SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD)

SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD‪)‬

Taking Advantage Of Established Security And Cryptographic Standards And Best Practices

    • $14.99
    • $14.99

Publisher Description

Quantum Key Distribution (QKD) systems combine cryptographic primitives with quantum information theory to produce a theoretic unconditionally secure cryptographic key. However, real-world implementations of QKD systems are far from ideal and differ significantly from the theoretic model. Because of this, real-world QKD systems require additional practical considerations when implemented to achieve secure operations. In this thesis, a content analysis of the published literature is conducted to determine if established security and cryptographic standards and best practices are addressed in real world, practical QKD implementations. The research reveals that most published, real world QKD implementations do not take advantage of established security and cryptographic standards and best practices. Based upon an analysis of existing security and cryptographic standards and best practices, systems architecture methodology is used to make recommendations as to how these standards can and should be applied to establish a practical, secure, QKD system framework.


Descriptors :   *COMPUTER SECURITY, *CRYPTOGRAPHY, *QUANTUM THEORY, *SECURE COMMUNICATIONS, *STANDARDS, COMMUNICATIONS NETWORKS, INFORMATION THEORY, LITERATURE SURVEYS, SYSTEMS ENGINEERING

GENRE
Computers & Internet
RELEASED
2012
June 8
LANGUAGE
EN
English
LENGTH
127
Pages
PUBLISHER
Jeffrey Frank Jones
SELLER
Jeffrey Frank Jones
SIZE
11.4
MB
Secure and Resilient Software Development Secure and Resilient Software Development
2010
70 Tips and Tricks for Mastering the CISSP Exam 70 Tips and Tricks for Mastering the CISSP Exam
2020
Bootstrapping Trust in Modern Computers Bootstrapping Trust in Modern Computers
2011
Computer System and Network Security Computer System and Network Security
2017
Enabling Things to Talk Enabling Things to Talk
2013
Big Data Platforms and Applications Big Data Platforms and Applications
2021