Quantum Communication IV – Tutorial for IT Specialists Part 4 by Dr. Peter Holleczek (German language)

Symbolic picture for the article. The link opens the image in a large view.

Quantum Communication IV – Key Management

Next to the generation of quantum keys, e.g. for single-use password, their use to setup secured networks is an important topic. In the fourth part  the tutorials explain how quantum secured networks are set up and present security strategies and how keys are distributed in the network.

Dr. Peter Holleczek

Access:

https://www.fau.tv/course/id/2594 (videos 28-37) Password: TuQUANKOMM-Sp3Zial

all parts

other sources:

P. Schartner et al. – 2012
Quantum Key Management
http://dx.doi.org/10.5772/35400

K. Lee, A. Berzanskis – 2006
Key Manager for QKD Networks
https://patents.google.com/patent/US20060062392A1/en

[ITU-T Y.3803] International Telecommunication Union – 2020
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS,NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITIES; Quantum key distribution networks – Key management
https://www.itu.int/rec/T-REC-Y.3803/en

[ETSI GS QKD 014] European Telecommunications Standards Institute – 2019
Quantum Key Distribution (QKD); Protocol and data format of REST-based key delivery API
https://www.etsi.org/deliver/etsi_gs/QKD/001_099/014/01.01.01_60/gs_qkd014v010101p.pdf

[Z80] H. Zimmermann
OSI Reference Model – The ISO Model of Architecture for Open Systems Interconnection
https://doi.org/10.1109/TCOM.1980.1094702