Towards quantum‐secure software defined networks

Abstract The evolution of quantum computers is considered a serious threat to public‐key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This is indeed a big concern for security of the Internet and other data communication and storage systems. The reason is that public‐key schemes are the basis in the...

Olles dieđut

Bibliográfalaš dieđut
Váldodahkkit: Mohammad Reza Nosouhi, Keshav Sood, Vinay Chamola, Jongkil Jay Jeong, Anuroop Gaddam
Materiálatiipa: Artihkal
Giella:English
Almmustuhtton: Wiley 2024-03-01
Ráidu:IET Quantum Communication
Fáttát:
Liŋkkat:https://doi.org/10.1049/qtc2.12073
_version_ 1827337832983691264
author Mohammad Reza Nosouhi
Keshav Sood
Vinay Chamola
Jongkil Jay Jeong
Anuroop Gaddam
author_facet Mohammad Reza Nosouhi
Keshav Sood
Vinay Chamola
Jongkil Jay Jeong
Anuroop Gaddam
author_sort Mohammad Reza Nosouhi
collection DOAJ
description Abstract The evolution of quantum computers is considered a serious threat to public‐key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This is indeed a big concern for security of the Internet and other data communication and storage systems. The reason is that public‐key schemes are the basis in the generation of shared symmetric keys that are used to perform data encryption/decryption in communication and data transfer protocols. One possible approach to address this issue is to use Quantum Key Distribution (QKD) (instead of public‐key schemes) for the ultra‐secure generation of symmetric keys. QKD is a physical layer technology that allows two parties (equipped with optical communication interfaces) to generate secure random keys over a quantum channel that is immune to eavesdropping threats. The keys are then used by symmetric encryption schemes (e.g. AES) to encrypt data over classical channels. This allows us to have data encryption/decryption without needing a public‐key scheme. However, due to its inherent characteristics, the implementation of QKD has mostly been considered in particular contexts only (e.g. backhaul networks, point‐to‐point connections, optical networks, etc.). This indeed limits the utility of QKD technology to only some particular applications while it has the potential to be used in a wide range of used cases. Motivated by this (increasing the usability of QKD technology), in this study, the authors propose a model that enables SDN‐based networks to utilise QKD technology and provide QKD security service (i.e., random key generation service) to network applications and security protocols in a practical and efficient way. In the proposed approach, secret keys are generated based on the distribution of quantum entanglement between QKD nodes deployed in the network. The significant characteristic of our proposed model is that it does not rely on quantum repeaters to operate. This also improves the efficiency of the employed QKD mechanisms in terms of the key generation rate.
first_indexed 2024-03-07T19:02:50Z
format Article
id doaj.art-e17cd3a70a804b0da2f7d604aefc100d
institution Directory Open Access Journal
issn 2632-8925
language English
last_indexed 2024-03-07T19:02:50Z
publishDate 2024-03-01
publisher Wiley
record_format Article
series IET Quantum Communication
spelling doaj.art-e17cd3a70a804b0da2f7d604aefc100d2024-03-01T12:07:40ZengWileyIET Quantum Communication2632-89252024-03-0151667110.1049/qtc2.12073Towards quantum‐secure software defined networksMohammad Reza Nosouhi0Keshav Sood1Vinay Chamola2Jongkil Jay Jeong3Anuroop Gaddam4Centre for Cyber Resilience and Trust (CREST) School of Information Technology Deakin University Burwood AustraliaCentre for Cyber Resilience and Trust (CREST) School of Information Technology Deakin University Burwood AustraliaEEE Department BITS Pilani Rajasthan IndiaCentre for Cyber Resilience and Trust (CREST) School of Information Technology Deakin University Burwood AustraliaSchool of Information Technology Deakin University Burwood AustraliaAbstract The evolution of quantum computers is considered a serious threat to public‐key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This is indeed a big concern for security of the Internet and other data communication and storage systems. The reason is that public‐key schemes are the basis in the generation of shared symmetric keys that are used to perform data encryption/decryption in communication and data transfer protocols. One possible approach to address this issue is to use Quantum Key Distribution (QKD) (instead of public‐key schemes) for the ultra‐secure generation of symmetric keys. QKD is a physical layer technology that allows two parties (equipped with optical communication interfaces) to generate secure random keys over a quantum channel that is immune to eavesdropping threats. The keys are then used by symmetric encryption schemes (e.g. AES) to encrypt data over classical channels. This allows us to have data encryption/decryption without needing a public‐key scheme. However, due to its inherent characteristics, the implementation of QKD has mostly been considered in particular contexts only (e.g. backhaul networks, point‐to‐point connections, optical networks, etc.). This indeed limits the utility of QKD technology to only some particular applications while it has the potential to be used in a wide range of used cases. Motivated by this (increasing the usability of QKD technology), in this study, the authors propose a model that enables SDN‐based networks to utilise QKD technology and provide QKD security service (i.e., random key generation service) to network applications and security protocols in a practical and efficient way. In the proposed approach, secret keys are generated based on the distribution of quantum entanglement between QKD nodes deployed in the network. The significant characteristic of our proposed model is that it does not rely on quantum repeaters to operate. This also improves the efficiency of the employed QKD mechanisms in terms of the key generation rate.https://doi.org/10.1049/qtc2.12073public key cryptographyquantum communicationquantum computingquantum cryptographyquantum entanglementquantum information
spellingShingle Mohammad Reza Nosouhi
Keshav Sood
Vinay Chamola
Jongkil Jay Jeong
Anuroop Gaddam
Towards quantum‐secure software defined networks
IET Quantum Communication
public key cryptography
quantum communication
quantum computing
quantum cryptography
quantum entanglement
quantum information
title Towards quantum‐secure software defined networks
title_full Towards quantum‐secure software defined networks
title_fullStr Towards quantum‐secure software defined networks
title_full_unstemmed Towards quantum‐secure software defined networks
title_short Towards quantum‐secure software defined networks
title_sort towards quantum secure software defined networks
topic public key cryptography
quantum communication
quantum computing
quantum cryptography
quantum entanglement
quantum information
url https://doi.org/10.1049/qtc2.12073
work_keys_str_mv AT mohammadrezanosouhi towardsquantumsecuresoftwaredefinednetworks
AT keshavsood towardsquantumsecuresoftwaredefinednetworks
AT vinaychamola towardsquantumsecuresoftwaredefinednetworks
AT jongkiljayjeong towardsquantumsecuresoftwaredefinednetworks
AT anuroopgaddam towardsquantumsecuresoftwaredefinednetworks