2010 International Computer Symposium (ICS2010) 2010
DOI: 10.1109/compsym.2010.5685533
|View full text |Cite
|
Sign up to set email alerts
|

Quantum key distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Quantum Key Distribution (QKD) Networks C QKD resources, the mitigation of attacks is envisaged as described in [7]. Various approaches integrating QKD in a network scale have been successfully demonstrated worldwide including field trials [9][10][11][12].…”
Section: Monitoring and Physical Layer Attack Mitigation In Sdn-contrmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum Key Distribution (QKD) Networks C QKD resources, the mitigation of attacks is envisaged as described in [7]. Various approaches integrating QKD in a network scale have been successfully demonstrated worldwide including field trials [9][10][11][12].…”
Section: Monitoring and Physical Layer Attack Mitigation In Sdn-contrmentioning
confidence: 99%
“…However, QKD sensitivity to the optical losses and the noise level of the links increase the technology susceptibility against physical-layer attacks and becomes the main security threat in optical QKD networks [6,7]. An attack over an individual optical fiber link can be executed by acting on the quantum channel, increasing the noise above the threshold of security and disrupting the key generation, despite the availability of the QKD link.…”
Section: Introductionmentioning
confidence: 99%
“…This time span may be used to securely transmit an alarm message to the network management center. The second approach proposed by Schartner & Rass (2010) resurrects the idea of keeping public parameters secret, like proposed by Kaabneh & Al-Bdour (2005). Here the idea is to use the remaining key material in the most efficient way and maintain a high level of secrecy during the DOS attack on the QKD link(s).…”
Section: Trusted Nodes Denial-of-service Maintenance and Recoverymentioning
confidence: 99%
“…And if the attacker retrieves the primes of the modulus by other means, he is still missing the public key (which is also transmitted encrypted by use of an OTP). For assessing how hard these problems really are, and an alternative that replaces RSA and AES by ECC, we refer the reader to Schartner & Rass (2010).…”
Section: Counteracting Dos-attacksmentioning
confidence: 99%
See 1 more Smart Citation