Shopping Cart

No products in the cart.

BS ISO/IEC 23837-1:2023

$198.66

Information security. Security requirements, test and evaluation methods for quantum key distribution – Requirements

Published By Publication Date Number of Pages
BSI 2023 62
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 undefined
7 Foreword
8 Introduction
9 1 Scope
2 Normative references
3 Terms and definitions
13 4 Abbreviated terms
14 5 Theoretical aspects of QKD protocols
5.1 General
5.2 Principle
15 5.3 Classification
16 5.4 Architecture
18 6 Implementation modules of QKD protocols
6.1 General
19 6.2 External interfaces of QKD modules
6.2.1 General
6.2.2 The quantum channel interface
6.2.3 The control and management interface
20 6.2.4 The key management interface
6.3 Internal structure of QKD modules
6.3.1 General
21 6.3.2 Components in the QKD transmitter module
23 6.3.3 Components in the QKD receiver module
6.4 TOE scope for QKD modules
6.4.1 General
6.4.2 Definition of the TSF
24 6.4.3 Definition of the TOE
25 6.5 General working flow of QKD modules
7 Security problems analysis of QKD modules
7.1 General
7.2 Security assumptions
27 7.3 Assets analysis
7.4 Threats to conventional network components
7.4.1 Overview
28 7.4.2 Threats from the perspective of network-based classical attacks
30 7.5 Threats to quantum optical components
7.5.1 Overview
7.5.2 Threats exploiting optical source flaws
7.5.3 Threats exploiting optical detection vulnerabilities
7.5.4 Threats exploiting parameter adjustment vulnerabilities
31 8 Extended security functional components for QKD implementation
8.1 General
8.2 Extended security functional components to Class FTP: Trusted path/channels
8.2.1 Quantum key distribution (FTP_QKD)
35 8.2.2 User notes
37 9 Security functional requirements for QKD modules
9.1 General
39 9.2 General requirements for conventional network components in QKD modules
9.2.1 FAU_GEN.1 Audit data generation
9.2.2 FCS_CKM.6 Timing and event of cryptographic key destruction
40 9.2.3 FCS_COP.1 Cryptographic operation
41 9.2.4 FCS_RNG.1 Random number generation
9.2.5 FDP_ACC.1 Subset access control
42 9.2.6 FDP_ACF.1 Security attribute-based access control
9.2.7 FDP_IRC.1 Information retention control
43 9.2.8 FDP_ITC.1 Import of user data without security attributes
44 9.2.9 FIA_UAU.2 User authentication before any action
9.2.10 FIA_UID.1 Timing of identification
9.2.11 FMT_LIM.1 Limited capabilities
45 9.2.12 FMT_LIM.2 Limited availability
9.2.13 FMT_MSA.1 Management of security attributes
9.2.14 FMT_MTD.1 Management of TSF data
46 9.2.15 FMT_SMF.1 Specification of management functions
9.2.16 FMT_SMR.1 Security roles
47 9.2.17 FPT_EMS.1/Convention Emanation of TSF and User data
9.2.18 FPT_FLS.1 Failure with preservation of secure state
48 9.2.19 FPT_ITC.1 Inter-TSF confidentiality during transmission
9.2.20 FPT_ITI.1 Inter-TSF detection of modification
49 9.2.21 FPT_RCV.2 Automated recovery
50 9.2.22 FPT_TST.1 TSF self-testing
51 9.3 General requirements for the implementation of QKD protocols
9.3.1 General
9.3.2 FTP_QKD.1 QKD protocol and raw data generation
52 9.3.3 FTP_QKD.2 QKD post-processing
9.4 General requirements for quantum optical components of QKD modules
9.4.1 General
53 9.4.2 FPT_EMS.1/Quantum emanation of TSF and user data
9.4.3 FPT_PHP.3 Resistance to physical attack
55 10 Conformance statement
10.1 General
10.2 Conformance statement specific to the security problem definition
56 10.3 Conformance statement specific to the security functional requirements
57 Annex A (informative) Guidance for developing protection profiles for QKD modules
60 Bibliography
BS ISO/IEC 23837-1:2023
$198.66