A Design of Secure Communication Architecture Applying Quantum Cryptography

Kyu-Seok Shim, Yong-Hwan Kim, Wonhyuk Lee
2022 Journal of Information Science Theory and Practice  
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography systems is actively being conducted. The most powerful cryptography systems are quantum key distribution (QKD) and post quantum cryptograph (PQC) systems; in this study, a network based on both QKD
more » ... PQC is proposed, along with a quantum key management system (QKMS) and a Q-controller to efficiently operate the network. The proposed quantum cryptography communication network uses QKD as its backbone, and replaces QKD with PQC at the user end to overcome the shortcomings of QKD. This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.
doi:10.1633/jistap.2022.10.s.12 doaj:c4c98b36f0464196a55cf7ca82ac6b01 fatcat:aecmx3yptjd5zb6aokjqur6vay