skip to main content
10.1145/3610251.3610555acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Leveraging Quantum Key Distribution for Securing MACsec Communications

Published: 10 September 2023 Publication History

Abstract

Somewhat ironically, advances in quantum computing are both the cause of, and solution to, the observation that the dependence of public-key cryptography (that underpins much of today's network security) on the intractability of particular mathematical problems may not be future-proof. Since quantum computing rests upon the inviolability of the laws of quantum physics, network security approaches based on quantum computing ought to be more durable.
This paper explores how quantum key distribution (QKD) can be judiciously used to augment existing schemes for securing MACsec links over insecure/public networks. Multi-vendor interoperability tests have been successfully conducted on the application developed in this work, suggesting that it is possible to leverage quantum computing solutions to enhance network security based on open standards and commercially available products today.

References

[1]
Yuan Cao, Yongli Zhao, Qin Wang, Jie Zhang, Soon Ng, and L. Hanzo. 2022. The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet. IEEE Communications Surveys and Tutorials 24 (01 2022), 839--894.
[2]
Joo Yeon Cho and Andrew Sergeev. 2021. Post-quantum MACsec in Ethernet Networks. Journal of Cyber Security and Mobility 10, 1 (Mar. 2021), 161--176.
[3]
Joo Yeon Cho and Andrew Sergeev. 2021. Using QKD in MACsec for secure Ethernet networks. IET Quantum Communication 2, 3 (2021), 66--73.
[4]
Emir Dervisevic and Miralem Mehic. 2021. Overview of Quantum Key Distribution Technique within IPsec Architecture. CoRR abs/2112.13105 (2021). arXiv:2112.13105 https://arxiv.org/abs/2112.13105
[5]
W. Diffie and M. Hellman. 1976. New directions in cryptography. IEEE Transactions on Information Theory 22, 6 (1976), 644--654.
[6]
ESTI. 2019. Quantum Key Distribution (QKD); Protocol and data format of REST-based key delivery API. (2019). https://www.etsi.org/deliver/etsi_gs/QKD/001_099/014/01.01.01_60/gs_QKD014v010101p.pdf [Accessed: 4 June 2023].
[7]
IEEE. 2018. IEEE Standard for Local and metropolitan area networks-Media Access Control (MAC) Security. IEEE Std 802.1AE-2018 (Revision of IEEE Std 802.1AE-2006) (2018), 1--239.
[8]
T. D. Ladd, F. Jelezko, R. Laflamme, Y. Nakamura, C. Monroe, and J. L. O'Brien. 2010. Quantum computers. Nature 464, 7285 (2010), 45--53.
[9]
Arista Networks. 2014. Arista EOS SDK Wiki. (Dec 2014). Retrieved June 10, 2023 from https://github.com/aristanetworks/EosSdk/wiki
[10]
Arista Networks. 2018. Arista EOS - Cloud Network Operating System. (Apr 2018). Retrieved June 10, 2023 from https://www.arista.com/en/products/eos
[11]
Arista Networks. 2022. MACsec using static Secure Association Key. (Feb 2022). Retrieved June 10, 2023 from https://www.arista.com/en/support/toi/eos-4-27-2f/14914-macsec-using-static-secure-association-key
[12]
Ronald L Rivest, Adi Shamir, and Leonard Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (1978), 120--126.
[13]
Peter W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 26, 5 (oct 1997), 1484--1509.
[14]
Daniel Simon, Dr. Bernard D. Aboba, and Pasi Eronen. 2008. Extensible Authentication Protocol (EAP) Key Management Framework. RFC 5247. 5247 (Aug. 2008).

Cited By

View all
  • (2024)Enhancing Cybersecurity Protocols in Financial Networks through Reinforcement LearningInternational Journal of Scientific Research and Modern Technology (IJSRMT)10.38124/ijsrmt.v3i9.583:9(44-59)Online publication date: 2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
QuNet '23: Proceedings of the 1st Workshop on Quantum Networks and Distributed Quantum Computing
September 2023
76 pages
ISBN:9798400703065
DOI:10.1145/3610251
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 September 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. quantum key distribution
  2. network security
  3. MACsec

Qualifiers

  • Research-article

Conference

QuNet '23
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)64
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing Cybersecurity Protocols in Financial Networks through Reinforcement LearningInternational Journal of Scientific Research and Modern Technology (IJSRMT)10.38124/ijsrmt.v3i9.583:9(44-59)Online publication date: 2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media