SlideShare ist ein Scribd-Unternehmen logo
1 von 31
SACON
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
Quantum Secure Network
Karunakaran M.T.
QNu Labs
C.T.O
Secret key + key-
ID
key-ID Secret keyRequest
Use Cases
Pharma network

• Quantum Key Distribution (QKD)
provides unconditional security by
generating an information theoretically
secure key, for “data in motion”
• Strength of the security is not just in
increasing strength of encryption but in
providing the key securely on either
end of a transaction.
• QKD guarantees quantum
randomness. This property allows us
to enhance security of the “data at
rest”.
• QKD from QNu, can enhance the
security of the healthcare IT
ecosystem by providing a Quantum
secure shield.
• QKD is an insurance against “harvest
now decrypt later”.
Quantum Channel
Key Interface
Quantum Channel (λ1)
Classical Channel for
QKD reconciliation
(fiber (λ2) or ethernet)
Encryptor
/
Router
Public Internet
Army Office 1
(Secure Key
Interface
Protocol)
Data
Applications
…..
VoIP
…..
Encryptor
/
Router
VoIP
…..
…..
Data
Applications
(Secure Key
Interface
Protocol)
Army Office 2
QNu Node 1
QNu Node 2
Quantum Secure key Quantum Secure key
Proactively
Quantum™ Secure quantum network for critical infrastructure
QKD multi node network
QN1
QN2
QN3
QN4
 R1
 R4
 R2
 R3
S1 S1
IPv4 network
K1
A B
K2
K3
K4
QSNN
QSNNN
QSNN
QSNN QSNN
QSNN
     
 
 
 
 
 
DB
VoIP
phone
DB
VoIP
phone
DB
VoIP
phone
DB
VoIP
phone
MHA
PMO
RAW /NTRO/IB
Sena Bhavan
Proactively
Quantum™
Proactively
Quantum™
Quantum reinforced Cloud security
• Quantum reinforced randomness & information theoretic security
• Paired HSMs have the same security properties of single HSM
HSMQ +
Cloud
computing
Store
HSM+ Q
Cloud
computing
Store
Fibre link
Proactively
Quantum™
Client Location 2
App Engineers
Client Location 1
App Engineers
Collaborative Quantum secure cloud computing
Q HSM
Cloud
computing Store
Q HSM
Cloud
computing Store
+
+
+
+
Q HSM
Cloud
computing Store
+
+
+
+
+
+
+
+
Proactively
Quantum™
A Metropolitan
Area Network
using QKD based
Link Encryptors
Proactively
Quantum™
Keys from the
Cryptographic Server
to End point Clients
transferred as OTP
Encrypted data using
keys provided by QKD
Proactively
Quantum™
Wide Area Network
(WAN)
using single Q-element
QKD links (Hop to Hop)
Proactively
Quantum™
Wide Area Network (WAN)
Using QKD mesh network
with Multi Q-element nodes
Proactively
Quantum™
Passive Optical Network (PON)
ONU – Optical Network
Unit
Use Case:
QKD Authenticated
Sensor Network
Proactively
Quantum™
QRNG and Entropy as a service
QRNG is a hardware random number generator where generation of
random numbers are based on the properties of quantum mechanics.
The quality of key generation is strongly dependent on entropy. EaaS
provides high entropy random data for use in cryptography.
Entropy is used in
Lottery, gaming, OS scheduling, simulators, AI algorithm.
Proactively
Quantum™ EaaS – Entropy as a Service
Harvest Now & Decrypt Later
Attack that will compromise National secrets and
security in an unprecedented manner
Proactively
Quantum™
Highly secure
software solution
platform
Scalable /Flexible
HARDWARE
Quantum
optics
Quantum
protocols
Quantum
Mechanics
Proactively
Quantum™
QKD Research
Framework
Proactively
Quantum™
What’s in the pack
• Build Alice / Bob
• Change algorithm / scheme for Quantum channel
• Collection of data for long term study and analysis of Quantum
channel
• Visualization of various parameters of the Quantum channel for
correlation study over longer periods of time
• AI (Artificial intelligence) and ML (Machine learning) can be used on the
data to arriving at better schemes and designing better performing
algorithms
• Build Eve for simulating Quantum attacks of various classes
• Quick prototyping / Proof of concept validation with focus on specific
aspects of the development
(SACON) M T Karunakaran  - Quantum safe Networks

Weitere ähnliche Inhalte

Was ist angesagt?

HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN ControllerHACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
Priyanka Aash
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
Rassul Ismailov
 

Was ist angesagt? (20)

Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of Things
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
 
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN ControllerHACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
HACKING THE BRAIN: Customize Evil Protocol to Pwn an SDN Controller
 
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesAspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security Headaches
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessment
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting programBhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
Bhutan Cybersecurity Week 2021: APNIC vulnerability reporting program
 

Ähnlich wie (SACON) M T Karunakaran  - Quantum safe Networks

Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
Arpan Pal
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 

Ähnlich wie (SACON) M T Karunakaran  - Quantum safe Networks (20)

Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
NVIDIA Keynote #GTC21
NVIDIA Keynote #GTC21 NVIDIA Keynote #GTC21
NVIDIA Keynote #GTC21
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
Sp_Tropos_v1.pdf
Sp_Tropos_v1.pdfSp_Tropos_v1.pdf
Sp_Tropos_v1.pdf
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDN
 
Opencontrail network virtualization
Opencontrail network virtualizationOpencontrail network virtualization
Opencontrail network virtualization
 
Contrail Enabler for agile cloud services
Contrail Enabler for agile cloud servicesContrail Enabler for agile cloud services
Contrail Enabler for agile cloud services
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
AhmetCemilKaratas
AhmetCemilKaratasAhmetCemilKaratas
AhmetCemilKaratas
 
[OpenStack 스터디] OpenStack With Contrail
[OpenStack 스터디] OpenStack With Contrail[OpenStack 스터디] OpenStack With Contrail
[OpenStack 스터디] OpenStack With Contrail
 
OpenStack: Changing the Face of Service Delivery
OpenStack: Changing the Face of Service DeliveryOpenStack: Changing the Face of Service Delivery
OpenStack: Changing the Face of Service Delivery
 
OpenStack: Changing the Face of Service Delivery
OpenStack: Changing the Face of Service DeliveryOpenStack: Changing the Face of Service Delivery
OpenStack: Changing the Face of Service Delivery
 
Manu sheelvant resume
Manu sheelvant resumeManu sheelvant resume
Manu sheelvant resume
 

Mehr von Priyanka Aash

Mehr von Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

(SACON) M T Karunakaran  - Quantum safe Networks

  • 1. SACON SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur Quantum Secure Network Karunakaran M.T. QNu Labs C.T.O
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Secret key + key- ID key-ID Secret keyRequest
  • 10.
  • 11.
  • 12. Pharma network
 • Quantum Key Distribution (QKD) provides unconditional security by generating an information theoretically secure key, for “data in motion” • Strength of the security is not just in increasing strength of encryption but in providing the key securely on either end of a transaction. • QKD guarantees quantum randomness. This property allows us to enhance security of the “data at rest”. • QKD from QNu, can enhance the security of the healthcare IT ecosystem by providing a Quantum secure shield. • QKD is an insurance against “harvest now decrypt later”. Quantum Channel Key Interface
  • 13. Quantum Channel (λ1) Classical Channel for QKD reconciliation (fiber (λ2) or ethernet) Encryptor / Router Public Internet Army Office 1 (Secure Key Interface Protocol) Data Applications ….. VoIP ….. Encryptor / Router VoIP ….. ….. Data Applications (Secure Key Interface Protocol) Army Office 2 QNu Node 1 QNu Node 2 Quantum Secure key Quantum Secure key
  • 14. Proactively Quantum™ Secure quantum network for critical infrastructure QKD multi node network QN1 QN2 QN3 QN4  R1  R4  R2  R3 S1 S1 IPv4 network K1 A B K2 K3 K4 QSNN QSNNN QSNN QSNN QSNN QSNN                 DB VoIP phone DB VoIP phone DB VoIP phone DB VoIP phone MHA PMO RAW /NTRO/IB Sena Bhavan
  • 16. Proactively Quantum™ Quantum reinforced Cloud security • Quantum reinforced randomness & information theoretic security • Paired HSMs have the same security properties of single HSM HSMQ + Cloud computing Store HSM+ Q Cloud computing Store Fibre link
  • 17. Proactively Quantum™ Client Location 2 App Engineers Client Location 1 App Engineers Collaborative Quantum secure cloud computing Q HSM Cloud computing Store Q HSM Cloud computing Store + + + + Q HSM Cloud computing Store + + + + + + + +
  • 19. Proactively Quantum™ Keys from the Cryptographic Server to End point Clients transferred as OTP Encrypted data using keys provided by QKD
  • 20. Proactively Quantum™ Wide Area Network (WAN) using single Q-element QKD links (Hop to Hop)
  • 21. Proactively Quantum™ Wide Area Network (WAN) Using QKD mesh network with Multi Q-element nodes
  • 22. Proactively Quantum™ Passive Optical Network (PON) ONU – Optical Network Unit Use Case: QKD Authenticated Sensor Network
  • 23. Proactively Quantum™ QRNG and Entropy as a service QRNG is a hardware random number generator where generation of random numbers are based on the properties of quantum mechanics. The quality of key generation is strongly dependent on entropy. EaaS provides high entropy random data for use in cryptography. Entropy is used in Lottery, gaming, OS scheduling, simulators, AI algorithm.
  • 24. Proactively Quantum™ EaaS – Entropy as a Service
  • 25. Harvest Now & Decrypt Later Attack that will compromise National secrets and security in an unprecedented manner
  • 26.
  • 27.
  • 28. Proactively Quantum™ Highly secure software solution platform Scalable /Flexible HARDWARE Quantum optics Quantum protocols Quantum Mechanics
  • 30. Proactively Quantum™ What’s in the pack • Build Alice / Bob • Change algorithm / scheme for Quantum channel • Collection of data for long term study and analysis of Quantum channel • Visualization of various parameters of the Quantum channel for correlation study over longer periods of time • AI (Artificial intelligence) and ML (Machine learning) can be used on the data to arriving at better schemes and designing better performing algorithms • Build Eve for simulating Quantum attacks of various classes • Quick prototyping / Proof of concept validation with focus on specific aspects of the development