ETSI GS QKD 008-2010 Quantum Key Distribution (QKD) QKD Module Security Specification (V1 1 1)《量子密钥分配(QKD) QKD模块安全规范(版本1 1 1)》.pdf
《ETSI GS QKD 008-2010 Quantum Key Distribution (QKD) QKD Module Security Specification (V1 1 1)《量子密钥分配(QKD) QKD模块安全规范(版本1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI GS QKD 008-2010 Quantum Key Distribution (QKD) QKD Module Security Specification (V1 1 1)《量子密钥分配(QKD) QKD模块安全规范(版本1 1 1)》.pdf(52页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI GS QKD 008 V1.1.1 (2010-12)Group Specification Quantum Key Distribution (QKD);QKD Module Security SpecificationDisclaimer This document has been produced and approved by the Quantum Key Distribution (QKD) ETSI Industry Specification Group (ISG) and represents the views of those members who par
2、ticipated in this ISG. It does not necessarily represent the views of the entire ETSI membership ETSI ETSI GS QKD 008 V1.1.1 (2010-12)2Reference DGS/QKD-0008 Keywords analysis, protocols, Quantum Key Distribution, security, system ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE T
3、el.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be mad
4、e available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kep
5、t on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you
6、find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduct
7、ion in all media. European Telecommunications Standards Institute 2010. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Me
8、mbers and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS QKD 008 V1.1.1 (2010-12)3Conten
9、ts Intellectual Property Rights 5g3Foreword . 5g3Introduction 5g31 Scope 6g32 References 7g32.1 Normative references . 7g32.2 Informative references 7g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 13g34 Functional security objectives 14g34.1 Security requirements . 14g
10、34.2 QKD module specification . 15g34.2.1 Types of QKD modules 15g34.2.2 Cryptographic boundary . 15g34.2.3 Multiple approved modes of operations 15g34.2.4 Degraded functionality . 16g34.2.5 Security strength of the module 16g34.3 QKD module physical ports and logical interfaces 16g34.4 Roles, authe
11、ntication, and services . 17g34.4.1 Roles . 17g34.4.2 Operator authentication . 17g34.4.3 Services . 19g34.5 Software security 20g34.6 Operational environment 21g34.6.1 Operating system requirements for modifiable operational environments . 21g34.7 Physical security . 23g34.7.1 General physical secu
12、rity requirements 24g34.7.2 Multiple-chip embedded QKD modules . 25g34.7.3 Multiple-chip standalone QKD modules 25g34.7.4 Environmental failure protection/testing 26g34.7.4.1 Environmental failure protection features . 26g34.7.4.2 Environmental failure testing procedures 27g34.8 Physical Security -
13、Non-Invasive Attacks 27g34.9 Sensitive Security Parameter (SSP) management 28g34.9.1 Random bit generators 28g34.9.2 SSP Generation . 28g34.9.3 SSP Establishment 29g34.9.4 SSP Entry and Output . 29g34.9.5 SSP Storage 30g34.9.6 SSP Zeroization 30g34.10 Self-Tests 31g34.10.1 Pre-Operational Self-Tests
14、 31g34.10.2 Conditional Self-Tests 32g34.10.3 Critical Functions Tests 33g34.11 Life-Cycle Assurance . 33g34.11.1 Configuration Management 33g34.11.2 Design . 34g34.11.3 Finite State Model . 34g34.11.4 Development . 35g34.11.5 Vendor Testing . 36g34.11.6 Delivery and Operation . 36g34.11.7 Guidance
15、Documents 36g3ETSI ETSI GS QKD 008 V1.1.1 (2010-12)44.12 Mitigation of Other Attacks 37g3Annex A (normative): Summary of Documentation Requirements 38g3Annex B (normative): QKD Module Security Policy 42g3B.1 Definition of QKD Module Security Policy . 42g3B.2 Purpose of QKD Module Security Policy 42g
16、3B.3 Specification of a Cryptographic Module Security Policy . 42g3B.3.1 Identification and Authentication Policy 43g3B.3.2 Access Control Policy 43g3B.3.3 Physical Security Policy . 43g3B.3.4 Mitigation of Other Attacks Policy 43g3B.4 Security Policy Check List Tables . 43g3Annex C (informative): R
17、ecommended Software Development Practices 45g3Annex D (informative): Approved Security Function Example: BB84 . 47g3Annex E (informative): Applicable Internet Uniform Resource Locators 49g3Annex F (informative): Bibliography . 50g3Annex G (informative): Authors and contributors 51g3History 52g3ETSI
18、ETSI GS QKD 008 V1.1.1 (2010-12)5Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI S
19、R 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR
20、Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This
21、Group Specification (GS) has been produced by ETSI Industry Specification Group on Quantum Key Distribution systems (QKD - ISG). Introduction The present document specifies the security requirements for QKD modules utilized within security systems to protect sensitive information in telecommunicatio
22、n systems. The present document has been developed by the ETSI Quantum Key Distribution Industry Specification Group (QKD-ISG) composed of both operators and vendors. The working group has identified requirements for QKD modules to provide data security. Following the methodology used in conventiona
23、l cryptographic security modules and systems, eleven security aspects have been identified, and the present document will establish the minimum requirements that QKD modules will fulfil to be in accordance with the present document. Because of the particular requirements and final quality that the Q
24、uantum Key Distribution systems have, the present document has not considered the possibility of having different security levels included in the present document, and it does not consider different degrees of data sensitivity nor different application environments. In the present document, software
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIGSQKD0082010QUANTUMKEYDISTRIBUTIONQKDQKDMODULESECURITYSPECIFICATIONV111 量子 密钥 分配 QKDQKD 模块 安全 规范

链接地址:http://www.mydoc123.com/p-733430.html