Shopping Cart

No products in the cart.

BSI 22/30400657 DC 2022

$13.70

BS ISO/IEC 23837-1. Information technology security techniques. Security requirements, test and evaluation methods for quantum key distribution – Requirements

Published By Publication Date Number of Pages
BSI 2022 59
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
1 30400657-NC.pdf
3 ISO_IEC DIS 23837-1 ed.1 – id.77097 Enquiry PDF (en).pdf
7 Foreword
8 Introduction
9 1 Scope
2 Normative references
3 Terms and definitions
13 4 Abbreviated terms
14 5 Theoretical aspects of QKD protocols
5.1 General
5.2 Principle of QKD protocols
15 5.3 Classification of QKD protocols
16 5.4 Architecture of QKD protocols
18 6 Implementation modules of QKD protocols
6.1 General
19 6.2 External interfaces of QKD modules
6.2.1 General
6.2.2 The quantum channel interface
20 6.2.3 The control and management interface
6.2.4 The key management interface
6.3 Internal structure of QKD modules
6.3.1 General
21 6.3.2 Components in the QKD transmitter module
23 6.3.3 Components in the QKD receiver module
6.4 TOE scope for QKD modules
6.4.1 General
6.4.2 Definition of the TSF
24 6.4.3 Definition of the TOE
25 6.5 General working flow of QKD modules
7 Security problems analysis of QKD modules
7.1 General
7.2 Security assumptions
27 7.3 Assets analysis
7.4 Threats to conventional network components
7.4.1 Overview
28 7.4.2 Threats from the perspective of network-based classical attacks
30 7.5 Threats to quantum optical components
7.5.1 Overview
7.5.2 Threats exploiting optical source flaws
7.5.3 Threats exploiting optical detection vulnerabilities
7.5.4 Threats exploiting parameter adjustment vulnerabilities
31 8 Extended security functional components for QKD implementation
8.1 General
8.2 Extended security functional components to Class FTP: Trusted path/channels
8.2.1 Quantum key distribution (FTP_QKD)
34 8.2.2 User notes
37 9 Security functional requirements for QKD modules
9.1 General
38 9.2 General requirements for conventional network components in QKD modules
9.2.1 FAU_GEN.1 Audit data generation
39 9.2.2 FCS_CKM.6 Timing and event of cryptographic key destruction
40 9.2.3 FCS_COP.1 Cryptographic operation
41 9.2.4 FCS_RNG.1 Random number generation
9.2.5 FDP_ACC.1 Subset access control
42 9.2.6 FDP_ACF.1 Security attribute-based access control
9.2.7 FDP_IRC.1 Information retention control
43 9.2.8 FDP_ITC.1 Import of user data without security attributes
9.2.9 FIA_UAU.2 User authentication before any action
44 9.2.10 FIA_UID.1 Timing of identification
9.2.11 FMT_LIM.1 Limited capabilities
9.2.12 FMT_LIM.2 Limited availability
9.2.13 FMT_MSA.1 Management of security attributes
45 9.2.14 FMT_MTD.1 Management of TSF data
9.2.15 FMT_SMF.1 Specification of Management Functions
9.2.16 FMT_SMR.1 Security roles
46 9.2.17 FPT_EMS.1/Convention Emanation of TSF and User data
47 9.2.18 FPT_FLS.1 Failure with preservation of secure state
9.2.19 FPT_ITC.1 Inter-TSF confidentiality during transmission
9.2.20 FPT_ITI.1 Inter-TSF detection of modification
9.2.21 FPT_RCV.2 Automated recovery
49 9.2.22 FPT_TST.1 TSF self-testing
9.3 General requirements for the implementation of QKD protocols
9.3.1 General
50 9.3.2 FTP_QKD.1 QKD protocol and raw data generation
51 9.3.3 FTP_QKD.2 QKD post-processing
9.4 General requirements for quantum optical components of QKD modules
9.4.1 General
9.4.2 FPT_EMS.1/Quantum Emanation of TSF and User data
52 9.4.3 FPT_PHP.3 Resistance to physical attack
53 10 Conformance statement
10.1 General
54 10.2 Conformance statement specific to the security problem definition
10.3 Conformance statement specific to the security functional requirements
56 Annex€A (informative) Guidance for developing protection profiles for QKD modules
59 Bibliography
BSI 22/30400657 DC 2022
$13.70