GB202201834D0 - Quantum-safe networking - Google Patents

Quantum-safe networking

Info

Publication number
GB202201834D0
GB202201834D0 GBGB2201834.5A GB202201834A GB202201834D0 GB 202201834 D0 GB202201834 D0 GB 202201834D0 GB 202201834 A GB202201834 A GB 202201834A GB 202201834 D0 GB202201834 D0 GB 202201834D0
Authority
GB
United Kingdom
Prior art keywords
quantum
safe networking
networking
safe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GBGB2201834.5A
Other versions
GB2602208A (en
GB2602208B (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Arqit Ltd
Original Assignee
Arqit Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arqit Ltd filed Critical Arqit Ltd
Priority to GB2201834.5A priority Critical patent/GB2602208B/en
Priority claimed from GB1916312.0A external-priority patent/GB2589312B/en
Publication of GB202201834D0 publication Critical patent/GB202201834D0/en
Publication of GB2602208A publication Critical patent/GB2602208A/en
Application granted granted Critical
Publication of GB2602208B publication Critical patent/GB2602208B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • H04L63/064Hierarchical key distribution, e.g. by multi-tier trusted parties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0855Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
GB2201834.5A 2019-11-08 2019-11-08 Quantum-safe networking Active GB2602208B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB2201834.5A GB2602208B (en) 2019-11-08 2019-11-08 Quantum-safe networking

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB2201834.5A GB2602208B (en) 2019-11-08 2019-11-08 Quantum-safe networking
GB1916312.0A GB2589312B (en) 2019-11-08 2019-11-08 Quantum-safe networking

Publications (3)

Publication Number Publication Date
GB202201834D0 true GB202201834D0 (en) 2022-03-30
GB2602208A GB2602208A (en) 2022-06-22
GB2602208B GB2602208B (en) 2022-12-14

Family

ID=81753151

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2201834.5A Active GB2602208B (en) 2019-11-08 2019-11-08 Quantum-safe networking

Country Status (1)

Country Link
GB (1) GB2602208B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230040468A1 (en) * 2021-08-04 2023-02-09 International Business Machines Corporation Deploying a system-specific secret in a highly resilient computer system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871538B (en) * 2015-01-22 2019-04-12 阿里巴巴集团控股有限公司 Quantum key distribution system, quantum key delivering method and device
WO2018017168A2 (en) * 2016-04-21 2018-01-25 Alibaba Group Holding Limited System and method for encryption and decryption based on quantum key distribution

Also Published As

Publication number Publication date
GB2602208A (en) 2022-06-22
GB2602208B (en) 2022-12-14

Similar Documents

Publication Publication Date Title
DK3958977T3 (en) Camptothecinderivater
GB2589312B (en) Quantum-safe networking
CA196372S (en) Soundbar
CA189498S (en) Showerbase
CA191618S (en) Floorwasher - nozzle
CA201156S (en) Banquette
DK3980417T3 (en) PRMT5-Inhibitorer
CA190552S (en) Hand-dryer
CA189795S (en) Handshower
CA189677S (en) Uroflowmeter
GB201915624D0 (en) Carfish
GB2602208B (en) Quantum-safe networking
GB2601926B (en) Quantum-safe networking
CA193248S (en) Mandoline
CA190384S (en) Beverageware
CA190385S (en) Beverageware
EP3689729C0 (en) Anti-skid-pedal
CA189047S (en) Hammock-tent
GB201900347D0 (en) Blazeloc
GB2601925B (en) Quantum-safe networking
CA194482S (en) Kick-scooter
DK3832828T3 (en) Strømforyningsnetsystem
CA192228S (en) Hydrogenerator
CA190974S (en) Hoodie
CA190387S (en) Beverageware