25 4.3 The BB84 Protocol ......................................................................................... 26 4.3.1 Raw Key Exchange and Key Sifting ................................................................................. 26 4.3.2 Raw Key Exchange in the Presence of Eavesdroppers ................................................... 28 4.3.3 Photon Number Splitting Attacks ................................................................................... 29 4.3.4 Counteracting PNS Attacks ............................................................................................. 30 4.4 The B92 Protocol ........................................................................................... 31 4.5 The SARG04 Protocol ..................................................................................... 32 4.6 The E91 Protocol ........................................................................................... 33 4.7 The BBM92 Protocol ...................................................................................... 34 4.8 Other Protocols ............................................................................................. 34 Chapter 5 Quantum Key Distribution - The Challenges ................................... 35 5.1 Is QKD Too Good To Be True? ........................................................................ 35 5.2 Basic Issues ................................................................................................... 35 5.2.1 Point to Point links and Denial of Service ....................................................................... 35 5.2.2 Photon Sources and Detectors ....................................................................................... 35 5.2.3 Losses in the Quantum Channel and Limiting Distance ................................................. 36 5.2.4 Key Distribution Rate ...................................................................................................... 37 5.2.5 Classical Authentication ................................................................................................. 37 5.2.6 Quantum Physics Itself ................................................................................................... 37 Page 2 5.2.7 A Security Proof Equals Proven Security? ...................................................................... 38 5.2.8 Side Channel Attacks ...................................................................................................... 38 5.2.9 Key Management ........................................................................................................... 39 5.3 Is QKD Actually Needed? ............................................................................... 39 5.4 When to Use QKD .......................................................................................... 41 5.5 The Way Forward .......................................................................................... 42 Chapter 6 Quantum Networks ....................................................................... 43 6.1 Innate Problems with Quantum Channels ...................................................... 43 6.2 A Networked Solution ................................................................................... 44 6.3 Quantum Network Types ............................................................................... 44 6.3.1 Quantum Node Networks .............................................................................................. 44 6.3.2 Optical Node Networks .................................................................................................. 45 6.3.3 Trusted Relay Networks ................................................................................................. 45 6.4 Practical Quantum Network
Recommended publications
  • Security of Quantum Key Distribution with Entangled Qutrits
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CERN Document Server Security of Quantum Key Distribution with Entangled Qutrits. Thomas Durt,1 Nicolas J. Cerf,2 Nicolas Gisin,3 and Marek Zukowski˙ 4 1 Toegepaste Natuurkunde en Fotonica, Theoeretische Natuurkunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium 2 Ecole Polytechnique, CP 165, Universit´e Libre de Bruxelles, 1050 Brussels, Belgium 3 Group of Applied Physics - Optique, Universit´e de Gen`eve, 20 rue de l’Ecole de M´edecine, Gen`eve 4, Switzerland, 4Instytut Fizyki Teoretycznej i Astrofizyki Uniwersytet, Gda´nski, PL-80-952 Gda´nsk, Poland July 2002 Abstract The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a general- isation of Ekert's cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert's protocol. In order to study its robustness against the optimal individual attacks, we derive the infor- mation gained by a potential eavesdropper applying a cloning-based attack. Introduction Quantum cryptography aims at transmitting a random key in such a way that the presence of an eavesdropper that monitors the communication is revealed by disturbances in the transmission of the key (for a review, see e.g. [21]). Practically, it is enough in order to realize a crypto- graphic protocol that the key signal is encoded into quantum states that belong to incompatible bases, as in the original protocol of Bennett and Brassard[4].
    [Show full text]
  • CLEO/Europe-EQEC 2021 Advance Programme
    2021 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference Advance Programme Virtual Meeting CEST time zone 21 - 25 June 2021 www.cleoeurope.org Sponsored by • European Physical Society / Quantum Electronics and Optics Division • IEEE Photonics Society • The Optical Society 25th International Congress on Photonics in Europe Collocated with Laser World of Photonics Industry Days https://world-of-photonics.com/en/ 10th EPS-QEOD Europhoton Conference EUROPHOTON SOLID-STATE, FIBRE, AND WAVEGUIDE COHERENT LIGHT SOURCES 28 August – 02 September 2022 Hannover, Germany www.europhoton.org Fotos: © HMTG - Lars Gerhardts Fotos: © HMTG Table of contents TABLE OF CONTENTS Welcome and Foreword 02 Days at a Glance 04 Sessions at a Glance 14 How to Read the Session Codes? 15 How to Find the Room? 17 Topics 20 General Information 24 Technical Programme 28 01 Welcome and foreword Welcome to the 2021 Conference CLEO®/Europe will showcase the latest Particular highlights of the 2021 programme 2021 Conference on Lasers and on Lasers and Electro-Optics developments in a wide range of laser and will be a series of symposia: Electro-Optics Europe & European Europe & European Quantum photonics areas including solid-state lasers, Nanophononics, High-Field THz Genera- Quantum Electronics Conference Electronics Conference (hereafter semiconductor lasers, terahertz sources and tion and Applications, Attochemistry, Deep CLEO®/Europe-EQEC) at the World applications, applications of nonlinear op- learning in Photonics and Flexible Photonics. CLEO®/Europe - EQEC 2021 of Photonics Congress 2021 tics, optical materials, optical fabrication and Additionally, two joint sessions (EC- characterization, ultrafast optical technologies, BO-CLEO®/Europe and LiM-CLEO®/Europe) Virtual Meeting high-field laser and attosecond science, optical will be held.
    [Show full text]
  • Progress in Satellite Quantum Key Distribution
    www.nature.com/npjqi REVIEW ARTICLE OPEN Progress in satellite quantum key distribution Robert Bedington 1, Juan Miguel Arrazola1 and Alexander Ling1,2 Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world. npj Quantum Information (2017) 3:30 ; doi:10.1038/s41534-017-0031-5 INTRODUCTION losses that increase exponentially with distance, greatly limiting Quantum key distribution (QKD) is a relatively new cryptographic the secure key rates that can be achieved over long ranges. primitive for establishing a private encryption key between two For any pure-loss channel with transmittance η, it has been parties. The concept has rapidly matured into a commercial shown that the secure key rate per mode of any QKD protocol 5, 6, 7 technology since the first proposal emerged in 1984,1 largely scales linearly with η for small η. This places a fundamental because of a very attractive proposition: the security of QKD is not limit to the maximum distance attainable by QKD protocols based on the computational hardness of solving mathematical relying on direct transmission.
    [Show full text]
  • Reconfigurable Optical Implementation of Quantum Complex Networks J Nokkala, F
    Reconfigurable optical implementation of quantum complex networks J Nokkala, F. Arzani, F Galve, R Zambrini, S Maniscalco, J Piilo, Nicolas Treps, V Parigi To cite this version: J Nokkala, F. Arzani, F Galve, R Zambrini, S Maniscalco, et al.. Reconfigurable optical implemen- tation of quantum complex networks. New Journal of Physics, Institute of Physics: Open Access Journals, 2018, 20, pp.053024. 10.1088/1367-2630/aabc77. hal-01798144 HAL Id: hal-01798144 https://hal.sorbonne-universite.fr/hal-01798144 Submitted on 23 May 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License PAPER • OPEN ACCESS Related content - An Introduction to the Formalism of Reconfigurable optical implementation of quantum Quantum Information with Continuous Variables: Quantum information with continuous variables complex networks C Navarrete-Benlloch - Spacetime replication of continuous To cite this article: J Nokkala et al 2018 New J. Phys. 20 053024 variable quantum information Patrick Hayden, Sepehr Nezami, Grant Salton et al. - Coupled harmonic systems as quantum buses in thermal environments View the article online for updates and enhancements. F Nicacio and F L Semião This content was downloaded from IP address 134.157.80.157 on 23/05/2018 at 09:58 New J.
    [Show full text]
  • Practical Quantum Key Distribution Based on the BB84 Protocol
    Practical Quantum Key Distribution based on the BB84 protocol A. Ruiz-Alba, D. Calvo, V. Garcia-Muñoz, A. Martinez, W. Amaya, J.G. Rozo, J. Mora, J. Capmany Instituto de Telecomunicaciones y Aplicaciones Multimedia, Universitat Politècnica de València, 8G Building-access D-Camino de Vera s/n-46022 Valencia (Spain) Corresponding author: [email protected] Abstract relies on photon sources and the so-called pho- ton guns are far from ready. An alternative and This paper provides a review of the most impor- also a complementary approach to increase the tant and widely used Quantum Key Distribution bit rate is to make QKD systems work in paral- systems and then describes our recently pro- lel. This simple engineering approach becomes a posed scheme based on Subcarrier Multiplexing challenge when working with quantum systems: that opens the possibility of parallel Quantum The system should work in parallel but still rely Key Distribution. We report the first-ever ex- on just one source and its security should still be perimental implementation of parallel quantum guaranteed by the principles of quantum me- key distribution using this technique showing a chanics both when Alice prepares the photons maximum multiplexing gain. and when Bob “measures” the incoming states. At the same time the multiplexing technique Keywords: Optical fiber communications, quan- should be safe to Eve gaining any information. tum information, quantum key distribution, sub- carrier multiplexing. In this context, recent progress in the literature [4] remarks that photonics is a key enabling technology for implementing commercial QKD 1. Introduction systems to become a competitive technology in Information Security.
    [Show full text]
  • Security of Quantum Key Distribution with Multiphoton Components
    Security of quantum key distribution with multiphoton components 1,2, 1,2, 1,2 1,2 Hua-Lei Yin ∗, Yao Fu ∗, Yingqiu Mao & Zeng-Bing Chen 1Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026, China 2The CAS Center for Excellence in QIQP and the Synergetic Innovation Center for QIQP, Uni- versity of Science and Technology of China, Hefei, Anhui 230026, China ∗ These authors contributed equally to this work. Correspondence and requests for materials should be addressed to H.-L.Y. (email: [email protected]) or Z.-B.C. (email: [email protected]) Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin- Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be ex- tracted from the two-photon component by modifying the classical post-processing proce- dure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four arXiv:1607.02366v1 [quant-ph] 8 Jul 2016 photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three- photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works.
    [Show full text]
  • Lecture 12: Quantum Key Distribution. Secret Key. BB84, E91 and B92 Protocols. Continuous-Variable Protocols. 1. Secret Key. A
    Lecture 12: Quantum key distribution. Secret key. BB84, E91 and B92 protocols. Continuous-variable protocols. 1. Secret key. According to the Vernam theorem, any message (for instance, consisting of binary symbols, 01010101010101), can be encoded in an absolutely secret way if the one uses a secret key of the same length. A key is also a sequence, for instance, 01110001010001. The encoding is done by adding the message and the key modulo 2: 00100100000100. The one who knows the key can decode the encoded message by adding the key to the message modulo 2. The important thing is that the key should be used only once. It is exactly this way that classical cryptography works. Therefore the only task of quantum cryptography is to distribute the secret key between just two users (conventionally called Alice and Bob). This is Quantum Key Distribution (QKD). 2. BB84 protocol, proposed in 1984 by Bennett and Brassard – that’s where the name comes from. The idea is to encode every bit of the secret key into the polarization state of a single photon. Because the polarization state of a single photon cannot be measured without destroying this photon, this information will be ‘fragile’ and not available to the eavesdropper. Any eavesdropper (called Eve) will have to detect the photon, and then she will either reveal herself or will have to re-send this photon. But then she will inevitably send a photon with a wrong polarization state. This will lead to errors, and again the eavesdropper will reveal herself. The protocol then runs as follows.
    [Show full text]
  • Book of Abstracts
    LANET 2017 Puebla (Mexico), September 25-29, 2017 1ST LATIN AMERICAN CONFERENCE ON COMPLEX NETWORKS AND LANET SCHOOL ON FUNDAMENTALS AND APPLICATIONS OF NETWORK SCIENCE LANET 2017 25-29 SEPTEMBER 2017 PUEBLA MEXICO BOOK OF ABSTRACTS ORGANIZED BY BENEMÉRITA UNIVERSIDAD AUTÓNOMA DE PUEBLA Benemérita Universidad Autónoma de Puebla LANET 2017 Puebla (Mexico), September 25-29, 2017 BENEMÉRITA UNIVERSIDAD DE PUEBLA LANET BOARD Rector Nuno Araujo (Universidade de Lisboa, Portugal) Dr. J. Alfonso Esparza Ortiz Pablo Balenzuela (Universidad de Buenos Aires, Argentina) Secretario General Javier M. Buldú (URJC & CTB, Spain) Dr. René Valdiviezo Sandoval Lidia Braunstein (CONICET-UNMdP, Argentina) Vicerrector de Investigación Mario Chávez (CNRS, Hospital Pitié-Salpetriere, France) Dr. Ygnacio Martínez Laguna Hilda Cerdeira (IFT-UNESP, Brazil) Directora del Instituto de Física Luciano da Fontoura (University of Sao Paulo, Brazil) Dra. Ma. Eugenia Mendoza Álvarez Bruno Gonçalves (New York University, USA) Rafael Germán Hurtado (Universidad Nacional de Colombia, Bogota) Ernesto Estrada (University of Strathclyde, UK) LOCAL ORGANIZING COMMITTEE Jesús Gómez-Gardeñes (Universidad de Zaragoza, Spain) José Antonio Méndez-Bermúdez Marta C. González (MIT, USA) (BUAP, Puebla, Mexico) Rafael Gutiérrez (Universidad Antonio Nariño, Colombia) Ygnacio Martínez Laguna Cesar Hidalgo (MIT Media Lab, USA) (BUAP, Puebla, Mexico) Gustavo Martínez-Mekler (UNAM, Mexico) Pedro Hugo Hernández Tejeda Johann H. Martínez (INSERM, France) (BUAP, Puebla, Mexico) Cristina Masoller (Universitat Politècnica de Catalunya, Spain) Javier M. Buldú José Luis Mateos (Instituto de Física, UNAM, Mexico) (URJC & CTB, Spain) José F. Mendes (University of Aveiro, Portugal) Jesús Gómez-Gardeñes José Antonio Méndez-Bermúdez (BUAP, Puebla Mexico) (Universidad de Zaragoza, Spain) Ronaldo Menezes (Florida Institute of Technology, USA) Johann H.
    [Show full text]
  • Basic Probability Theory A
    Basic Probability Theory A In order to follow many of the arguments in these notes, especially when talking about entropies, it is necessary to have some basic knowledge of probability theory. Therefore, we review here the most important tools of probability theory that are used. One of the basic notions of probability theory that also frequently appears throughout these notes is that of a discrete random variable. A random variable X can take one of several values, the so-called realizations x,givenbythealphabet X. The probability that a certain realization x ∈ X occurs is given by the probability distribution pX(x). We usually use upper case letters to denote the random variable, lower case letters to denote realizations thereof, and calligraphic letters to denote the alphabet. Suppose we have two random variables X and Y , which may depend on each other. We can then define the joint probability distribution pX,Y (x, y) of X and Y that tells you the probability that Y = y and X = x. This notion (and the following definition) can be expanded to n random variables, but we restrict ourselves to the case of pairs X, Y here to keep the notation simple. Given the joint probability distribution of the pair X, Y , we can derive the marginal distribution PX(x) by pX(x) = pX,Y (x, y) ∀ x ∈ X (A.1) y∈Y and analogously for PY (y). The two random variables X and Y are said to be independent if pX,Y (x, y) = pX(x)pY (y). (A.2) © The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 219 R.
    [Show full text]
  • Quantum Cryptography: from Theory to Practice
    Quantum cryptography: from theory to practice Eleni Diamanti Laboratoire Traitement et Communication de l’Information CNRS – Télécom ParisTech 1 with Anna Pappa, André Chailloux, Iordanis Kerenidis Two-party secure communications: QKD Alice and Bob trust each other but not the channel Primitive for message exchange: key distribution BB84 QKD protocol: possibly the precursor of the entire field 2 Jouguet, Kunz-Jacques, Leverrier, Grangier, D, Nature Photon. 2013 3 Scarani et al, Rev. Mod. Phys. 2009 Two-party secure communications: QKD Information-theoretic security is possible and feasible! Theory adapted to experimental imperfections 2000: Using laser sources opens a disastrous security loophole in BB84 photon number splitting attacks Brassard, Lütkenhaus, Mor, Sanders, Phys. Rev. Lett. 2000 Solution: Decoy state BB84 protocol, and other Lo, Ma, Chen, Phys. Rev. Lett. 2004 2010: Quantum hacking: setup vulnerabilities not taken into account in security proofs Lydersen et al, Nature Photon. 2010 Solution: Exhaustive search for side channels and updated security proofs? Device independence? Measurement device independence? 4 Two-party secure communications: beyond QKD Alice and Bob do not trust each other Primitives for joint operations: bit commitment, coin flipping, oblivious transfer Until recently relatively ignored by physicists perfect unconditionally secure protocols are impossible, but imperfect protocols with information-theoretic security exist ideal framework to demonstrate quantum advantage protocols require inaccessible
    [Show full text]
  • Intercept-Resend Attack on SARG04 Protocol: an Extended Work
    Polytechnic Journal. 2020. 10(1): 88-92 ISSN: 2313-5727 http://journals.epu.edu.iq/index.php/polytechnic RESEARCH ARTICLE Intercept-Resend Attack on SARG04 Protocol: An Extended Work Ali H. Yousif*, Omar S. Mustafa, Dana F. Abdulqadir, Farah S. Khoshaba Department of Information System Engineering, Erbil Technical Engineering College, Erbil Polytechnic University, Erbil, Kurdistan Region, Iraq *Correspondence author: ABSTRACT Ali H. Yousif, Department of Information In this paper, intercept/resend eavesdropper attack over SARG04 quantum key distribution protocol is System Engineering, investigated by bounding the information of an eavesdropper; then, the attack has been analyzed. In Erbil Technical Engineering 2019, simulation and enhancement of the performance of SARG04 protocol have been done by the College, Erbil Polytechnic same research group in terms of error correction stage using multiparity rather than single parity (Omar, University, Erbil, Kurdistan 2019). The probability of detecting the case in the random secret key by eavesdropper is estimated. Region, Iraq, The results of intercept/resend eavesdropper attack proved that the attack has a significant impact E-mail: [email protected] on the operation of the SARG04 protocol in terms of the final key length. Received: 28 October 2019 Keywords: Eavesdropper; Intercept-resend; IR; Quantum; SARG04 Accepted: 05 February 2020 Published: 30 June 2020 DOI 10.25156/ptj.v10n1y2020.pp88-92 INTRODUCTION promises to revolutionize secure communication using the key distribution. Nowadays, the information security is the most important concern of people and entity. One of the main issues Quantum key distribution (QKD) enables two parties to of practical quantum communication is the information establish a secure random secret key depending on the security under the impact of disturbances or quantum principles of quantum mechanics.
    [Show full text]
  • Gr Qkd 003 V2.1.1 (2018-03)
    ETSI GR QKD 003 V2.1.1 (2018-03) GROUP REPORT Quantum Key Distribution (QKD); Components and Internal Interfaces Disclaimer The present document has been produced and approved by the Group Quantum Key Distribution (QKD) ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. 2 ETSI GR QKD 003 V2.1.1 (2018-03) Reference RGR/QKD-003ed2 Keywords interface, quantum key distribution ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]