• 검색 결과가 없습니다.

A Design of Secure Communication Architecture Applying Quantum Cryptography

N/A
N/A
Protected

Academic year: 2023

Share "A Design of Secure Communication Architecture Applying Quantum Cryptography"

Copied!
12
0
0

로드 중.... (전체 텍스트 보기)

전체 글

(1)

Received: April 20, 2022 Revised: May 9, 2022 Accepted: May 17, 2022 Published: June 20, 2022

*Corresponding Author: Kyu-Seok Shim https://orcid.org/0000-0002-3317-7000 E-mail: kusuk007@kisti.re.kr

All JISTaP content is Open Access, meaning it is accessible online to everyone, without fee and authors’ permission. All JISTaP content is published and distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/). Under this license, authors reserve the copyright for their content; however, they permit anyone to unrestrictedly use, distribute, and reproduce the content in any medium as far as the original authors and source are cited. For any reuse, redistribution, or reproduction of a work, users must clarify the license terms under which the work was produced.

https://doi.org/10.1633/JISTaP.2022.10.S.12 eISSN : 2287-4577 pISSN : 2287-9099

ABSTRACT

Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography systems is actively being conducted. The most powerful cryptography systems are quantum key distribution (QKD) and post quantum cryptograph (PQC) systems; in this study, a network based on both QKD and PQC is proposed, along with a quantum key management system (QKMS) and a Q-controller to efficiently operate the network. The proposed quantum cryptography communication network uses QKD as its backbone, and replaces QKD with PQC at the user end to overcome the shortcomings of QKD. This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.

Keywords: secure communication, quantum key distribution, quantum key management system, Q-controller, post quantum cryptograph, quantum cryptography

A Design of Secure Communication Architecture Applying Quantum Cryptography

Kyu-Seok Shim*

Korea Institute of Science and Technology Information (KISTI), Advanced Quantum KREONET Team, KREONET Centre, Daejeon, Korea E-mail: kusuk007@kisti.re.kr

Yong-Hwan Kim

Korea Institute of Science and Technology Information (KISTI), Advanced Quantum KREONET Team, KREONET Centre, Daejeon, Korea E-mail: yh.kim086@kisti.re.kr

Wonhyuk Lee

Korea Institute of Science and Technology Information (KISTI), Advanced Quantum KREONET Team, KREONET Centre, Daejeon, Korea E-mail: livezone@kisti.re.kr

(2)

1. INTRODUCTION

Existing network security methods are at risk due to the development of quantum computing. The Shor al- gorithm, which can be run on a quantum computer, can endanger the security of RSA (Rivest-Shamir-Adleman) public key cryptography systems in a short time (Arute et al., 2019; Shor, 1994). Therefore, studies on quantum key distribution (QKD) and post quantum cryptography (PQC) are being conducted to improve existing network security methods and prevent network threats caused by quantum computing. QKD is the most powerful security method because it can use quantum properties to detect eavesdropping by attackers during the process of distrib- uting keys (Bennett & Brassard, 2020). PQC improves on existing algorithms to prevent network security threats from quantum computers by increasing the level of com- putational complexity.

Due to the influence of quantum computers, cases of networking with QKD have been studied worldwide.

Typical examples of quantum cryptographic networks are Defense Advanced Research Projects Agency (DARPA) (2004) in the United States, Secure Communication based on Quantum Cryptography (SECOQC) (2008), Tokyo QKD (2010, 2013, 2015) in Japan, and the Beijing- Shanghai backbone quantum cryptographic network (2016). The DARPA Quantum Network (2002-2007) was the world’s first QKD network, operating ten optical nodes across Boston and Cambridge. The SECOQC network consists of a trusted private network and Quantum Back Bone (QBB). QBB provides quantum channel commu- nication between QBBs and operates as a trusted private network, making it easy to register new end nodes in the QKD network. Tokyo QKD is a quantum cryptographic network configured using the Key Management System.

Finally, China’s Beijing-Shanghai backbone quantum cryp- tography network combines ground and satellite links to form a total of 4,600 km of quantum cryptography com- munication networking.

Various studies have shown QKD to be safe from quan- tum computers; therefore, a variety of QKD protocols are being investigated (Sasaki, 2011).1 QKD can provide stable communication; however, it has many drawbacks with re- gard to network configuration. First, there are limitations on distance. Measurement-device-independent (MDI)- QKD is the QKD protocol with the longest distance of

1 See also: Chen et al., 2009; Elliott et al., 2003; Elliott & Yeh, 2007; European Commission, 2017; Han et al., 2010; Langer, 2013; Peev et al., 2009; Qiu, 2014; Sergienko, 2005; Shimizu et al., 2014; Travagnin & Lewis, 2019; Wang et al., 2014; Wang et al., 2010; Wu et al., 2009;

Zhang, 2017; Zhang et al., 2018; Zhao, 2019.

all QKD protocols that have been studied; it has a limit of 160-200 km. In addition, QKD is only capable of 1:1 communication because keys are distributed and divided between devices. Finally, construction costs are high be- cause a quantum channel must be created for each device.

Because of these drawbacks, it is impossible to create a national network using QKD.

The field of PQC is being studied to resolve the short- comings of QKD, prevent security threats from quantum computing while using already-built networks, increase the computational complexity of existing algorithms, and develop new cryptography algorithms so that encrypted data cannot be decrypted by algorithms executed on quantum computers. However, PQC currently has the drawback of long encryption and decryption times be- cause it increases computational and temporal complexity.

Therefore, in this study a network that combines QKD and PQC was designed and a network structure that uti- lizes the advantages of QKD and PQC is proposed. The network structure was configured using KREONET as a model, and there are plans to use it in the future. However, there are many limitations to designing a network that is safe from quantum computing using only QKD and PQC.

In particular, because QKD performs only 1:1 communi- cation and has a short communication distance, designing such a network incurs significant costs.

To overcome these drawbacks, we propose a QKD net- work structure that uses a quantum key management sys- tem (QKMS) and a Q-controller system. QKMS receives the symmetric key from a QKD and provides the key to the services that need encryption. During this process, QKMS creates a service key to efficiently use the symmet- ric key received from QKD, and the key lifecycle is man- aged to control these keys. In addition, QKMS overcomes the distance limitation by making it possible to relay keys.

The Q-controller manages key relays and the QKMS.

2. QUANTUM KEY DISTRIBUTION AND POST QUANTUM CRYPTOGRAPHY

This section discusses QKD and PQC, which are needed to create a secure communication architecture us- ing quantum cryptography. The network structure that is proposed in this paper provides a cryptography method for not only the backbone network, but also the user;

therefore, it is necessary to improve the physical security

(3)

of the backbone network that uses QKD and the security of the user terminal that uses the PQC.

QKD uses quantum properties to safely distribute symmetric keys between ‘Alice’ and ‘Bob.’ It has been ex- tensively studied as a means of reliably distributing sym- metric keys and is now the most actively researched area.

The most typical QKD protocol is single photon-based BB84, which was developed in 1984 by Bennett and Bras- sard (Shor & Preskill, 2000). The BB84 protocol encodes information in the polarization of protons and transmits it through a quantum channel. Thereafter, the information is compared to obtain the same key. The polarization state of the proton changes due to measurement according to the principles of quantum mechanics; therefore, the error rate increases during the process of comparing informa- tion, and it is possible to determine the presence of an eavesdropper. In addition to this, QKD protocols are be- ing studied in the form of various methods such as MDI- QKD and continuous-variable (CV)-QKD, along with satellite-based QKD systems. The following Table 1 sum- marizes the contents of various QKD protocols. Criteria for KREONET application were defined and each QKD protocol was analyzed.

The QKD to be used in the Secure Communication Architecture proposed in this paper is not limited because it should be applied in various environments. However, there should be an interface and standard to obtain the key generated by QKD (ETSI, 2019, 2021; Länger & Len- hart, 2009). This is covered in detail in Section 3, QKMS.

PQC is being studied to resolve the shortcomings of QKD. It refers to a cryptography algorithm that can use existing network structures and cannot be decrypted by quantum computers. Because of these advantages, the National Institute of Standards and Technology (NIST)

has been verifying various PQC algorithms, after a public call for standards in 2016 to standardize PQC. The types of PQC algorithms that are being studied include multi- variate, code, grid, isogeny, and hash-based cryptography.

Table 2 below shows the three round algorithms selected by NIST.

In the secure communication architecture proposed in this paper, the PQC algorithm is used in the user and institutional sections. The PQC algorithm is used among the algorithms selected in the third round of NIST. The reason for analyzing the selection of NIST before select- ing the PQC algorithm is to apply it as a standard for the PQC algorithm in the future. Various services cannot be provided if a non-standard PQC algorithm is used in a quantum cryptographic communication network that will provide various vendors and services. Therefore, in this paper we will apply TLS v1.3, which can apply the PQC Table 1. QKD protocol

BB84 E91 SARG04 DPS-QKD COW-QKD TF-QKD MDI-QKD CV-QKD

Distance (km) 70 - 90 260 125 550 390 140

Star topology Middle Low Low Middle Low Low High High

Complexity Middle High Middle Middle Middle High High Low

Cost Middle High High Middle Middle High High Middle

Utilization Low Low Low Low Low Low Low High

Key rate 3×10-7 5×10-7 1×10-5 1×10-38 9×10-5 2×10-6 5×10-6

Difficulty Middle High Middle Middle Middle High High High

QKD, quantum key distribution.

Table 2. PQC algorithms on 3 round NIST

Finalists Alternates

KEMs/Encryption Kyber Bike

NTRU FrodoKEM

SABER HQC

Classic McEliece NTRUprime SIKE

Signatures Dilithium GeMSS

Falcon Picnic

Rainbow SPHINCS+

PQC, post quantum cryptography; NIST, National Institute of Stan- dards and Technology.

(4)

algorithm, and then apply the PQC algorithm in future work. In addition, the PQC algorithm is applied to TLS v1.3 and used for sections where QKD cannot be installed.

Therefore, to design a cryptographic communication structure that uses quantum cryptography, research must be conducted on not only QKD but also PQC applica- tions. In this paper, we propose a method that uses QKD to set up completely safe intervals and the PQC algorithm to decrease costs and increase network users in the future.

3. QUANTUM KEY MANAGEMENT SYSTEM

This section discusses the QKMS in detail. The QKMS receives symmetric keys from the QKD, generates service keys for an efficient key usage rate, and provides keys that are suitable for service security requirements. In addition, the QKMS performs key relay functions to allow long- distance QKD communication and performs key manage- ment to provide a stable cryptography service. Table 3 lists the required functions of the QKMS.

As shown in Fig. 1, the QKMS is an essential compo- nent for creating a network with QKD. The structure of

Table 3. Function of QKMS

No. Function Description

1 Key Management · Receives quantum keys from QKDE and stores, deletes, or checks them.

2 Life Cycle Management

(Quantum Key) · Defines the quantum key’s life cycle state transition diagram and manages the quantum key life cycle.

3 Service Key Management · Generates a service key based on the quantum key when the QKD application service’s cryptography key is requested, and provides functions for allocating, updating, deleting, and verifying keys according to the service security requirements.

· Manages service keys and sets policies in response to insufficient quantum keys.

4 Life Cycle Management

(Service Key) · Manages service key life cycle.

5 Adapter · Supports the QKD application service manager and QKD application service adaptor for linking various QKD application services (e.g., supports all URI/IP address format service key requests, etc.).

6 Routing Table · Generates a route setting table by making requests and receiving responses from the Q-controller when a route setting item for a given destination is missing (Manual/Auto).

7 Key Relay · Relays quantum keys (that were generated by the quantum random number generator) between trusted nodes until reaching the requested destination based on quantum keys generated between QKMSs on a route.

· Performs key synchronization and saves and manages key states during the key relay process.

8 QKDE Management · Registers, deletes, and checks QKDE.

· Controls (initializes, restarts, stops) QKDE.

· Sets up QKDE, controls polices, and checks information.

· Supports QKDE adapter.

9 QKMS Management · Controls (initializes, restarts, stops) QKMS.

· Sets up QKMS modules, controls policies, and checks information.

10 State Management · Detects physical and software disruptions in quantum cryptography communication network components.

· Stores and checks disruptions, classifies disruption types, and notifies of disruptions.

· Provides recovery or restart functions via a database when disruptions occur.

11 Monitoring · Checks QKDE performance (raw key creation rate, QBER).

· Sets up and checks QKD network and QKMS network topology.

· Checks QKMS-related channel (public, quantum) state information.

QKD, quantum key distribution; QKMS, quantum key management system; QKDE, quantum key distribution entity.

(5)

the QKMS was designed as shown in Fig. 1 to perform the required functions listed in Table 1. The essential compo- nents of QKMS are Key Management Agent (KMA), Key Supply Agent (KSA), and Key Relay Agent (KRA). The KMA is a module that receives symmetric keys from the QKD and reformats the keys for efficient key usage. In addition, it is necessary to perform functions such as en- suring storage space using key life cycle management and reducing the error rate when synchronizing keys. To reli- ably perform the functions, the QKD protocol abstraction layer must perform an adapter role to receive keys that are generated by the various types of QKD, so that the Quan- tum Key Distribution Entity (QKDE) manager module can receive information related to QKD and maintain a stable network. A key receiving protocol based on the ETSI QKD 014 standard must be configured to allow the adapter to receive stable keys. The KSA is a module that provides keys suitable for service security requirements.

To provide these keys, the KSA must be designed to sup- port various services through an network entity (NE) pro- tocol abstraction layer, and to perform all tasks related to

the service keys. Finally, the KRA is a module that relays keys for long-distance quantum cryptography commu- nication. To efficiently relay keys, the KRA must use the QKMS manager to check the state of the components and the topology and set up of key relay routes.

Fig. 1 shows that the QKMS requires various modules in addition to KMA, KRA, and KSA. QKMS has a 1:N structure that can be linked to multiple QKDs; therefore, it must be able to distinguish keys generated by each linked QKD, and the messages for sending and receiving keys must be in the same format. Therefore, the messages sent by heterogeneous QKD devices are converted to the ETSI QKD 014 standard format in the QKD protocol abstrac- tion layer, and the keys are sent to the KMA. The system manager controls the QKMS itself and manages each of the modules. Finally, the state agent ascertains the states of the QKMS-linked QKD, the QKMS, and the channels, as well as monitoring their performance and key states. In addition, the QKMS-QKD section is defined as a security setting zone, and the QKMS-User section can be safely key transferred by applying the PQC algorithm.

QKMS core

System manager QKMS control Block manage live update

QKMS manager QKDE manager KMA KSA

Entity manage Topology set/check

Policy set/check

QKDE control

Performance set/check Fault

manage Performance collect

Q-Key life cycle

Key reformat Q-Key

receive

Key sync

Service key generation/supply

Service key life cycle

Q-controller CLI

MGMT interface Authentication layer

KRA Key relay

/syne

RNG OTP

Key relay route

State agent Fault report Key status

report HA check Performance

report

Key inventory Policy Operation

Replication (HA) Route

Authentication layer

NE protocol abstraction layer QKD protocal abstraction layer KM interface

Q-IPsec PoTN DV-QKD IDQ-QKD Toshiba-QKD

QKMS QKMS

Fig. 1. QKMS structure. QKMS, quantum key management system; QKDE, quantum key distribution entity; KMA, key management agent;

KSA, key supply agent; KRA, key relay agent; RNG, random number generator; OTP, one time password; NE, network entity; PoTN, packet optical transport network.

(6)

Table 4. Function of Q-controller

No. Function Description

1 QKDN Management · Registers, deletes, and checks QKDN components.

· Provides QKMS settings, policies, control, and information checks.

· Recognizes quantum cryptography communication network topology.

· Uses a least-distance algorithm based on weights (available resources, etc.) to calculate routes for relaying quantum keys from the source QKMS to the destination QKMS based on quantum cryptography communication network topology information when a route request from a QKMS occurs.

· Relays route setting messages to all QKMSs on a route based on calculated route information and reflects this in each route setting table.

· Provides authentication and security between QKDN components and interface/protocol.

2 Key Profile Management · Registers, changes, checks, deletes, activates, and deactivates key generation profiles that are shared between domains.

· Provides the user with an environment that can be set up in the Q-controller and QKMS.

3 Key Relay Route

Management · Generates all available key relay routes between QKMS according to the key generation profile.

· When key relay routes are generated, the relay cost is calculated using the number of quantum key resources.

4 Policy and Settings

Management · Sets and checks the system’s key provision policies.

* Provision policies: service key validity time, quantum key size, minimum number of quantum keys held, maximum number of quantum keys held, and maximum number of service keys that can be provided at one time.

5 Service State Management · Manages key generation states for each key generation profile.

6 QKDE Device Management · Registers, changes, checks, and deletes QKDE devices in the system.

· Initializes, restarts, and stops QKDE devices that are registered in the system.

7 QKMS Device Management · Registers, changes, checks, and deletes QKMS devices in the system.

8 QKDN Topology

Management · Sets and checks the QKMS registered in the system and the topology information of QKMS.

9 Channel State Information

Check · Receives QKDE device channel (public/quantum) state information from QKMS.

10 Performance Management · Sets information for each performance index, such as the collection period, reporting period, and URL of the server to report to.

11 QKDE Performance

Information Collection · Collects performance information, such as throughput, response delay, quantum key error ratio, quantum key loss ratio, and availability.

12 QKMS Performance

Information Collection · Collects system resource performance information, such as CPU usage rate, memory usage rate, and disk usage rate.

13 Q-controller Performance

Information Collection · Collects system resource performance information, such as CPU usage rate, memory usage rate, and disk usage rate.

14 Disruption Type

Management · Assigns and manages disruption codes for each disruption type.

· Registers actions for each disruption type and performs disruption handling.

· Disruption handling action examples:

- Operator alarm, set alternate key relay route, no action, etc.

15 Disruption Life Cycle and

Severity Levels · Classifies disruptions as alarms or faults and manages them.

-Alarm: Disruption that requires life cycle management according to state changes.

-Fault: One-time disruption information.

· Disruption levels are divided into 6 stages and managed.

16 Disruption Information Storage/Check Notification

· The controller receives disruption information from QKMS, stores it in the database’s disruption table, and notifies the operator. The operator uses a GUI to check the Q-controller disruption history.

QKDN, quantum key distribution network; QKMS, quantum key management system; QKDE, quantum key distribution entity; GUI: graphical user interface.

(7)

4. Q-CONTROLLER

The Q-controller performs the overall management of a quantum cryptography communication network that consists of QKMS and QKD, and is responsible not only for managing the quantum keys generated by QKD within the quantum cryptography communication network, but also for managing the service keys generated by QKMS. It also manages the component devices and channel states that make up the quantum cryptography communica- tion network. In addition, The Q-controller monitors the performance of each device to create a seamless quantum cryptography communication network, handles disrup- tions that occur while managing the devices, and provides notifications about them. Table 4 lists the required func- tions of the Q-Controller.

The Q-controller, which performs the functions in Table 4, is a device that allows for centralized management when creating a quantum cryptography communication network. It is composed of four modules, as shown in Fig.

2. The quantum key distribution network (QKDN) man- ager module manages its component devices and provides a live update function that allows state information to be checked in real time. It also performs functions that allow

disruptions, performance, and key states to be checked when examining state information. In addition, it can set policies in the key management network, and check the current state of the network. The topology manager checks and manages the quantum cryptography com- munication network’s topology state to allow for efficient key relaying by determining optimal routes when relay- ing keys within the QKMS. To efficiently perform the key relay function, the key relay manager checks and manages the key generation states from QKMS, searches and gener- ates relay routes, and generates alternate routes to handle relay route disruptions. Finally, the state manager receives notifications regarding disruptions, handles these disrup- tions when they occur in the components of the quantum cryptography communication network, and receives key state and performance information.

The Q-controller consists of an authentication layer, in- terface, and a graphical user interface (GUI) server in ad- dition to the four main modules. Because the Q-controller is linked to the QKMS and users, only the authenticated QKMS and users should have access; the authentication layer checks this process. A GUI client is used to allow the administrator to easily access the Q-controller, and the GUI server allows the Q-controller to be operated by

Q-controller core

Policy Operation

Replication (HA) Topology

GUI client

GUI server

MGMT interface (RestAPI over HTTPS) Authentication layer

QKDN manager Fault/performance/key stat s checku

Policy setting/check Entity management

live update

Key relay manager Key generation

management Key relay route search/generation Key relay route

setting Substitution route generation

Authentication layer QKMS management interface

Topology manager

State manager Topology management Topology check Key relay route

check

Fault handling Key state receive Fault information

receive

Performance information receive

QKMS QKMS QKMS QKMS QKMS

Fig. 2. Q-controller structure. GUI: graphical user interface; QKMS, quantum key management system; QKDN, quantum key distribution network.

(8)

sending and receiving messages.

5. SECURE COMMUNICATION ARCHITECTURE APPLYING QUANTUM CRYPTOGRAPHY

This section proposes a cryptographic communication structure that consists of the aforementioned QKD, PQC, QKMS, and Q-controller. The structure was designed based on a science and technology research network (Kim et al., 2018; KREONET, 2021; Park et al., 2010). In this network, a backbone section was designed focusing on 17 regional network centers in Korea. Because each regional network connects to all users, it is necessary to create a de- sign that improves the security of the connections between users to build a quantum cryptography communication network based on the science and technology research network. Therefore, a network structure that consists of the QKD, PQC, QKMS, and Q-controller was designed to build a quantum cryptography communication network based on the science and technology research network.

Fig. 3 shows the design of the national research network-based quantum cryptography communication network. The backbone sections and the sections between the backbone and the organizations are designed with the QKD, which is expensive but stable. The sections between the organizations and the users are designed with PQC, which has a lower stability and design cost than QKD and is able to use the existing network. The QKMS was includ- ed to efficiently link the QKD and PQC and manage the keys that are distributed by the QKD. The Q-controller

was included to organize the overall quantum cryptogra- phy communication network.

If the quantum cryptography communication network is implemented as in Fig. 3, a centralized administrator can manage the network via the Q-controller, and quan- tum cryptography communication can be set up. The Q- controller receives the QKD, QKMS, and channel state information via each QKMS, and can manage disruptions in components. In addition, the Q-controller calculates efficient key relay routes, and relays commands to each QKMS to make long-distance communication possible.

For Alice and Bob to perform quantum cryptography communication as shown in the figure, the following pro- cedure is carried out. 1) Alice sends a quantum cryptog- raphy communication request to a nearby QKMS, and the QKMS relays the request to the Q-controller. 2) The Q- controller checks the recipient of the message, calculates the route, and relays key request messages to each QKMS on the route. 3) The QKMSs that have received requests send generation request messages to the QKD, and the QKD generates the keys. 4) The keys are relayed along the route by the Q-controller, and the QKMS near Alice and Bob share symmetric keys. 5) The QKMSs perform en- cryption via the PQC and relay the symmetric keys to Al- ice and Bob. 6) Alice and Bob communicate by encrypting data using the shared symmetric keys.

6. SIMULATION

This section deals with the results of verifying the

Network topology

Network layers A

B

C

D

E Alice F

Bob

Bakcbone

Service layer

QKMS layer

QKD layer Q-controller

QKD

A B C

D

E

F

A B C

E

F D

Alice Bob

QKMS

Fig. 3. Secure communication architecture applying quantum cryptography.

QKD, quantum key distri- bution; QKMS, quantum key management system.

(9)

proposed quantum cryptographic network design. The simulation environment consists of one Q-controller and three QKMS nodes as shown in Fig. 4. QKD is replaced by a simulator because it is currently in the development stage (Ma et al., 2016). The verification scenario is carried out in the following Table 5.

The verification results are checked for each verifica- tion stage as follows. First, Fig. 5 confirms the key gen- erated by the QKD simulator in QKMS1 and 2. It was

confirmed that QKMS1 and QKMS2 have the same sym- metric key.

The next step is the function of the QKMS to reformat the received key for efficient use (Krawczyk & Eronen, 2010). The reformat function confirms that 10 keys with 8 length are generated with 80 length keys, and using the reformatted keys, QKMS1 relays to QKMS3 through QKMS2. After completing the relay, the QKMS1 and the QKMS3 synchronize and match each other’s keys to check Table 5. Verification scenario

Step Content Verification function

1 Key generated by QKD simulator received from QKMS (QKMS1-2, QKMS2-3) The function of key receives 2 QKMS reformat the received key (QKMS1-2, QKMS2-3) The function of key reformats

3 Key relay via QKMS2 The function of key relay

4 Synchronize keys on QKMS1, 3 The function of key synchronizes

5 Service key provided by QKMS1, 3 The function of key supplied

QKD, quantum key distribution; QKMS, quantum key management system.

SAE1 SAE3

Q-controller

1)

2) 4)

5)

QKMS1 QKMS2 QKMS3

QKD (simulator)

QKD (simulator)

QKD (simulator)

QKD (simulator) 5)

4)

1) 1)

2) 2)

3) 3)

Fig. 4. Simulation environment.

SAE, security application entity; QKD, quantum key distribution; QKMS, quan- tum key management sys- tem.

QKMS1 QLMS2

Fig. 5.  Key generated by QKD simulator in QKMS1 and QKMS2. QKD, quantum key distribution; QKMS, quantum key manage- ment system.

(10)

the relay result. The Fig. 6 shows a state in which QKMS1 and QKMS3 have the same key as each other through a key relay.

Finally, it is confirmed that the symmetric keys of QKMS1 and QKMS3 are supplied to perform the role of QKMS. The Fig. 7 is the result of SAE1 and 3 confirming the supply to the security application entity (SAE) con- nected to QKMS1, 3. It was confirmed that the two SAEs received a symmetric key.

7. CONCLUSION

This paper proposes a quantum cryptography commu- nication network that consists of a QKD and PQC. The QKMS was used to overcome the disadvantages of QKD, including the 1:1 communication and distance limitations, and a stable quantum cryptography communication net- work was constructed by substituting PQC for QKD at the user end, as QKD cannot be installed at the user end and incurs a high cost. The proposed quantum cryptography communication network uses the QKMS to incorporate networking into the QKD and to relay keys using PQC.

The functions of the QKMS were defined and designed to manage the QKMSs that make up the quantum cryp- tography communication network and set efficient key relay routes. The processes that constitute quantum cryp- tography communication between users via the designed items were shown for each layer, and a stable quantum encrypted communication method was proposed. In fu- ture studies, the QKD that is currently implemented in the simulator will be converted into an actual QKD and linked to the QKMS, and an actual quantum cryptogra- phy communication network will be applied to a national science and technology research network.

ACKNOWLEDGMENTS

This research was supported by Korea Institute of Sci- ence and Technology Information (KISTI).

CONFLICTS OF INTEREST

No potential conflict of interest relevant to this article was reported.

REFERENCES

Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Bar- ends, R., Biswas, R., Boixo, S., Brandao, F., Buell, D. A., Bur- kett, B., Chen, Y., Chen, Z., Chiaro, B., Collins, R., Courtney, W., Dunsworth, A., Farhi, E., Foxen, B., . . . Martinis, J. M.

(2019). Quantum supremacy using a programmable super- conducting processor. Nature, 574(7779), 505-510. https://

doi.org/10.1038/s41586-019-1666-5.

Bennett, C. H., & Brassard, G. (2020). Quantum cryptogra- phy: Public key distribution and coin tossing. Theoretical Computer Science, 560(Pt 1), 7-11. https://doi.org/10.1016/

j.tcs.2014.05.025.

Chen, T. Y., Liang, H., Liu, Y., Cai, W. Q., Ju, L., Liu, W. Y., Wang, J., Yin, H., Chen, K., Chen, Z. B., Peng, C. Z., & Pan, J. W. (2009). Field test of a practical secure communica- tion network with decoy-state quantum cryptography.

Optics Express, 17(8), 6540-6549. https://doi.org/10.1364/

oe.17.006540.

Fig. 6. Key synchronizes on QKMS1 and QKMS3. QKMS, quantum key management system.

SAE1

SAE3

Fig. 7. Checking the key supply from SAE1 and SAE3. SAE, security application entity.

(11)

Elliott, C., Pearson, D., & Troxel, G. (2003, August 25-29).

Quantum cryptography in practice. Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM'03) (pp. 227-238). ACM.

Elliott, C., & Yeh, H. (2007). DARPA quantum network test- bed. Defense Technical Information Center. https://books.

google.co.kr/books/about/DARPA_Quantum_Network_

Testbed.html?id=W_IpnQAACAAJ&redir_esc=y.

ETSI. (2019). Quantum key distribution (QKD); Protocol and data format of key delivery API to applications, GS QKD 014, V1.1.1. https://www.etsi.org/deliver/etsi_gs/

QKD/001_099/014/01.01.01_60/gs_qkd014v010101p.pdf.

ETSI. (2021). Quantum key distribution (QKD); Con- trol interface for software defined networks, GS QKD 015 V1.1.1. https://www.etsi.org/deliver/etsi_gs/

QKD/001_099/015/01.01.01_60/gs_QKD015v010101p.pdf.

European Commission. (2017). China to launch world’s first quantum communication network. https://cordis.europa.

eu/article/id/122516-trending-science-china-to-launch- worlds-first-quantum-communication-network.

Han, Z. F., Xu, F. X., Chen, W., Wang, S., Yin, Z. Q., Zhang, Y., Liu, Y., Zhou, Z., Li, H. W., Liu, D., & Guo, G. C. (2010, March 21-25). An application-oriented hierarchical quan- tum cryptography network test bed. Proceedings of the 2010 Conference on Optical Fiber Communication (OFC/

NFOEC), Collocated National Fiber Optic Engineers Con- ference (pp. 1-3). IEEE.

Kim, D., Kim, Y. H., Park, C., & Kim, K. I. (2018). KREONET- S: Software-defined wide area network design and deploy- ment on KREONET. IAENG International Journal of Com- puter Science, 45(1), 27-33. https://scholar.google.co.kr/

citations?view_op=view_citation&hl=ko&user=BP4sjXsA AAAJ&citation_for_view=BP4sjXsAAAAJ:u5HHmVD_

uO8C.

Krawczyk, H., & Eronen, P. (2010). HMAC-based extract-and- expand key derivation function (HKDF). https://www.hjp.

at/doc/rfc/rfc5869.html.

KREONET. (2021). KREONET web site. http://www.kreonet.

net/.

Langer, T. (2013). The practical application of quantum key distribution (doctoral dissertation). University of Lausanne, Lausanne, Switzerland.

Länger, T., & Lenhart, G. (2009). Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD. New Journal of Physics, 11(5), 055051. https://

iopscience.iop.org/article/10.1088/1367-2630/11/5/055051.

Ma, X., Yuan, X., Cao, Z., Qi, B., & Zhang, Z. (2016). Quantum random number generation. npj Quantum Information, 2,

16021. https://doi.org/10.1038/npjqi.2016.21.

Park, M. K., Jung, W. J., Lee, J. Y., & Kim, B. C. (2010). A study of future internet testbed construction using Net- FGA/OpenFlow switch on KOREN/KREONET. Journal of the Institute of Electronics Engineers of Korea TC, 47(7), 109-117. https://www.koreascience.or.kr/article/

JAKO201030853094488.j.

Peev, M., Pacher, C., Alléaume, R., Barreiro, C., Bouda, J., Boxleitner, W., Debuisschert, T., Diamanti, E., Dianati, M., Dynes, J. F., Fasel, S., Fossier, S., Fürst, M., Gautier, J. D., Gay, O., Gisin, N., Grangier, P., Happe, A., Hasani, Y., . . . Zeilinger, A. (2009). The SECOQC quantum key distribution network in Vienna. New Journal of Physics, 11, 075001. https://iop- science.iop.org/article/10.1088/1367-2630/11/7/075001.

Qiu, J. (2014). Quantum communications leap out of the lab. Na- ture, 508(7497), 441-442. https://doi.org/10.1038/508441a.

Sasaki, M., Fujiwra, M., Ishizuka, H., Klaus, W., Wakui, K., Takeoka, M., Tanaka, A., Yoshino, K., Nambu, Y., Taka- hashi, S., Tajima, A., Tomita, A., Domeki, T., Hasegawa, T., Sakai, Y., Kobayashi, H., Asai, T., Shimizu, K., Tokura, T., . . . Zeilinger, A. (2011, May 1-6). Tokyo QKD network and the evolution to secure photonic network. Proceedings of the Laser Science to Photonic Applications (CLEO’11) (pp. 1-3).

IEEE.

Sergienko, A. (2005). Quantum communications and cryptog- raphy. CRC Press.

Shimizu, K., Honjo, T., Fujiwara, M., Ito, T., Tamaki, K., Miki, S., Yamashita, T., Terai, H., Wang, Z., & Sasaki, M. (2014).

Performance of long-distance quantum key distribution over 90-km optical links installed in a field environment of Tokyo metropolitan area. Journal of Lightwave Technology, 32, 141-151. https://doi.org/10.1109/JLT.2013.2291391.

Shor, P. W. (1994, November 20-22). Algorithms for quantum computation: Discrete logarithms and factoring. Proceed- ings of the 35th Annual Symposium on Foundations of Computer Science (pp. 124-134). IEEE.

Shor, P. W., & Preskill, J. (2000). Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters, 85(2), 441-444. https://doi.org/10.1103/PhysRev- Lett.85.441.

Travagnin, M., & Lewis, A. (2019). Quantum key distribution in-field implementations, EUR 29865 EN. European Union.

Wang, S., Chen, W., Yin, Z. Q., Li, H. W., He, D. Y., Li, Y. H., Zhou, Z., Song, X. T., Li, F. Y., Wang, D., Chen, H., Han, Y. G., Huang, J. Z., Guo, J. F., Hao, P. L., Li, M., Zhang, C. M., Liu, D., Liang, W. Y., . . . Han, Z. F. (2014). Field and long-term demonstration of a wide area quantum key distribution network. Optics Express, 22(18), 21739-21756. https://doi.

org/10.1364/OE.22.021739.

(12)

Wang, S., Chen, W., Yin, Z. Q., Zhang, Y., Zhang, T., Li, H. W., Xu, F. X., Zhou, Z., Yang, Y., Huang, D. J., Zhang, L. J., Li, F. Y., Liu, D., Wang, Y. G., Guo, G. C., & Han, Z. F. (2010).

Field test of wavelength-saving quantum key distribution network. Optics Letters, 35(14), 2454-2456. https://doi.

org/10.1364/OL.35.002454.

Xu, F. X., Chen, W., Wang, S., Yin, Z. Q., Zhang, Y., Liu, Y., Zhou, Z., Zhao, Y., Li, H., Liu, D., Han, Z., & Guo, G. C.

(2009). Field experiment on a robust hierarchical metro- politan quantum cryptography network. Chinese Science Bulletin, 54, 2991-2997. https://doi.org/10.1007/s11434-

009-0526-3.

Zhang, Q., Xu, F., Chen, Y. A., Peng, C. Z., & Pan, J. W. (2018).

Large scale quantum key distribution: Challenges and solutions [Invited]. Optics Express, 26(18), 24260-24273.

https://doi.org/10.1364/OE.26.024260.

Zhang, Z. (2017). Quantum tech to link Jinan governments.

https://global.chinadaily.com.cn/a/201707/11/WS59bbe9f- ca310ded8ac18c53a.html.

Zhao, Y. (2019). The integration of QKD and security services.

Paper presented at the ITU QIT4N Workshop, Shanghai, China.

참조

관련 문서

First, there were 11 error-triggers in the process of communication of information design using natural objects as a metaphor: ① Ratio of visual expressions

In order to derive a new fuzzy controller, a fixed design-parameter fuzzy PID controller was surveyed in view of deriving a control law based on the

An RNN model is neural network architecture using a single layer or multiple layers, consisting of circulation connections, commonly applied for learning the

In summary, in order to detect malicious flows in a target network traffic, the flow correlation index between the target network traffic and the seed flow is calculated,

After analyzing the influence of design award indicators(technology, concept, visual expression, communication and benefits) on future design technologies,

지진의 발생원인을 설명하는 이론인 판구조론으로 볼 때, 우리나라는 비록 판의 내부에 있어 안전할 것으로 보이나 지진이 자주 발생하는 이웃 일본과 인접해 있고,

Hakim, The Story of Science – – Newton at the Center, Newton at the Center, Smithsonian Books, Washington DC, USA, 2005.. Smithsonian Books, Washington

Processing data transmission and reception packets which are coupled with the CubeSat communication protocol such as AX.25 and KISS is a critical step in a