7. Glossary – Definitions
side channel attack
Attack that does not concern the theoretical security method. It seeks out and exploits weaknesses in the practical means of implementation: human procedure, external behavior (computing time) of software or hardware (electromagnetic radiation, noise).
Vernam cipher; Vernam cipher/one-time pad
Symmetrical encryption based on the logical function XOR (exclusive OR) using unique (ephemeral) keys made of random bits that are the same size as the messages. This encryption has been shown to be tamper-proof (ITS), but difficult to implement due to the impossibility of truly secretly exchanging the encryption keys used (or disposable masks) between sender and receiver.
confidentilité persitante; forward secrecy
Term used in the QSC white paper, cryptographic...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Glossary – Definitions
Bibliography
Websites
[SECOQC] SECOQC (Secure Communication based on Quantum Cryptography) research project, which gave rise to the ETSI ISG QKD in October 2008 http://www.secoqc.net/html/standards/standardisation.html (page consulted on November 3, 2014)
[QuRep] QuRep (Quantum Repeaters for Long Distance...
Events
[TB07] November 29, 2007, "ETSI-ERCIM Infinity Initiative". http://webapp.etsi.org/MeetingCalendar/MeetingDetails.asp?mid=26770
Presentation " Dr. Felix Tiefenbacher on behalf of Prof. Anton Zeilinger IQOQI – Quantum physics engineering future information technologies "
Standards and norms
- Committee: European Telecommunications Standards Institute/ETSI Industry Specification Group/ISG on Quantum Key Distribution/QKD https://portal.etsi.org/tb.aspx?tbid= 723&SubTB=723 (page consulted on November 3, 2014) - ETSI ISG QKD -
- QKD Module Security Specification http://www.etsi.org/deliver/etsi_gs/ QKD/001_099/008/01.01.01_60/gs_QKD008v010101p.pdf...
ETSI ISG QKD standards publications
Directory
List of ETSI ISG QKD Stakeholders
http://www.portal.etsi.org/TBSiteMap/qkd/QKDListmembers.aspx (pages consulted on November 3, 2014)
Applied Communication Sciences http://www.appcomsci.comwww.appcomsci.com
...Typology of DQC players
Research and development in the DQC industry
This group includes spinoff SMEs that are pioneers and leaders in DQC. We note the disappearance of one of them in 2009: SmartQuantum.
IDQ – Id Quantique (Switzerland), SeQureNet (France), MagiQ (United States), QuintessenceLabs (Australia), Qutools (Germany)
To this group should be added the...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference