quantum key distribution network for multiple...

22
Quantum Key Distribution Network for Multiple Applications AQIS2016 A. Tajima 1 , T. Kondoh 1 , T. Ochi 1 , M. Fujiwara 2 , K. Yoshino 1 , H. Iizuka 1 , T. Sakamoto 1 , A. Tomita 3 , E. Shimamura 1 , S. Asami 1 and M. Sasaki 2 1 NEC Corporation 2 National Institute of Information and Communications Technology 3 Hokkaido University [NEC Group Internal Use Only]

Upload: others

Post on 29-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

Quantum Key Distribution Network for Multiple Applications

AQIS2016

A. Tajima1, T. Kondoh1, T. Ochi1, M. Fujiwara2,

K. Yoshino1, H. Iizuka1, T. Sakamoto1,

A. Tomita3, E. Shimamura1, S. Asami1

and M. Sasaki2

1 NEC Corporation

2 National Institute of Information and Communications Technology

3 Hokkaido University

[NEC Group Internal Use Only]

Page 2: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum
Page 3: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

Outline

1. Introduction

2. Quantum Key Distribution (QKD) Network

• Requirements

• QKD Platform (QKD PF)

3. Robust QKD System

4. Introductory Video (6 min.)

5. Applications on the QKD PF

• QKD-AES Hybrid System

• Secure Smartphone

6. Summary

Page 4: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

4 © NEC Corporation 2015 NEC Group Internal Use Only4 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Introduction

▌Eavesdropping optical channel is reality.National secret communication is at risk for tapping and decoding.

The Snowden files;

In the near future, critical information of individuals may also be at risk.

•Banking information

• Information about the human genome

▌For encrypted communication secret crypto-keysharing between remote parties is large issue.By modern cryptography (guaranteed by numerical complexity)

• Public-key crypto, Symmetric-key crypto

By hand delivery (based on trust in human).

Also, it is difficult to detect eavesdroppers.

▌Ultimately secure key distribution technique is needed.

http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa

GCHQ: Government Communications Headquarters

Page 5: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

5 © NEC Corporation 2015 NEC Group Internal Use Only5 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

▌Acronis press releaseAcronics announced partnership with IDQ to apply quantum-safe

encryption to cloud system.

▌NIKKEI ASIAN REVIEWAlibaba group and Chinese Academy of Science will collaborate on QKD.

QKD can be powerful option

http://www.acronis.com/en-us/pr/2015/09/28-12-24.html

http://asia.nikkei.com/Business/Companies/Alibaba-Chinese-academy-team-on-quantum-cryptography

Page 6: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

6 © NEC Corporation 2015 NEC Group Internal Use Only6 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

▌What is QKD?Distribute crypto-key using single photons.

Any eavesdropping attack can be detected.

We can share the secure key. (Point to point link)

▌Typical SystemBlock diagram

Alice

110101101110110101101101101010110100110101101110110101101101101010110100K: K:

Indivisible → No tapping

No cloning theorem → No copying

Photon

Bob10110100

Quantum Key Distribution (QKD)

Final secure key

detectedrandom numbers

randomnumbers

Photon

SourceEncoder Decoder

Key Distillation Block Key Distillation Block

Photon

signal

basis,

parity, etcFinal secure key

Photon

detectors

Photon Transmission block

Page 7: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

7 © NEC Corporation 2015 NEC Group Internal Use Only7 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Tokyo QKD Network in 2010

▌Tokyo QKD Network in2010

QKD network with 6 nodes.

Several kinds of QKD link.

•NEC, TREL, NTT, All Viena, IDQ, Mitsubishi

▌Secure TV conferencewas demonstrated.

Encrypted by one-time-pad(OTP) with quantum-key.

Point to point (PTP) communication.

Dedicated to the applications

To expand applications new network architecture, management and functions are needed.

Page 8: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

8 © NEC Corporation 2015 NEC Group Internal Use Only8 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Requirements for a Secure Network with QKD

1. Application independent secure key supply.1. High-speed secure PTP communication

•Between a data center and a remote backup center

2. Multipoint-to-multipoint (MPTMP) communications

•Secure smartphone communication between multiple terminals

2. Crypto-key management that corresponds to various types of QKD.

1. BB84

•NEC, Toshiba

2. CV-QKD

•Gakushuin Univ.

3. RR-QKD, etc.

3. Support a wide variety of network topologies.1. Point to point

2. Ring, Mesh, etc.

Page 9: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

9 © NEC Corporation 2015 NEC Group Internal Use Only9 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Quantum Key Distribution Platform (QKD PF)

▌QKD PF: A QKD network with enhanced application interfaces.

▌Three layer architecture.

1. Key supply layer

2. Key management layer

3. Quantum layer

▌“Key Supplier” and “KeyConsumer” areseparated.

KSA: Key supply agent

KMA: Key management agent

KMS: Key management server

QKD

Site A

Site B

Site C

Site D

Site E

KMAKMS

KSA

CV-QKD

Key supply layer

Key management layer

Quantum layer

BB84

Application layer

QKD PF

Key Supplier

Key Consumer

Page 10: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

10 © NEC Corporation 2015 NEC Group Internal Use Only10 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Key Consumers

Functions of Each Layer with Key Format

▌Key supply layerSupply the key to the consumers

corresponding to the requests.

▌Key management layerStore, relay (->see next slide), manage

Performance monitor (error rate, key amount)

Supply the key to the key supply layer.

▌Quantum layerEach QKD link generates quantum-keys

in its own way. Sequence

No.Key Size

KMAKey ID

Key Gen.Time

QKD Name“B”

Opposite QKD“C”

KeySize

Relay Source“B”

Relay Destination“A”

Relay Time

Relay Information

Distribution Time

KSAKey ID

Source“A”

Destination“C”

ApplicationID

Key Size

Pushup Key

Key Supply

Key Request

Key Supply

Key Request

Quantum key

Page 11: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

11 © NEC Corporation 2015 NEC Group Internal Use Only11 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Key Encapsulation Relay

▌Enables key sharing on a various network topologies.

Quantum

layer

Key

management

layer

Key consumer

Node A Node B Node C

+

Key supply

layer

= + =

Common keys between thenodes w/o direct QKD link

QKD Link 1 QKD Link 2

Page 12: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

12 © NEC Corporation 2015 NEC Group Internal Use Only12 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

The Updated Tokyo QKD Network

▌The Tokyo QKD Network was updated and has been operated on the network architecture.

URL: http://www.tokyoqkd.jp/

Page 13: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

13 © NEC Corporation 2015 NEC Group Internal Use Only13 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Robust QKD System

▌Key technologyPLC* optical interferometer (NEC’s original)

•Stable photon transmission without environmental fluctuations.

–Temperature independent.

–Polarization of optical signal independent.

•Mechanical device free

–Without polarization controller

and fiber stretcher.

–Reliable.

–Telecom operator requires high reliability. * PLC: Planar Lightwave Circuit

Mod. ATT.

Alice (Transmitter) Bob (Receiver)

PLC Interferometer

Optical fiber

Stable photon transmission without mechanical device is achieved.

Page 14: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

14 © NEC Corporation 2015 NEC Group Internal Use Only14 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Environmental Fluctuations Independent Operation

NICT Koganei

NEC Fuchu

22 km, 13 dB, (Round trip)

Overhead fiber > 95%

Image of overhead fiber

Source: Google map

QBER [%] Sifted Key Secure Key

2l Total 1.70 483.3 kbps 112.4 kbps

Time [day]0 7 14 21 28 30

(a) l1QBER

Sifted Key Rate

Secure Key Rate

QB

ER

[%

]

0 7 14 21 28 30

(b) l2 QBER

Sifted Key Rate

Secure Key Rate

Ke

y G

en

era

tion

Rate

[kb

ps]

Time [day]

30 days

Ke

y G

en

era

tion

Rate

[kb

ps]0

900

800

700

600

500

400

300

200

100

QB

ER

[%

]

0

0.5

1

1.5

2.5

2

3

K. Yoshino et al., Optics Express, Vol. 21, Issue 25, pp. 31395–31401, 2013.

Polarization variation with time

30 days

Page 15: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

15 © NEC Corporation 2015 NEC Group Internal Use Only15 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Introductory Video

https://www.youtube.com/watch?v=AETUdYLgpYY&feature=youtu.be

Page 16: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

16 © NEC Corporation 2015 NEC Group Internal Use Only16 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Long-term Field Test in “Cyber Security Factory”

▌Cyber Security FactoryCore facility for our counter-

cyber-attack activities

•24/7 network monitoring

•Cyber incident analysis

•Gathering cyber intelligence

▌Deployed QKD systemand carried out long-termfield test“QKD-AES Hybrid System”

•Secure keys are provided for AES encryptor “COMCIPHER” for high-speed transmission.

Environment

•Alice in machine room

•Bob in office area condition

Cyber Security Factory

Page 17: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

17 © NEC Corporation 2015 NEC Group Internal Use Only17 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

21-week Test Results

▌Cyber Security Factory(1l) 21 week

Under the practical environmental condition

Secure key rate: 107.7 kbps (@11.5 dB loss)

Standard deviation: ±8.6%

QBER [%] Sifted key rate Secure key rate

1l 1.79 393.2 kbps 107.7 kbps

2015/8/19 2016/1/13QBER

Sifted keySecure key

Consecutive stable operation for 21 weeks was achieved

Page 18: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

18 © NEC Corporation 2015 NEC Group Internal Use Only18 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Applications on the QKD PF

1. Layer 2 Network EncryptorTechnical issues

• Large capacity communication.

•Consumption of secure key is large.

• Long distance communication.

Approach

• Integration with modern cryptography.

•Key relay to support long distance.

2. Secure smartphoneTechnical issues

• Limited key storage capacity in mobile terminals.

•Support MPTMP communications.

•Authentication of mobile terminals

•Key distribution between any two nodes.

Approach

• Integration with the modern cryptography.

•Authentication with the quantum key.

•Key relay to support MPTMP.

Data Center Backup Center~100 km

Page 19: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

19 © NEC Corporation 2015 NEC Group Internal Use Only19 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

QKD-AES Hybrid System

▌Integration with NEC’s layer 2 network encryptor“COMCIPHER(AES)”Data over Ethernet are encrypted with AES.

AES key is periodical refreshed by the quantum key from the QKD PF.

Key synchronization mechanism between the two terminals is developed.

User siteData center

Network encryptorCOMCIPHER(AES)

QKD Platform

Key Synch.

Continuous operation in Cyber Security Factory was confirmed.

Page 20: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

20 © NEC Corporation 2015 NEC Group Internal Use Only20 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

▌Call sessions are encrypted with AES.

▌Quantum keys are used for authentications and AES symmetrickey deliveries. AES symmetric key is delivered from center server with OTP.

Encrypted Smartphone Application Layer

Key SupplyEquipment

USB

USB

USB

USB

Smartphone

#D

EncryptedSmartphone

#C

Secure Smartphone for Multiuser

Smartphone#A

Smartphone#B

QKD Platform

SIP Server:Unify management

Key distributions from the QKD PF to smartphones and secure communication

between each smartphone was confirmed.

Page 21: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

21 © NEC Corporation 2015 NEC Group Internal Use Only21 © NEC Corporation 2016 AQIS2016 Aug. 28 – Sep. 2, 2016, Taipei, Taiwan

Summary

▌The basic architecture and functions of a QKD network are explained. Quantum Key Distribution Platform.

•3-layer architecture

Robust QKD System integral for QKD network.

• Long-term and highly stable operation was achieved.

Applications on the QKD Platform.

•QKD-AES hybrid system

•Secure smartphone system

▌Secure communication infrastructure with thesetechnologies will be constructed in the near future.

Tokyo QKD Network at present. URL: http://www.tokyoqkd.jp/

Page 22: Quantum Key Distribution Network for Multiple …aqis-conf.org/2016/wp-content/uploads/2015/12/04.QKD...2015/12/04  · [NEC Group Internal Use Only] Outline 1. Introduction 2. Quantum

Thank you for your attention.