Papers
Topics
Authors
Recent
Search
2000 character limit reached

Future proofing network encryption technology with continuous-variable quantum key distribution

Published 29 Feb 2024 in quant-ph | (2402.18881v2)

Abstract: We demonstrate a proof-of-concept establishment of quantum-secure data transfer links in field trials at two locations in Denmark: on the campus of Technical University of Denmark in Lyngby and between power grid nodes owned and operated by Energinet in Odense. Several different links, implemented physically using optical ground wires, underground fibers as well as their combinations, were investigated. Coherent quantum' states at 1550 nm, prepared and measured using a semi-autonomous continuous-variable quantum key distribution (CVQKD) prototype, were multiplexed in wavelength withclassical' 100Gbps encrypted data traffic from a pair of commercial layer-2 network encryption devices operating at around 1300 nm. Under the assumptions of real-time data processing, we estimate average secret key rates of $434.8, 148.6$, and $78.3$ kbps in the asymptotic limit for diverse channels with losses (at 1550 nm) of 4.1, 5.5, and 6.7 dB, respectively. The demonstrations permit an evaluation of the prototype's tolerance to harsh field conditions and showcase that CVQKD can serve as an additional layer to protect sensitive network traffic propagating on insecure channels.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (10)
  1. J. M. Porup, “How a nuclear plant got hacked,” https://www.csoonline.com/article/568145/how-a-nuclear-plant-got-hacked.html. Accessed: 2023-11-23.
  2. “The Colonial Pipeline Hack Is a New Extreme for Ransomware,” https://www.wired.com/story/colonial-pipeline-ransomware-attack/. Accessed: 2023-11-23.
  3. “The attack against Danish, critical infrastructure,” https://sektorcert.dk/wp-content/uploads/2023/11/SektorCERT-The-attack-against-Danish-critical-infrastructure-TLP-CLEAR.pdf. Accessed: 2023-11-25.
  4. IEEE Std 802.1AE-2018 (Revision of IEEE Std 802.1AE-2006) pp. 1–239 (2018).
  5. R. I. Woodward, J. F. Dynes et al., “Quantum Key Secured Communications Field Trial for Industry 4.0,” in “2021 Optical Fiber Communications Conference and Exhibition (OFC),” (2021), pp. 1–3.
  6. “Zybersafe TrafficCloak – Datasheet,” https://zybersafe.com/wordpress/wp-content/uploads/2019/11/Zybersafe-Data-Sheet.pdf. Accessed: 2023-01-03.
  7. “Using QKD for Data Center Security,” https://www.copenhagenfintech.dk/projects/using-qkd-for-data-center-security. Accessed: 2023-12-10.
  8. “A move to high speed server connectivity in the cloud,” https://www.cisco.com/c/en/us/products/collateral/interfaces-modules/transceiver-modules/high-speed-server-con-cloud-wp.html. Accessed: 2023-11-03.
  9. “QSFP28 100G 4WDM-40 transceiver,” https://apps.juniper.net/hct/model/?component=QSFP-100G-4WDM40. Accessed: 2023-11-03.
  10. H.-M. Chin, A. A. Hajomer et al., “Machine learning based joint polarization and phase compensation for cv-qkd,” in “2023 Optical Fiber Communications Conference and Exhibition (OFC),” (2023), pp. 1–3.
Citations (1)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 2 likes about this paper.