HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189760 (19 Apr 2025)

GM/T 0114-2021 PDF English


Search result: GM/T 0114-2021
Standard IDContents [version]USDSTEP2[PDF] delivered inName of Chinese StandardStatus
GM/T 0114-2021English590 Add to Cart 0-9 seconds. Auto-delivery. Decoy-state BB84 quantum key distribution product test specification Valid


GM/T 0114-2021: PDF in English (GMT 0114-2021)

GM/T 0114-2021 GM CRYPTOGRAPHIC INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.030 L 80 Decoy-state BB84 quantum key distribution product test specification ISSUED ON: OCTOBER 18, 2021 IMPLEMENTED ON: MAY 01, 2022 Issued by: State Cryptography Administration Table of Contents Foreword ... 3 1 Scope ... 4 2 Normative references ... 4 3 Terms and definitions ... 5 4 Symbols and abbreviations ... 8 4.1 Symbols ... 8 4.2 Abbreviations ... 9 5 Detection environment ... 9 5.1 Test reference point ... 9 5.2 Detection environment ... 10 6 Detection content ... 19 6.1 Detection of protocol implementation requirements ... 19 6.2 Detection of quantum key distribution product ... 25 7 Detection method ... 29 7.1 Protocol implementation requirements detection... 29 7.2 Anti-attack detection ... 46 7.3 Detection of quantum key distribution product ... 52 8 Qualification judgment ... 57 Appendix A (Informative) Detection instruments ... 58 References ... 59 Decoy-state BB84 quantum key distribution product test specification 1 Scope This document specifies the detection content and methods of the protocol implementation requirements and basic product requirements of the decoy-state BB84 quantum key distribution product, based on the use of weak coherent state light source. This document is applicable to the detection of decoy-state BB84 quantum key distribution products, which are developed in accordance with GM/T 0108-2021; it can also be used to guide the development. The system security based on quantum key distribution products and the security of their classical channel networks are not within the scope of this document. 2 Normative references The contents of the following documents constitute the essential provisions of this document through normative references in the text. Among them, for referenced documents with dates, only the version corresponding to that date applies to this document; for referenced documents without dates, the latest version (including all amendments) applies to this document. GB/T 2423.1 Environmental testing for electric and electronic products - Part 2: Test methods - Tests A: Cold GB/T 2423.2 Environmental testing for electric and electronic products - Part 2: Test methods - Tests B: Dry heat GB/T 5080.7 Equipment reliability testing - Compliance test plans for failure rate and mean time between failures assuming constant failure rate GB/T 15843.2 Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms GB/T 15843.4 Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function GB/T 15852.1 Information technology - Security techniques - Message authentication codes - Part 1: Mechanisms using a block cipher GB/T 15852.2 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash- function GB/T 15852.3 Information technology - Security techniques - Message authentication codes (MACs) - Part 3: Mechanisms using a universal hash-function GB/T 32915 Information security technology - Randomness test methods for binary sequence GB/T 37092 Information security technology - Security requirements for cryptographic modules GB/T 38625 Information security technology - Security test requirements for cryptographic modules GM/T 0062 Random number test requirements for cryptographic modules GM/T 0108-2021 Technical specification for decoy state BB84 quantum key distribution product GM/Z 4001 Cryptographic terminology 3 Terms and definitions The terms and definitions defined in GB/T 37092, GM/T 0050, GM/Z 4001 apply to this document. 3.1 Privacy amplification The process in which the transmitter and the receiver perform mathematical processing on the error-corrected key to extract the shared key from it. 3.2 BB84 protocol A quantum key distribution protocol proposed by Charles Henry Bennett and Gilles Brassard in 1984. 3.3 Basis sifting Also called sifting, it refers to the process in which the transmitter and receiver the quantum state transmission process meets the requirements of the decoy-state BB84 protocol. The transmitter sends the light pulse of the quantum state loaded with information that meets the requirements of 6.2.1 of GM/T 0108-2021 to the receiver, through the quantum channel; records the light intensity preparation information and encoding information of the emitted pulse. 6.1.3 Detection of quantum state measurement process 6.1.3.1 Decoding process The purpose of the decoding process detection is to detect whether the decoding process of the receiver meets the requirements of the decoy-state BB84 protocol. The decoding process is that the receiver randomly selects a measurement basis to demodulate the quantum state loaded with information sent by the transmitter. It shall meet the decoding requirements of GM/T 0108-2021. During the decoding process, if the receiver is an active basis selection scheme, it shall at least have the ability to resist Trojan horse attacks. During the decoding process, if the receiver is an active basis selection scheme (no state selection), it shall at least have the ability to resist fluorescence attacks; if the receiver is an active basis selection scheme (no state selection) and uses multiple detectors, it shall at least have the ability to resist forged state attacks, time displacement attacks, device calibration attacks. During the decoding process, if the receiver is a passive basis selection scheme, it shall at least have the ability to resist wavelength-related attacks and fluorescence attacks; if the receiver is a passive basis selection scheme and uses multiple detectors, it shall at least have the ability to resist forged state attacks, time displacement attacks, device calibration attacks. For recommended measures to resist related attacks during the decoding process, see b), c), d), e), f) in Appendix C of GM/T 0108-2021. 6.1.3.2 Detection process The detection process includes interface detection, key attribute detection, anti- detection process attack detection. The detection purposes are to detect whether the interface attributes and key attributes of the detector meet the requirements of the BB84 protocol in the decoy-state, whether measures to resist related attacks during the detection process are taken. The detection process is the detection of a single photon as an information carrier, converting the quantum state information of the detected light pulse into classical bit information to obtain the original key. The current implementation method is mainly based on single-photon detectors. The detection process shall comply with the interface requirements, key attribute requirements, anti-attack measures requirements of 6.2.3.2 of GM/T 0108-2021. For recommended measures to resist related attacks during the detection process, see g), h), i), j), k) in Appendix C of GM/T 0108-2021. 6.1.4 Detection of basis sifting process The basis sifting process is that the transmitter and the receiver compare the coding basis used in the preparation of the quantum state with the measurement basis used by the receiver. Both parties only retain the data of the same basis vector, to generate the post-screening key. The purpose of the basis sifting process detection is to detect whether the basis sifting process of the transmitter and the receiver meets the requirements of the decoy-state BB84 protocol. The basis sifting process shall meet the requirements of the basis sifting process of GM/T 0108-2021. 6.1.5 Detection of error correction process The error correction process is that the transmitter and the receiver correct the quantum error bits in the post-screening key at both ends, to obtain a consistent key, that is, the error-corrected key. The purpose of the error correction process detection is to detect whether the error correction process of the transmitter and the receiver meets the requirements of the decoy-state BB84 protocol. The error correction process shall meet the requirements of the error correction process of GM/T 0108-2021. 6.1.6 Detection of security enhancement process The security enhancement process refers to the process in which the transmitter and the receiver use the hash function class to hash the error-corrected key and extract the shared key. The purpose of the security enhancement process detection is to detect whether the security enhancement process of the transmitter and receiver meets the requirements of the BB84 protocol in a decoy-state. The security enhancement process shall meet the requirements of the security enhancement process of GM/T 0108-2021. 6.2 Detection of quantum key distribution product 6.2.1 Basic testing 6.2.1.1 Functional testing Quantum key distribution product functional testing includes protocol implementation requirements testing, shared key randomness testing, shared key consistency testing. The purpose of the protocol implementation requirements testing is to detect whether the process of quantum key distribution product key generation follows the decoy BB84 protocol. The purpose of the shared key randomness testing is to detect whether the randomness of the key generated by the quantum key distribution product meets the performance requirements of the quantum key distribution product. The purpose of the shared key consistency testing is to detect whether the shared keys generated by the transmitter and receiver of the quantum key distribution product are consistent. Quantum key distribution products shall follow the decoy BB84 protocol and shall comply with the requirements of 6.1 and 6.2 in GM/T 0108-2021. The randomness of the shared key generated by the quantum key distribution product shall comply with the requirements of GB/T 32915. The shared keys generated by the transmitter and receiver of the quantum key distribution product shall be consistent. 6.2.1.2 Performance testing 6.2.1.2.1 Shared key generation rate The purpose of the shared key generation rate testing is to detect whether the amount of shared keys generated by the quantum key distribution product per unit time meets the requirements of the inspection document. The quantum key distribution product shall meet the requirements of the shared key generation rate specified in the product inspection document. 6.2.1.2.2 Maximum distance The purpose of the maximum distance testing of the quantum key distribution product is to detect the maximum length of the quantum channel between the transmitter and the receiver of the quantum key distribution product, under the premise of meeting the performance and security requirements. The quantum key distribution product shall meet the requirements of the maximum distance specified in the product inspection document. 6.2.1.2.3 Environmental adaptability and reliability The purpose of the environmental adaptability testing is to detect the adaptability of the quantum key distribution product to the working environment; the purpose of the reliability test is to detect the mean time between failures of the quantum key distribution product. The working environment of the quantum key distribution product shall meet the have the ability to replay attacks. 6.2.3 Interface detection The purpose of interface detection is to detect whether the type and function of the interface of the quantum key distribution product meet the requirements of the quantum key distribution product. The interface of the quantum key distribution product shall meet the interface requirements of GM/T 0108-2021. 6.2.4 Detection of random number generator The purpose of random number generator detection is to detect whether the random number generator used in the quantum key distribution product meets the requirements of the quantum key distribution product. The random number generator used in the quantum key distribution product shall be approved by the national cryptography management department. The random number generator used in the quantum key distribution product shall use a random number generator based on physical processes; it can pass the random number detection in four different application stages of sample delivery detection, exit-factory detection, power-on detection, use detection; it shall meet the requirements of Class D products in GM/T 0062. 6.2.5 Log management detection The purpose of log management detection is to detect whether the management of logs by quantum key distribution products meets the requirements of quantum key distribution products. The quantum key distribution product shall provide a log function; the log can be viewed and exported. The log content includes: a) Operational behavior, including login authentication, system configuration, key management and other operations; b) Security events, including connection with the management platform, key generation, key update, key destruction and other events; c) Abnormal events, including authentication failure, illegal access, integrity check failure and other abnormal events. 6.2.6 Remote management detection The purpose of remote management detection is to detect whether the remote management function of quantum key distribution products meets the requirements of quantum key distribution products. The remote management of quantum key distribution products shall comply with the requirements of 7.6 in GM/T 0108-2021. 7 Detection method 7.1 Protocol implementation requirements detection 7.1.1 Base preparation detection 7.1.1.1 Relative error of coding base conjugation Take the detection of relative error of coding base conjugation of phase-coded quantum key distribution products as an example: - Detection conditions: a) The dotted box part shall select the transmitter base/state preparation module (including phase modulator); b) The synchronous clock signal of the light source shall make the single photon detector work normally; c) It shall obtain the phase modulation voltages φ0, φ1, φ2, φ3 of the four phases of 0, π/2, π, 3π/2 modulated by the base/state preparation module; d) Adjust the light source optical power to an appropriate level, so that the average photon number level of the light pulse reaching the single photon detector is consistent with the average photon number level of the signal state light pulse, meanwhile at least ensure that the detection count of the single photon detector shall be more than twice the dark count of the single photon detector. - Detection method: a) Connect the device to be tested and the accompanying device to be tested according to Figure 2 in 5.2.1.1; set the laser trigger frequency to n MHz and the phase modulation frequency to 2n MHz. Use optical and electronic delay technology to make the quantum light loaded with phase for the first time after entering the ground/state preparation module interfere with the quantum light loaded with phase reflected from the end reflector before entering the circulator; the interference peak position required for measurement shall be within the detection gate width range of the single photon detector. is consistent with the average number of photons of the signal state light pulse, meanwhile at least ensure that the detection count of the single photon detector shall be more than twice the dark count of the single photon detector. - Detection method: Connect the device to be tested and the accompanying test device according to Figure 4 in 5.2.1.1; the operation steps are the same as steps a) ~ g) of the detection method in 7.1.1.1, to obtain the relative error Σ/E of conjugation. - Pass criteria: The relative error of the conjugation of the measurement base shall meet the requirements of 6.1.1.2. Take the measurement basis relative error detection of polarization-encoded quantum key distribution products as an example: - Detection method: a) Connect the device to be tested and the accompanying test device according to Figure 5 in 5.2.1.1; b) Connect two optical power meters to the polarization state output ends of |H > and |V >, respectively; adjust the base/state preparation module of the transmitter, so that the reading ratio -- of the optical power meter connected to the polarization state output end of |H > to the optical power meter connected to the polarization state output end of |V > -- is the largest; connect the polarization analyzer to the polarization state output end of |H >; record the current polarization position a; set ϕ0 = 0; c) Connect two optical power meters to the polarization state output ends of |H > and |V >, respectively. Adjust the base/state preparation module of the transmitter, so that the reading ratio -- of the optical power meter connected to the polarization state output end of |H > to the optical power meter connected to the polarization state output end of |V > -- is the smallest. Connect the polarization analyzer to the polarization state output end of |V >. Record the current polarization position b. Record the angle ϕ2 between the polarization position b and a; d) Connect two optical power meters to the polarization state output ends of |P > and |N >, respectively. Adjust the base/state preparation module of the transmitter, so that the reading ratio -- of the optical power meter connected to the |P > polarization state output end to the optical power meter connected to the |N > polarization state output end -- is the largest. Connect the polarization analyzer to the |P > polarization state output end. Record the current polarization position c. Record the angle ϕ1 between the polarization position c and a; e) Connect the two optical power meters to the |P > and |N > polarization state output the internal attenuation value of the transmitter can be reduced to the range that the optical power meter can normally detect; the reduced attenuation value is deducted in the final calculation. - Detection method: a) Connect the device to be tested and the accompanying test device according to Figure 7 in 5.2.1.2; set the intensity of the transmitter in the standard working mode in turn; output the light pulse of the signal state, the light pulse of the decoy-state 1, the light pulse of the decoy-state 2; b) Use an optical power meter to measure the output optical power of the transmitter. The time interval of the light intensity statistics shall not be less than 1 s. The number of sampling points shall not be less than 100. Take the root mean square of the collected optical power measurement value as the actual light pulse intensity p'; c) Calculate the theoretical light pulse intensity, taking the signal state as an example: the measured signal state light pulse repetition frequency is f, the signal state light pulse center wavelength is λ, the theoretical average photon number is μ, the single photon energy is , then it can obtain the theoretical light pulse intensity p = μ·Ep, where h is Planck's constant and c is the speed of light. - Pass criteria: The light intensity preparation meets the requirements of 6.1.1.4. 7.1.4 Detection of preparation of other properties 7.1.4.1 Amplitudes of various quantum states in signal state - Detection conditions: Quantum key distribution products shall have a mode for preparing signal state separately. - Detection method: a) Connect the device to be tested and the accompanying test device according to Figure 8 in 5.2.1.3; set the transmitter to output the light pulse in the signal state according to the intensity of the standard working mode; b) Use the pulse amplitude measurement tool provided by the oscilloscope, to measure the light pulse amplitude and calculate the root mean square value of the light pulse amplitude; c) Set the output of light pulses in different quantum states; measure the light pulse amplitude of each quantum state in turn; calculate the root mean square value of the light pulse amplitude of each quantum state; d) When the light intensity output by the transmitter is lower than the measurement range of the measuring device, the internal optical path attenuation of the transmitter can be reduced, so that the light intensity output by the transmitter meets the measurement requirements. - Pass criteria: The test results shall meet the requirements of 6.1.1.5. 7.1.4.2 Amplitudes of various quantum states in the decoy-state - Detection conditions: Quantum key distribution products shall have a mode for preparing decoy-states separately. - Detection method: a) Connect the device to be tested and the accompanying test device according to Figure 8 in 5.2.1.3; set the transmitter to output the light pulse in the decoy-state according to the intensity of the standard working mode; b) Use the pulse amplitude measurement tool provided by the oscilloscope, to measure the light pulse amplitude and calculate the root mean square value of the light pulse amplitude; c) Set the output of light pulses in different quantum states; measure the light pulse amplitude of each quantum state in turn; calculate the root mean square value of the light pulse amplitude of each quantum state; d) When the light intensity output by the transmitter is lower than the measurement range of the measuring device, the internal optical path attenuation of the transmitter can be reduced, so that the light intensity output by the transmitter meets the measurement requirements. - Pass criteria: The test results shall meet the requirements of 6.1.1.5. 7.1.4.3 Pulse width of various quantum states in signal state and decoy-state - Detection method: a) Connect the device to be tested and the accompanying test device according to Figure 8 in 5.2.1.3; b) Use the pulse width measurement tool provided by the oscilloscope, to measure the optical pulse width and calculate the root mean square value of the optical pulse width; c) Set the light source to output optical pulses of different quantum states; measure ......
 
Source: Above contents are excerpted from the PDF -- translated/reviewed by: www.chinesestandard.net / Wayne Zheng et al.

Similar standards: GB/T 15843.1   GA/T 1389   GM/T 0118   

PDF Preview: GM/T 0114-2021