Recommendation ITU-T X.1713 (04/2024) Security requirements for the protection of quantum key distribution nodes
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction
7 Assets to be protected in a QKD node in a QKDN
8 Security threats to a QKD node in a QKDN
     8.1 Possible attacks
     8.2 Risk and threat analysis
9 Security requirements for QKD nodes in a QKD network
Appendix I  A configuration example of security measures for QKD nodes
     I.1 Configuration example of security measures for unauthorized physical access and unauthorized access through dynamic entities
     I.2 Configuration example of security measures for QKD links
     I.3 Configuration example of security measure for unauthorized network access
     I.4 Configuration example of security measures for attacks through installation, maintenance and migration
     I.5 Configuration example of security measures for classical side-channel attacks
Appendix II  Further considerations on security measures for QKD nodes
Bibliography