SlideShare a Scribd company logo
2
Most read
3
Most read
13
Most read
The quantum age – secure transport networks
June, 22nd 2022 – NAMEX Workshop
Christoph Glingener
2 © 2022 ADVA. All rights reserved. Confidential.
Recommend to prepare
for quantum era
Why care about future quantum computers?
The quantum computer threat
© 2022 ADVA. All rights reserved.
3
Public key cryptography is vulnerable
Quantum computers break present crypto systems
AES-GCM-256 AES-GCM-256
Secret
Diffie-
Hellman
Diffie-
Hellman
Session
key
Key exchange
Secret
Plaintext Ciphertext Plaintext
Alice Bob
Session
key
© 2022 ADVA. All rights reserved.
4
• Provides computational security
• Is based on hardness of math problems
• Works on any communication channel
• Requires endpoint protocol access only
• Is independent of optical layer
• Provides information-theoretic security
• Is based on laws of quantum physics
• Needs optical fiber or free-space channel
• Requires access to physical infrastructure
• Depends on optical link performance
Quantum-key distribution (QKD)
Post-quantum cryptography (PQC)
Standardization activities are taking place for both options
How can we make the key exchange quantum-safe?
© 2022 ADVA. All rights reserved.
5
Code- and lattice-based asymmetrical encryption algorithms
Option 1 (must-have): post-quatum cryptography
Alice
Bob
Session
key
Session
key
Quantum-safe key
exchange protocol
Quantum-safe key
exchange protocol
Key exchange
NIST, July 2020: Candidates for standardization of quantum-safe protocols are Classic
McEliece, CRYSTALS-Kyber, NTRU, SABER
BSI, August 2020: Recommends hybrid algorithms, Classic McEliece among others
© 2022 ADVA. All rights reserved.
6
Quantum key distribution (QKD) protocol distills a secure key out of a quantum signal
Option 2 (nice-to-have): quantum key distribution
Alice
Bob recognizes the
observation
Session
key
Session
key
Quantum channel
+Service channel
© 2022 ADVA. All rights reserved.
7
Hybrid key exchange
Plaintext Plaintext
Alice Bob
AES encryption AES encryption
Secret
Diffie-
Hellman
Diffie-
Hellman
Session
key
Key exchange
Secret
Ciphertext
Session
key
PQC PQC
Key exchange
QKD QKD
Key exchange
Combining key exchange schemes to provide robust quantum-safe solutions
© 2022 ADVA. All rights reserved.
8
Practical implementation
Network
element A
QKD Tx
Network
element B
QKD Rx
Key delivery API
QKD Rx QKD Tx
Trusted node 1..N (oder Repeater)
KMS KMS KMS
Auxiliary channel
Quantum channel
Management
channel
AES-encrypted
data channel(s)
In-line amplifier
1..N (optional)
Additional
fiber*
Grey or DWDM link
Fiber pair
*Co-propagation option
with data channels
Trusted site A Trusted site B
AES: Advanced encryption standard
KMS: Key management system
PQC PQC
QKD Repeater
© 2022 ADVA. All rights reserved.
9
Practical implementation 2
DWDM System
Optical layer
10G/100G/200G/400G…
Quantum Channel
Service Channel
QKD Alice
Ethernet device
QKD Bob
Ethernet layer
ETSI GS014
REST API
ETSI GS014
REST API
1G/10G
OTNsec
MACsec
Quantum key
delivery API
Quantum key
delivery API
© 2022 ADVA. All rights reserved.
10
Multiple candidates
• Code-based (e.g. McEliece)
• Latice-based (e.g. FrodoKEM)
• Etc.
BSI
• TR-02102-1 (hybrid with McEliece or
FrodoKEM)
NIST
• SP800-65C Rev2, hybrid with PQC
• Ongoing PQC project / challenge
Quantum Key Distribution
Post Quantum Cryptography
Standards and certifications necessary!
Quantum communication technologies
CV DV
Protocol CV-
QPSK
Decoy
BB84
BBM92
(Ent.)
Twin
Field
Key rate 1/ 1/ 1/ 1/√
Complexity
side channels
ecurity
Topology p2p p2p p2mp p2mp
Fiber
Free space
Costs
© 2022 ADVA. All rights reserved.
11
Safety based on known
cryptographic principles
No Distance limitation
No Need for another fiber
Computational complexity
Standardization in progress
Safety based on quantum-physics
Impossible to eavesdrop
Distance limitation
Need for additional fiber
Integration with existing networks
Standardization in progress
Quantum Key Distribution
Post Quantum Cryptography
Quantum communication – lessons learned
© 2022 ADVA. All rights reserved.
12
Quantum communication initiatives
• Germany (Research)
• R: QuNET, QR.X, QUBE, …
• E: DemoQuanDT, DE-QOR, …
Public Funding QT
(22 Mrd$ globally, 3,1 Mrd$ in D)
Yole, 2021
QEYSSAT mission
DOE: Quantum
internet blueprint
EuroQCI
Quantum
Comunications Hub
Space+terrestrial Q
KD net, MICIUS
© 2022 ADVA. All rights reserved.
13
Operators are taking action …
© 2022 ADVA. All rights reserved.
14
Protecting networks against tomorrow‘s threats, today
… so do we!
© 2022 ADVA. All rights reserved.
15
There’s more … joint communication and sensing
© 2021 ADVA. All rights reserved. Confidential.
15
Protect communication infrastructure against failures, attacks and natural disasters
Photo: Sebastian Schmitt/dpa
Photo: dpa
Optical JC&S*:
Phase-sensitive OTDR for
infrastructure monitoring
*Joint communicaton & sensing
Photo: Sebastian Schmitt/dpa
© 2022 ADVA. All rights reserved.
16
• Quantum-resistant approaches needed for long-term security of data
• Technologies: PQC (must-have) and QKD (nice-to-have)
• Crypto-agility for future updates to reflect advances in technology
• Highly funded (public incl. pre-commercial public procurement)
• First commercial products and installations
Challenges:
• Security proofs, atandards & certifications
• QKD robustness, performance, stability … need to improve!
• QKD costs – Quantum-PICs, RNGs
• QKD – Trusted Nodes vs Repeater?
The quantum age – secure transport networks
ADVA IC-TROSA
Thank you
IMPORTANT NOTICE
ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation,
direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA.
info@adva.com

More Related Content

PDF
Quantum threat: How to protect your optical network
PDF
ePRTC in data centers – GNSS backup as a service (GBaaS)
PPTX
quantumcrypto
PDF
Optical timing channel (OTC): Delivering sub-50ns over long-distance commerci...
PPT
Quantum cryptography a modern cryptographic security
PDF
Achieving resilient and assured PNT in secure information networks
PDF
IPsec for IMS
PPTX
Sangoma SS7 Gateway Training
Quantum threat: How to protect your optical network
ePRTC in data centers – GNSS backup as a service (GBaaS)
quantumcrypto
Optical timing channel (OTC): Delivering sub-50ns over long-distance commerci...
Quantum cryptography a modern cryptographic security
Achieving resilient and assured PNT in secure information networks
IPsec for IMS
Sangoma SS7 Gateway Training

What's hot (20)

PPTX
How to Quantum-Secure Optical Networks
PDF
Timing and synchronization for 5G over optical networks
PDF
GSMA-VOLTE
PPTX
PPTX
Quantum Cryptography
PPTX
Quantum Cryptography
PDF
Metro Ethernet Concepts
PPTX
5gc call flow
PDF
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
PDF
In-service synchronization monitoring and assurance
PDF
Best practices in synchronizing IP-based packet broadcasting networks
PPT
Cryptography
PPTX
3GPP 5G Technology.pptx
DOC
Quantum cryptography
PPT
quantum cryptography
PDF
Best practices in synchronizing IP-based packet broadcast networks
PDF
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
PPTX
IMS + VoLTE Overview
PDF
The security of quantum cryptography
PDF
Post quantum cryptography
How to Quantum-Secure Optical Networks
Timing and synchronization for 5G over optical networks
GSMA-VOLTE
Quantum Cryptography
Quantum Cryptography
Metro Ethernet Concepts
5gc call flow
Cisco Live! :: Carrier Ethernet 2.0 :: BRKSPG-2720 | Las Vegas July/2016
In-service synchronization monitoring and assurance
Best practices in synchronizing IP-based packet broadcasting networks
Cryptography
3GPP 5G Technology.pptx
Quantum cryptography
quantum cryptography
Best practices in synchronizing IP-based packet broadcast networks
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
IMS + VoLTE Overview
The security of quantum cryptography
Post quantum cryptography
Ad

Similar to The quantum age - secure transport networks (20)

PDF
Quantum-safe data center interconnects
PPTX
ADVA launches world’s first commercial optical transport solution with post-q...
PDF
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
PDF
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
PDF
McKinsey_Quantum-communication-trends-and-outlook.pdf
PDF
Exploring Quantum Cryptography: Next-Generation Security Protocols
PDF
Hao_Qin_Presentation-秦博士.pdf
PPTX
Quantum Cryptography & Key Distribution.pptx
PDF
European quantum computing roadmap uploaded by Skip Sanzeri
PDF
(SACON) M T Karunakaran  - Quantum safe Networks
PDF
20201111 kuppinger-qsn-final
PDF
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
PPTX
Quantum Communication Market: Securing the Future of Data Transmission
PPTX
Network Security
PDF
Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key Di...
PPTX
Quantum Safety in Certified Cryptographic Modules
PPT
Quantum crypto
PPTX
Cryptopresentationfinal
PDF
The Quantum Era & Quantum Key Distribution
PPTX
Quantum Communication: A Secure Framework for Future Data Transmission
Quantum-safe data center interconnects
ADVA launches world’s first commercial optical transport solution with post-q...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
McKinsey_Quantum-communication-trends-and-outlook.pdf
Exploring Quantum Cryptography: Next-Generation Security Protocols
Hao_Qin_Presentation-秦博士.pdf
Quantum Cryptography & Key Distribution.pptx
European quantum computing roadmap uploaded by Skip Sanzeri
(SACON) M T Karunakaran  - Quantum safe Networks
20201111 kuppinger-qsn-final
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
Quantum Communication Market: Securing the Future of Data Transmission
Network Security
Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key Di...
Quantum Safety in Certified Cryptographic Modules
Quantum crypto
Cryptopresentationfinal
The Quantum Era & Quantum Key Distribution
Quantum Communication: A Secure Framework for Future Data Transmission
Ad

More from ADVA (20)

PDF
Industrial optically pumped cesium beam clock
PDF
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
PDF
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
PDF
Addressing PNT threats in critical defense infrastructure
PDF
Precise and assured timing for enterprise networks
PDF
Introducing Ensemble Cloudlet for on-premises cloud demand
PDF
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
PDF
Sync on TAP - Syncing infrastructure with software
PDF
Meet stringent latency demands with time-sensitive networking
PDF
Making networks secure with multi-layer encryption
PDF
Optical networks and the ecodesign tradeoff between climate change mitigation...
PDF
Trends in next-generation data center interconnects (DCI)
PPTX
Open optical edge connecting mobile access networks
PDF
Introducing Adva Network Security – a trusted German anchor
PDF
Meet the industry's first pluggable 10G demarcation device
PDF
Introducing ADVA AccessWave25™
PDF
10G edge technology for outdoor environments
PDF
From leased lines to optical spectrum services
PDF
The coherent optical edge
PDF
Get your timing right for 5G OpenRAN!
Industrial optically pumped cesium beam clock
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Addressing PNT threats in critical defense infrastructure
Precise and assured timing for enterprise networks
Introducing Ensemble Cloudlet for on-premises cloud demand
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
Sync on TAP - Syncing infrastructure with software
Meet stringent latency demands with time-sensitive networking
Making networks secure with multi-layer encryption
Optical networks and the ecodesign tradeoff between climate change mitigation...
Trends in next-generation data center interconnects (DCI)
Open optical edge connecting mobile access networks
Introducing Adva Network Security – a trusted German anchor
Meet the industry's first pluggable 10G demarcation device
Introducing ADVA AccessWave25™
10G edge technology for outdoor environments
From leased lines to optical spectrum services
The coherent optical edge
Get your timing right for 5G OpenRAN!

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Programs and apps: productivity, graphics, security and other tools
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf

The quantum age - secure transport networks

  • 1. The quantum age – secure transport networks June, 22nd 2022 – NAMEX Workshop Christoph Glingener
  • 2. 2 © 2022 ADVA. All rights reserved. Confidential. Recommend to prepare for quantum era Why care about future quantum computers? The quantum computer threat
  • 3. © 2022 ADVA. All rights reserved. 3 Public key cryptography is vulnerable Quantum computers break present crypto systems AES-GCM-256 AES-GCM-256 Secret Diffie- Hellman Diffie- Hellman Session key Key exchange Secret Plaintext Ciphertext Plaintext Alice Bob Session key
  • 4. © 2022 ADVA. All rights reserved. 4 • Provides computational security • Is based on hardness of math problems • Works on any communication channel • Requires endpoint protocol access only • Is independent of optical layer • Provides information-theoretic security • Is based on laws of quantum physics • Needs optical fiber or free-space channel • Requires access to physical infrastructure • Depends on optical link performance Quantum-key distribution (QKD) Post-quantum cryptography (PQC) Standardization activities are taking place for both options How can we make the key exchange quantum-safe?
  • 5. © 2022 ADVA. All rights reserved. 5 Code- and lattice-based asymmetrical encryption algorithms Option 1 (must-have): post-quatum cryptography Alice Bob Session key Session key Quantum-safe key exchange protocol Quantum-safe key exchange protocol Key exchange NIST, July 2020: Candidates for standardization of quantum-safe protocols are Classic McEliece, CRYSTALS-Kyber, NTRU, SABER BSI, August 2020: Recommends hybrid algorithms, Classic McEliece among others
  • 6. © 2022 ADVA. All rights reserved. 6 Quantum key distribution (QKD) protocol distills a secure key out of a quantum signal Option 2 (nice-to-have): quantum key distribution Alice Bob recognizes the observation Session key Session key Quantum channel +Service channel
  • 7. © 2022 ADVA. All rights reserved. 7 Hybrid key exchange Plaintext Plaintext Alice Bob AES encryption AES encryption Secret Diffie- Hellman Diffie- Hellman Session key Key exchange Secret Ciphertext Session key PQC PQC Key exchange QKD QKD Key exchange Combining key exchange schemes to provide robust quantum-safe solutions
  • 8. © 2022 ADVA. All rights reserved. 8 Practical implementation Network element A QKD Tx Network element B QKD Rx Key delivery API QKD Rx QKD Tx Trusted node 1..N (oder Repeater) KMS KMS KMS Auxiliary channel Quantum channel Management channel AES-encrypted data channel(s) In-line amplifier 1..N (optional) Additional fiber* Grey or DWDM link Fiber pair *Co-propagation option with data channels Trusted site A Trusted site B AES: Advanced encryption standard KMS: Key management system PQC PQC QKD Repeater
  • 9. © 2022 ADVA. All rights reserved. 9 Practical implementation 2 DWDM System Optical layer 10G/100G/200G/400G… Quantum Channel Service Channel QKD Alice Ethernet device QKD Bob Ethernet layer ETSI GS014 REST API ETSI GS014 REST API 1G/10G OTNsec MACsec Quantum key delivery API Quantum key delivery API
  • 10. © 2022 ADVA. All rights reserved. 10 Multiple candidates • Code-based (e.g. McEliece) • Latice-based (e.g. FrodoKEM) • Etc. BSI • TR-02102-1 (hybrid with McEliece or FrodoKEM) NIST • SP800-65C Rev2, hybrid with PQC • Ongoing PQC project / challenge Quantum Key Distribution Post Quantum Cryptography Standards and certifications necessary! Quantum communication technologies CV DV Protocol CV- QPSK Decoy BB84 BBM92 (Ent.) Twin Field Key rate 1/ 1/ 1/ 1/√ Complexity side channels ecurity Topology p2p p2p p2mp p2mp Fiber Free space Costs
  • 11. © 2022 ADVA. All rights reserved. 11 Safety based on known cryptographic principles No Distance limitation No Need for another fiber Computational complexity Standardization in progress Safety based on quantum-physics Impossible to eavesdrop Distance limitation Need for additional fiber Integration with existing networks Standardization in progress Quantum Key Distribution Post Quantum Cryptography Quantum communication – lessons learned
  • 12. © 2022 ADVA. All rights reserved. 12 Quantum communication initiatives • Germany (Research) • R: QuNET, QR.X, QUBE, … • E: DemoQuanDT, DE-QOR, … Public Funding QT (22 Mrd$ globally, 3,1 Mrd$ in D) Yole, 2021 QEYSSAT mission DOE: Quantum internet blueprint EuroQCI Quantum Comunications Hub Space+terrestrial Q KD net, MICIUS
  • 13. © 2022 ADVA. All rights reserved. 13 Operators are taking action …
  • 14. © 2022 ADVA. All rights reserved. 14 Protecting networks against tomorrow‘s threats, today … so do we!
  • 15. © 2022 ADVA. All rights reserved. 15 There’s more … joint communication and sensing © 2021 ADVA. All rights reserved. Confidential. 15 Protect communication infrastructure against failures, attacks and natural disasters Photo: Sebastian Schmitt/dpa Photo: dpa Optical JC&S*: Phase-sensitive OTDR for infrastructure monitoring *Joint communicaton & sensing Photo: Sebastian Schmitt/dpa
  • 16. © 2022 ADVA. All rights reserved. 16 • Quantum-resistant approaches needed for long-term security of data • Technologies: PQC (must-have) and QKD (nice-to-have) • Crypto-agility for future updates to reflect advances in technology • Highly funded (public incl. pre-commercial public procurement) • First commercial products and installations Challenges: • Security proofs, atandards & certifications • QKD robustness, performance, stability … need to improve! • QKD costs – Quantum-PICs, RNGs • QKD – Trusted Nodes vs Repeater? The quantum age – secure transport networks ADVA IC-TROSA
  • 17. Thank you IMPORTANT NOTICE ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA. info@adva.com