{"id":401784,"date":"2024-10-20T04:58:02","date_gmt":"2024-10-20T04:58:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30400657-dc-2022\/"},"modified":"2024-10-26T08:47:50","modified_gmt":"2024-10-26T08:47:50","slug":"bsi-22-30400657-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30400657-dc-2022\/","title":{"rendered":"BSI 22\/30400657 DC 2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\n30400657-NC.pdf <\/td>\n<\/tr>\n
3<\/td>\nISO_IEC DIS 23837-1 ed.1 – id.77097 Enquiry PDF (en).pdf <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
13<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
14<\/td>\n5 Theoretical aspects of QKD protocols
5.1 General
5.2 Principle of QKD protocols <\/td>\n<\/tr>\n
15<\/td>\n5.3 Classification of QKD protocols <\/td>\n<\/tr>\n
16<\/td>\n5.4 Architecture of QKD protocols <\/td>\n<\/tr>\n
18<\/td>\n6 Implementation modules of QKD protocols
6.1 General <\/td>\n<\/tr>\n
19<\/td>\n6.2 External interfaces of QKD modules
6.2.1 General
6.2.2 The quantum channel interface <\/td>\n<\/tr>\n
20<\/td>\n6.2.3 The control and management interface
6.2.4 The key management interface
6.3 Internal structure of QKD modules
6.3.1 General <\/td>\n<\/tr>\n
21<\/td>\n6.3.2 Components in the QKD transmitter module <\/td>\n<\/tr>\n
23<\/td>\n6.3.3 Components in the QKD receiver module
6.4 TOE scope for QKD modules
6.4.1 General
6.4.2 Definition of the TSF <\/td>\n<\/tr>\n
24<\/td>\n6.4.3 Definition of the TOE <\/td>\n<\/tr>\n
25<\/td>\n6.5 General working flow of QKD modules
7 Security problems analysis of QKD modules
7.1 General
7.2 Security assumptions <\/td>\n<\/tr>\n
27<\/td>\n7.3 Assets analysis
7.4 Threats to conventional network components
7.4.1 Overview <\/td>\n<\/tr>\n
28<\/td>\n7.4.2 Threats from the perspective of network-based classical attacks <\/td>\n<\/tr>\n
30<\/td>\n7.5 Threats to quantum optical components
7.5.1 Overview
7.5.2 Threats exploiting optical source flaws
7.5.3 Threats exploiting optical detection vulnerabilities
7.5.4 Threats exploiting parameter adjustment vulnerabilities <\/td>\n<\/tr>\n
31<\/td>\n8 Extended security functional components for QKD implementation
8.1 General
8.2 Extended security functional components to Class FTP: Trusted path\/channels
8.2.1 Quantum key distribution (FTP_QKD) <\/td>\n<\/tr>\n
34<\/td>\n8.2.2 User notes <\/td>\n<\/tr>\n
37<\/td>\n9 Security functional requirements for QKD modules
9.1 General <\/td>\n<\/tr>\n
38<\/td>\n9.2 General requirements for conventional network components in QKD modules
9.2.1 FAU_GEN.1 Audit data generation <\/td>\n<\/tr>\n
39<\/td>\n9.2.2 FCS_CKM.6 Timing and event of cryptographic key destruction <\/td>\n<\/tr>\n
40<\/td>\n9.2.3 FCS_COP.1 Cryptographic operation <\/td>\n<\/tr>\n
41<\/td>\n9.2.4 FCS_RNG.1 Random number generation
9.2.5 FDP_ACC.1 Subset access control <\/td>\n<\/tr>\n
42<\/td>\n9.2.6 FDP_ACF.1 Security attribute-based access control
9.2.7 FDP_IRC.1 Information retention control <\/td>\n<\/tr>\n
43<\/td>\n9.2.8 FDP_ITC.1 Import of user data without security attributes
9.2.9 FIA_UAU.2 User authentication before any action <\/td>\n<\/tr>\n
44<\/td>\n9.2.10 FIA_UID.1 Timing of identification
9.2.11 FMT_LIM.1 Limited capabilities
9.2.12 FMT_LIM.2 Limited availability
9.2.13 FMT_MSA.1 Management of security attributes <\/td>\n<\/tr>\n
45<\/td>\n9.2.14 FMT_MTD.1 Management of TSF data
9.2.15 FMT_SMF.1 Specification of Management Functions
9.2.16 FMT_SMR.1 Security roles <\/td>\n<\/tr>\n
46<\/td>\n9.2.17 FPT_EMS.1\/Convention Emanation of TSF and User data <\/td>\n<\/tr>\n
47<\/td>\n9.2.18 FPT_FLS.1 Failure with preservation of secure state
9.2.19 FPT_ITC.1 Inter-TSF confidentiality during transmission
9.2.20 FPT_ITI.1 Inter-TSF detection of modification
9.2.21 FPT_RCV.2 Automated recovery <\/td>\n<\/tr>\n
49<\/td>\n9.2.22 FPT_TST.1 TSF self-testing
9.3 General requirements for the implementation of QKD protocols
9.3.1 General <\/td>\n<\/tr>\n
50<\/td>\n9.3.2 FTP_QKD.1 QKD protocol and raw data generation <\/td>\n<\/tr>\n
51<\/td>\n9.3.3 FTP_QKD.2 QKD post-processing
9.4 General requirements for quantum optical components of QKD modules
9.4.1 General
9.4.2 FPT_EMS.1\/Quantum Emanation of TSF and User data <\/td>\n<\/tr>\n
52<\/td>\n9.4.3 FPT_PHP.3 Resistance to physical attack <\/td>\n<\/tr>\n
53<\/td>\n10 Conformance statement
10.1 General <\/td>\n<\/tr>\n
54<\/td>\n10.2 Conformance statement specific to the security problem definition
10.3 Conformance statement specific to the security functional requirements <\/td>\n<\/tr>\n
56<\/td>\nAnnex\u20acA (informative) Guidance for developing protection profiles for QKD modules <\/td>\n<\/tr>\n
59<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 23837-1. Information technology security techniques. Security requirements, test and evaluation methods for quantum key distribution – Requirements<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n59<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":401793,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-401784","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/401784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/401793"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=401784"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=401784"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=401784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}