SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD)

SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD‪)‬

Taking Advantage Of Established Security And Cryptographic Standards And Best Practices

    • $14.99
    • $14.99

Publisher Description

Quantum Key Distribution (QKD) systems combine cryptographic primitives with quantum information theory to produce a theoretic unconditionally secure cryptographic key. However, real-world implementations of QKD systems are far from ideal and differ significantly from the theoretic model. Because of this, real-world QKD systems require additional practical considerations when implemented to achieve secure operations. In this thesis, a content analysis of the published literature is conducted to determine if established security and cryptographic standards and best practices are addressed in real world, practical QKD implementations. The research reveals that most published, real world QKD implementations do not take advantage of established security and cryptographic standards and best practices. Based upon an analysis of existing security and cryptographic standards and best practices, systems architecture methodology is used to make recommendations as to how these standards can and should be applied to establish a practical, secure, QKD system framework.


Descriptors :   *COMPUTER SECURITY, *CRYPTOGRAPHY, *QUANTUM THEORY, *SECURE COMMUNICATIONS, *STANDARDS, COMMUNICATIONS NETWORKS, INFORMATION THEORY, LITERATURE SURVEYS, SYSTEMS ENGINEERING

GENRE
Computing & Internet
RELEASED
2012
8 June
LANGUAGE
EN
English
LENGTH
127
Pages
PUBLISHER
Jeffrey Frank Jones
SELLER
Jeffrey Frank Jones
SIZE
11.4
MB
Security Management of Next Generation Telecommunications Networks and Services Security Management of Next Generation Telecommunications Networks and Services
2013
Open Source Systems Security Certification Open Source Systems Security Certification
2008
Trusted Computing Trusted Computing
2009
Future of Trust in Computing Future of Trust in Computing
2009
Secure and Resilient Software Development Secure and Resilient Software Development
2010
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008