|
US$349.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 42829-2023: Basic requirements of quantum secure communication applications Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 42829-2023 | English | 349 |
Add to Cart
|
4 days [Need to translate]
|
Basic requirements of quantum secure communication applications
| Valid |
GB/T 42829-2023
|
PDF similar to GB/T 42829-2023
Basic data | Standard ID | GB/T 42829-2023 (GB/T42829-2023) | | Description (Translated English) | Basic requirements of quantum secure communication applications | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.030 | | Word Count Estimation | 18,172 | | Date of Issue | 2023-08-06 | | Date of Implementation | 2024-03-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 42829-2023: Basic requirements of quantum secure communication applications---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030
CCSL80
National Standards of People's Republic of China
Basic requirements for quantum secure communication applications
Published on 2023-08-06
2024-03-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration Committee
Table of contents
PrefaceⅠ
1 Scope 1
2 Normative reference documents 1
3 Terms and Definitions 1
4 Abbreviations 2
5 Overview 3
6 Basic requirements for application 5
7 Application Scenario 6
7.1 Overview 6
7.2 Application of QKD in data link layer protocols 6
7.3 Application of QKD in network layer protocols 6
7.4 Application of QKD in transport layer protocols 7
7.5 Application of QKD in application layer protocols 7
Appendix A (informative) QKDN networking solution 8
Appendix B (informative) Application scenarios of quantum secure communication in typical industries 9
Reference 15
Foreword
This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents"
Drafting.
Please note that some content in this document may be subject to patents. The publisher of this document assumes no responsibility for identifying patents.
This document is proposed by the Ministry of Industry and Information Technology of the People's Republic of China.
This document is under the jurisdiction of the National Communications Standardization Technical Committee (SAC/TC485).
This document was drafted by. Guoke Quantum Communication Network Co., Ltd., China Mobile Communications Group Co., Ltd., China Telecom Group Co., Ltd.
Company, China Academy of Information and Communications Technology, USTC Guodun Quantum Technology Co., Ltd., ZTE Corporation, Anhui Wentian Quantum Technology
Co., Ltd., China Information and Communications Technology Group Co., Ltd., Digital China Information Services Co., Ltd., Data Communications Science and Technology
Research Institute, New H3C Technology Co., Ltd., China Communications Construction Group Design Institute Co., Ltd., China United Network Communications Co., Ltd., Riskcom
Da Technology Development Co., Ltd., Jiangsu Hengtong Wentian Quantum Information Research Institute Co., Ltd., Anhui Wantong Post and Telecommunications Co., Ltd., Beijing
University of Posts and Telecommunications, Beijing Zhongchuang Quantum Communication Technology Co., Ltd.
The main drafters of this document. Ma Zhangchao, Feng Gang, Ma Bingke, Xu Wenhua, Zhao Wenyu, Zhao Yong, Gu Yuan, Liu Jingjing, Feng Yonghua, Huang Qiang, Li Shen,
Wan Xiaolan, Han Peng, Wang Haijun, Zhang Jinqi, Zhao Liangyuan, Li Dingjun, Zhao Yongli, Yin Hualei.
Basic requirements for quantum secure communication applications
1 Scope
This document describes the basic concepts and application scenarios of quantum secure communication, and stipulates the security, scalability, and high performance of quantum secure communication.
Basic requirements in terms of effectiveness, robustness, application flexibility, interoperability, technical compatibility, manageability, differentiated policy control, etc.
This document applies to the design, development and application of quantum secure communication systems based on quantum key distribution technology.
2 Normative reference documents
This document has no normative references.
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
The communication parties realize the method and process of key generation and distribution for information theory security (3.11) by transmitting quantum states.
Note. Quantum key distribution is also called quantum key distribution and quantum key agreement.
3.2
Quantum key distribution (3.1) is used as the key distribution functional component, combined with appropriate key management, cryptographic algorithms and protocols to form a secure
Encrypted communication solutions.
3.3
Quantum optical processes (including quantum key distribution protocols, synchronization, key extraction, etc.) and cryptography required to achieve quantum key distribution
Functional software and hardware system.
Note. The quantum key distribution module serves as an endpoint module that directly generates keys and can be interconnected through quantum key distribution links. Two typical quantum key distribution
The modules are a quantum key distribution transmitter and a quantum key distribution receiver.
3.4
A network composed of multiple quantum key distribution nodes connected through quantum key distribution links.
Note. When two quantum key distribution nodes in the quantum key distribution network cannot be directly connected through a quantum key distribution link, the quantum key distribution
The key relay function of the network implements key distribution.
3.5
Trusted relay trustedrelay
Using a trusted relay node, the device and storage of this node will not be controlled and intruded by illegal parties.
French communication nodes are connected and the key sharing between the connected nodes is realized through quantum key distribution (3.1), thereby expanding quantum key distribution
(3.1) A technology that safely encodes distance and range.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 42829-2023_English be delivered?Answer: Upon your order, we will start to translate GB/T 42829-2023_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 42829-2023_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 42829-2023_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|