Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Introduction             
 7     Information assets to be protected in key management in the QKDN              
        7.1     Key data         
        7.2     Metadata      
        7.3     Control and management information              
 8     Security threats of key management in QKDN           
        8.1     Threats to KMA links (T_K2-1) and key supply links (T-K1, T_K3, T_A1) 
        8.2     Threats to KSA links (T_K2-2) 
        8.3     Threats to control and management links (T_C, T_M, T_C&M)
        8.4     Threats to KMA and KSA (T_KMA, T_KSA)        
 9     Security requirements and measures for information assets of key management in QKDN     
        9.1     Security requirements and measures on the key data 
        9.2     Security requirements and measures on the metadata              
        9.3     Security requirements and measures on the control and management information      
        9.4     Loss and corruption, and DoS
Bibliography