12
Next steps in QKD from a network operator perspective Quantum technologies in Spain. The future is now Victor Lopez - gCTIO 08.05.2019

Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

Next steps in QKD from a network operator perspective Quantum technologies in Spain. The future is now

Victor Lopez - gCTIO 08.05.2019

Page 2: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

2

Telcos have different network scenarios…

Submarine and satellite Backbone Metro Access

…, technologies…

… and planes

Data Plane

Control Plane

Management Plane

Page 3: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

3

Quantum Key Distribution system

Bob Alice

Encrypt Decrypt

Key exchange

Message Exchange

Message encryption

Eve

QKD System

QKD System

Public Authenticated/integrity Channel

Quantum Channel

Data Channel

Ingredients: • Qubit transmitter: Alice • Single qubit receiver: Bob • Quantum channel (capable of

transmitting qubits from Alice to Bob)

• Public authenticated channel Main steps: • Raw key exchange (using the

quantum channel) – Qubit transmission – Sifting (basis reconciliation)

• Key post-processing (using the public authenticated channel)

– Information reconciliation – Error verification – Privacy amplification

Page 4: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

4

Limited reach, point to point.

Δλ = 0.2~0.8 nm (DWDM) Δλ = 3~20 nm (CWDM)

Comm. laser

Single photon (not to scale)

extremely weak signals.

Noise in the fibre: Raman

Raman backscattering of a signal at 1549 nm [ DOI: 10.1063/1.1842862]

Single Photon (approx. scale)

It is a delicate technology.

R. Doisneau

• Difficult to detect. • Absorpions • Masked by the noise

150 nm

Quantum communications and networks, why is it difficult?

Page 5: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

5

Quantum Cryptography with Continuous Variables: CV-QKD

• Continuous Variables based on the quadratures of the electric field of an electromagnetic wave o Also subject to the Heisenberg indeterminacy principle.

Advantages

• Lower key rate than DV-QKD • Can be higher at low distance/losses

• Tolerate less losses • Less reach/tolerant to bad channels

• Computationally heavy postprocessing

Disadvantages

• Homodyne/heterodyne detection • Forget about bulky/expensive/cold

single photon detectors. • Better co-propagation with classical

signals (works as noise filter) • Piggybacking on standard telco

technology. • Better industrialization possibilities • Better miniaturization possibilities • Cheaper/better potential to take over

the market

Page 6: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

6

Quantum Key Distribution can help operator…

… to improve security solutions in many network aspects

Customer

Access

Transport

Virtualization

Operations

Net

wor

k Ev

olut

ion

Axes

Page 7: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

7

Software Defined QKD Networks

Software Defined QKD Node Control plane protocols and interfaces within a transport network

Operations

• Software Defined Networks (SDN) enables the automation of service provisioning within network operator infrastructures.

• With the dynamic network requirements, operators can not anymore deploy their services based on manual intervention or using proprietary vendor solutions.

• Standard programmability is key in the next-generation network infrastructure and any new technology must be integrated with this paradigm.

Page 8: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

8

Network management secured with QKD

Planes in operator’s network Control plane protocols and interfaces within a transport network

• Management and control plane become critical in virtualization environments.

• Security mechanisms are meant to be implemented in the network management plane, to securely handle any centralized operation, including the communications channels between NFV platforms, the communication between an SDN controller and a network device, etc.

Virtualization

Page 9: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

9

End-to-end quantum-encrypted connections

Quantum security embedded in network elements Quantum cryptography for IPSec via SDN

• Aggregate up to cyphered OTN channels plus the quantum channel

Transport

OTN OTN

• SDN controller integrates the management and generation of keys (based on a QKD infrastructure) used by IPsec.

Page 10: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

10

Enhance last mile services ©

Access

Improve security in Business Offers Point to Point connections for local business access

• FTTH (Fiber To The Home) deployments are ongoing based on Passive Optical Network (PON) equipment and the number of homes connected is increasing.

• In GPON systems, an encryption mechanism is integrated and it is based on AES-128 encryption.

OLT

ONU 1

ONU N

Customer

• Point to point connections encompass many business offers.

• This architecture allows business customers to benefit from a dedicated fiber resource that will not be shared with another customer.

• These customers are generally very demanding for a connection with a high security level.

• QKD can thus be a way to offer them a more secured transport resource.

Central Office

Customer 1

Customer N

Page 11: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

11

Quantum Key Distribution Scenarios

Customer

Access

Transport

Virtualization

Operations

Net

wor

k Ev

olut

ion

Axes

PtP connections for local business access Passive Optical Networks

End-to-end quantum-encrypted connections

Network management secured with QKD Software Defined QKD Networks

Page 12: Next steps in QKD from a network operator perspective · Quantum Key Distribution Scenarios . Customer Access Transport Virtualization Operations . Network Evolution Axes . PtP connections

THANK YOU !!! This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 820466 This text reflects only the author's view and the Commission is not responsible for any use that may be made of the information it contains.

Cartoon from NIST