{"id":401784,"date":"2024-10-20T04:58:02","date_gmt":"2024-10-20T04:58:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30400657-dc-2022\/"},"modified":"2024-10-26T08:47:50","modified_gmt":"2024-10-26T08:47:50","slug":"bsi-22-30400657-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30400657-dc-2022\/","title":{"rendered":"BSI 22\/30400657 DC 2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | 30400657-NC.pdf <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | ISO_IEC DIS 23837-1 ed.1 – id.77097 Enquiry PDF (en).pdf <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Theoretical aspects of QKD protocols 5.1 General 5.2 Principle of QKD protocols <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.3 Classification of QKD protocols <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.4 Architecture of QKD protocols <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6 Implementation modules of QKD protocols 6.1 General <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.2 External interfaces of QKD modules 6.2.1 General 6.2.2 The quantum channel interface <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.2.3 The control and management interface 6.2.4 The key management interface 6.3 Internal structure of QKD modules 6.3.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.3.2 Components in the QKD transmitter module <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3.3 Components in the QKD receiver module 6.4 TOE scope for QKD modules 6.4.1 General 6.4.2 Definition of the TSF <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.4.3 Definition of the TOE <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.5 General working flow of QKD modules 7 Security problems analysis of QKD modules 7.1 General 7.2 Security assumptions <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.3 Assets analysis 7.4 Threats to conventional network components 7.4.1 Overview <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.4.2 Threats from the perspective of network-based classical attacks <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.5 Threats to quantum optical components 7.5.1 Overview 7.5.2 Threats exploiting optical source flaws 7.5.3 Threats exploiting optical detection vulnerabilities 7.5.4 Threats exploiting parameter adjustment vulnerabilities <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8 Extended security functional components for QKD implementation 8.1 General 8.2 Extended security functional components to Class FTP: Trusted path\/channels 8.2.1 Quantum key distribution (FTP_QKD) <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 8.2.2 User notes <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 9 Security functional requirements for QKD modules 9.1 General <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 9.2 General requirements for conventional network components in QKD modules 9.2.1 FAU_GEN.1 Audit data generation <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 9.2.2 FCS_CKM.6 Timing and event of cryptographic key destruction <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 9.2.3 FCS_COP.1 Cryptographic operation <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 9.2.4 FCS_RNG.1 Random number generation 9.2.5 FDP_ACC.1 Subset access control <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 9.2.6 FDP_ACF.1 Security attribute-based access control 9.2.7 FDP_IRC.1 Information retention control <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 9.2.8 FDP_ITC.1 Import of user data without security attributes 9.2.9 FIA_UAU.2 User authentication before any action <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 9.2.10 FIA_UID.1 Timing of identification 9.2.11 FMT_LIM.1 Limited capabilities 9.2.12 FMT_LIM.2 Limited availability 9.2.13 FMT_MSA.1 Management of security attributes <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 9.2.14 FMT_MTD.1 Management of TSF data 9.2.15 FMT_SMF.1 Specification of Management Functions 9.2.16 FMT_SMR.1 Security roles <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 9.2.17 FPT_EMS.1\/Convention Emanation of TSF and User data <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 9.2.18 FPT_FLS.1 Failure with preservation of secure state 9.2.19 FPT_ITC.1 Inter-TSF confidentiality during transmission 9.2.20 FPT_ITI.1 Inter-TSF detection of modification 9.2.21 FPT_RCV.2 Automated recovery <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 9.2.22 FPT_TST.1 TSF self-testing 9.3 General requirements for the implementation of QKD protocols 9.3.1 General <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 9.3.2 FTP_QKD.1 QKD protocol and raw data generation <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 9.3.3 FTP_QKD.2 QKD post-processing 9.4 General requirements for quantum optical components of QKD modules 9.4.1 General 9.4.2 FPT_EMS.1\/Quantum Emanation of TSF and User data <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 9.4.3 FPT_PHP.3 Resistance to physical attack <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 10 Conformance statement 10.1 General <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 10.2 Conformance statement specific to the security problem definition 10.3 Conformance statement specific to the security functional requirements <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Annex\u20acA (informative) Guidance for developing protection profiles for QKD modules <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 23837-1. Information technology security techniques. Security requirements, test and evaluation methods for quantum key distribution – Requirements<\/b><\/p>\n |