• 제목/요약/키워드: quantum key management system

검색결과 7건 처리시간 0.018초

A Design of Secure Communication Architecture Applying Quantum Cryptography

  • Shim, Kyu-Seok;Kim, Yong-Hwan;Lee, Wonhyuk
    • Journal of Information Science Theory and Practice
    • /
    • 제10권spc호
    • /
    • pp.123-134
    • /
    • 2022
  • Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography systems is actively being conducted. The most powerful cryptography systems are quantum key distribution (QKD) and post quantum cryptograph (PQC) systems; in this study, a network based on both QKD and PQC is proposed, along with a quantum key management system (QKMS) and a Q-controller to efficiently operate the network. The proposed quantum cryptography communication network uses QKD as its backbone, and replaces QKD with PQC at the user end to overcome the shortcomings of QKD. This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • 제37권4호
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계 (Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications)

  • 고행석;지세완;장진각
    • 정보보호학회논문지
    • /
    • 제30권5호
    • /
    • pp.771-780
    • /
    • 2020
  • 양자키분배(QKD)는 양자컴퓨터의 위협으로부터 안전하게 비밀키를 나누어 갖는 키공유 프로토콜 중 하나이다. 일반적으로 QKD 장치에 연결되는 암호장치는 경합조건 발생과 구현의 복잡성 때문에 송신자 또는 수신자의 역할을 설치할 때부터 적용한다. 기존 QKD 시스템은 링크용 암호장치에 주로 적용되었기 때문에 암호장치의 송·수신자 역할을 고정하여도 문제가 없었다. 암호장치와 QKD 장치가 공급하는 양자키의 종속성을 제거하여, QKD 네트워크로 유연하게 확장할 수 있는 새로운 QKD 시스템 및 프로토콜을 제안하였다. 기존 QKD 시스템에서는 암호장치가 요청하는 비밀키를 양자키로 직접 분배하였으나, 제안한 QKD 시스템에서는 난수로 생성한 비밀키를 암호장치에 분배한다. 두 QKD 노드 사이에서 미리 나누어 가진 송신용 및 수신용 양자키를 이용하여 비밀키를 암호화하고 전달하는 구조를 제안하였다. 제안한 QKD 시스템은 QKD 장치들 사이에서 공유한 양자키의 의존성을 제거하여 암호장치의 고정된 송·수신자 역할이 필요 없다.

Post-quantum identity-based authenticated multiple key agreement protocol

  • Yang Yang;Hongji Yuan;Linbo Yan;Yinglan Ruan
    • ETRI Journal
    • /
    • 제45권6호
    • /
    • pp.1090-1102
    • /
    • 2023
  • Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that are vulnerable to quantum algorithms. Lattice cryptography provides quantum resistance to authenticated key agreement protocols, but the certificate always incurs excessive public key infrastructure management overhead. Thus, a lightweight lattice-based secure system is needed that removes this overhead. To answer this need, we provide a two-party lattice- and identity-based AMKA scheme based on bilateral short integer or computational bilateral inhomogeneous small integer solutions, and we provide a security proof based on the random oracle model. Compared with existing AMKA protocols, our new protocol has higher efficiency and stronger security.

LINEAR PROGRAMMING OPTIMIZATION OF NUCLEAR ENERGY STRATEGY WITH SODIUM-COOLED FAST REACTORS

  • Lee, Je-Whan;Jeong, Yong-Hoon;Chang, Yoon-Il;Chang, Soon-Heung
    • Nuclear Engineering and Technology
    • /
    • 제43권4호
    • /
    • pp.383-390
    • /
    • 2011
  • Nuclear power has become an essential part of electricity generation to meet the continuous growth of electricity demand. A Sodium-cooled Fast Reactor (SFR) was developed to extend uranium resource utilization under a growing nuclear energy scenario while concomitantly providing a nuclear waste management solution. Key questions in this scenario are when to introduce SFRs and how many reactors should be introduced. In this study, a methodology using Linear Programming is employed in order to quantify an optimized growth pattern of a nuclear energy system comprising light water reactors and SFRs. The optimization involves tradeoffs between SFR capital cost premiums and the total system U3O8 price premiums. Optimum nuclear growth patterns for several scenarios are presented, as well as sensitivity analyses of important input parameters.

양자 컴퓨터 기술 트렌드 예측과 분석 (Trend Forecasting and Analysis of Quantum Computer Technology)

  • 차은주;장병윤
    • 한국시뮬레이션학회논문지
    • /
    • 제31권3호
    • /
    • pp.35-44
    • /
    • 2022
  • 본 연구에서는 양자 컴퓨터 관련 기술 트렌드 분석과 예측을 수행한다. 기존 양자 컴퓨터 기술 분석 관련 연구는 주로 기술 특징을 중심으로 응용 가능 분야에 집중되었다. 본 논문은 시장 중심의 기술 분석과 예측을 위하여 양자 컴퓨터 관련 국내 뉴스 기사를 기반으로 중요하게 다뤄지는 양자 컴퓨터 기술들을 분석하고 미래신호 감지와 예측을 수행한다. 뉴스 기사에서 사용된 단어들을 분석하여 빠르게 변화하는 시장의 변화와 대중의 관심사를 파악한다. 본 논문은 Cha & Chang (2022) 컨퍼런스 발표 자료를 확장했다. 연구는 2019년부터 2021년까지의 국내 뉴스 기사를 수집하여 진행된다. 먼저, 텍스트 마이닝을 통해 주요 키워드를 정리한다. 다음으로, Term Frequency - Inverse Document Frequency(TF-IDF), Key Issue Map(KIM), Key Emergence Map(KEM) 등의 분석을 통해 양자컴퓨터관련 기술을 탐색한다. 마지막으로, 랜덤포레스트, 의사결정나무, 연관분석 등을 통해 미래기술들과 수요 및 공급의 연관성을 파악한다. 연구결과 빈도분석, 키워드 확산도 및 가시성 분석에서 모두 AI의 관심도가 가장 높게 나타났다. 사이버보안의 경우 시간이 지날수록 뉴스기사에서 언급되는 비율이 다른 기술에 비해 압도적으로 높게 나타났다. 또한 양자통신, 내성암호, 증강현실 역시 관심도의 증가율이 높게 나타났다. 따라서 이를 트렌드 기술의 적용에 대한 시장의 기대가 높음을 알 수 있다. 본 연구의 결과는 양자컴퓨터 시장의 관심 분야 파악과 기술 투자 관련 대응체계 구축에 응용될 수 있다.

SAFETY OF THE SUPER LWR

  • Ishiwatari, Yuki;Oka, Yoshiaki;Koshizuka, Seiichi
    • Nuclear Engineering and Technology
    • /
    • 제39권4호
    • /
    • pp.257-272
    • /
    • 2007
  • Supercritical water-cooled reactors (SCWRs) are recognized as a Generation IV reactor concept. The Super LWR is a pressure-vessel type thermal spectrum SCWR with downward-flow water rods and is currently under study at the University of Tokyo. This paper reviews Super LWR safety. The fundamental requirement for the Super LWR, which has a once-through coolant cycle, is the core coolant flow rate rather than the coolant inventory. Key safety characteristics of the Super LWR inhere in the design features and have been identified through a series of safety analyses. Although loss-of-flow is the most important abnormality, fuel rod heat-up is mitigated by the "heat sink" and "water source" effects of the water rods. Response of the reactor power against pressurization events is mild due to a small change in the average coolant density and flow stagnation of the once-through coolant cycle. These mild responses against transients and also reactivity feedbacks provide good inherent safety against anticipated-transient-without-scram (ATWS) events without alternative actions. Initiation of an automatic depressurization system provides effective heat removal from the fuel rods. An "in-vessel accumulator" effect of the reactor vessel top dome enhances the fuel rod cooling. This effect enlarges the safety margin for large LOCA.