The WiN-Lab develops software and tools on behalf of the DFN. Additionally it investigates topics important for the future of the X-WiN. The X-WiN is the German research network which is carried by the DFN. This network connects universities, research institutions and research-related companies in Germany with each other, as well as with scientific networks in Europe and other continents. With connection capacities of up to 200 Gigabit/s and a multi-terabit core network, X-WiN is one of the most powerful communication networks worldwide. Funded by the DFN-Verein, the WiN-Labor has been located at the Regional Computing Center (RRZE) of the University of Erlangen-Nuremberg since 1992 with the start of the then “2-Mbit-WiN-Labor Project”.
Currently, the WiN-Lab is mainly engaged in research on quantum networks and techniques for time synchronization in the network.
The ongoing development of quantum computers affects the security of currently used encryption and authentication schemes. Therefore, this document presents 'Post Quantum Cryptography' (PQC) and 'Quantum Key Distribution' (QKD). PQC describes software based approaches for quantum safe encryption and...
Before a new technology can be commercially used on a large scale, first some practical experience has to be obtained. This is usually done in testbeds, where commercial hardware is used under realistic conditions.
Quantum Key Distribution (QKD) facilitates the generation of common secret random nu...
Despite some issues there already exist practical considerations and network realizations especially regarding Metropolitan Area Networks. In the fifth part (videos 38-52) the tutorial, presents aspects regarding the coexistence with classical data and selected testbeds, including the entanglement b...
Next to the generation of quantum keys, e.g. for single-use password, their use to setup secured networks is an important topic. In the fourth part (videos 28-37) the tutorials explains how quantum secured networks are set up and presents security strategies and how keys are distributed in the netwo...