Fortunato Gabriele Lo Giudice, F. De Rango, M. Voznák, J. Rozhon
{"title":"Using QKD-exchanged keys for encryption of VPN","authors":"Fortunato Gabriele Lo Giudice, F. De Rango, M. Voznák, J. Rozhon","doi":"10.1109/TELFOR56187.2022.9983749","DOIUrl":null,"url":null,"abstract":"The paper aims to highlight how symmetric cryptographic key generation via Quantum Key Distribution-based technology can be used to secure protected communications within a private network. Within a testbed of the 5G network installed in the campus of the Technical University of Ostrava, the quantum key distribution (QKD) technology and encryptors are implemented to demonstrate secure 5G network concepts such as network function virtualization (NFV) and network management software-defined networking (SDN). Specifically, two APIs are programmed with all the necessary steps for two Secure Application Entities to secure a new symmetric key that is in turn generated by two Key Manager Entities via a protocol called \"Coherent One-Way\".","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 30th Telecommunications Forum (TELFOR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELFOR56187.2022.9983749","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The paper aims to highlight how symmetric cryptographic key generation via Quantum Key Distribution-based technology can be used to secure protected communications within a private network. Within a testbed of the 5G network installed in the campus of the Technical University of Ostrava, the quantum key distribution (QKD) technology and encryptors are implemented to demonstrate secure 5G network concepts such as network function virtualization (NFV) and network management software-defined networking (SDN). Specifically, two APIs are programmed with all the necessary steps for two Secure Application Entities to secure a new symmetric key that is in turn generated by two Key Manager Entities via a protocol called "Coherent One-Way".