Quantum key distribution in an optical network and quantum-secured optical channels

Information

  • Patent Application
  • 20250106012
  • Publication Number
    20250106012
  • Date Filed
    January 31, 2024
    a year ago
  • Date Published
    March 27, 2025
    4 months ago
Abstract
Systems and methods for quantum key distribution in an optical network and quantum-secured optical channels. A node for operation in an optical network includes one or more degrees each connected to a corresponding optical span including one or more fibers; and one or more Quantum-Optical Service modules (QOSM) for each of the one or more degrees, each QOSM supporting Quantum Key Distribution (QKD) for establishing a quantum-secured channel and Optical Service Channel (OSC) functionality over the quantum-secured channel. A line amplifier system for operation in an optical network includes one or more optical amplifiers configured to amplify optical channels over an optical span in the optical network; and a trusted quantum repeater, connected to the optical span, and configured to support QKD for establishing a first quantum-secured channel and a second quantum-secured channel and OSC functionality over the first quantum-secured channel and the second quantum-secured channel.
Description
FIELD OF THE DISCLOSURE

The present disclosure relates generally to networking and computing. More particularly, the present disclosure relates to systems and methods for quantum key distribution in an optical network and quantum-secured optical channels.


BACKGROUND OF THE DISCLOSURE

Quantum computing poses future threats to current encryption techniques, such as Public Key Infrastructure (PKI), which relies on the computational difficulty of certain mathematical functions. Quantum Cryptography (QC) and Quantum Key Distribution (QKD) offer a different approach for encryption where the key distribution process is not based on mathematical functions, which may be broken by quantum computers, but which utilizes the properties of quantum mechanical systems to generate and distribute cryptographic keys. That is, quantum keys rely on the foundations of quantum mechanics, in contrast to traditional public key cryptography in PKI. Specifically, quantum keys can be generated based on properties of a communications link, e.g., a point-to-point fiber optic link, a satellite link, etc. Additionally, this approach is tamper-resistant based on an ability to detect eavesdroppers, i.e., if an attacker disturbs or looks at a quantum system, the quantum system will change in such a way that the intended parties involved will detect the presence of an eavesdropper. QKD, QC, etc. are classes of quantum-resistant methodologies, meaning their keys used in cryptographic protocols assure the confidentiality, integrity, and authentication of data, even against future quantum computers. With the future prospect of quantum computing and the threats to conventional public key cryptography, quantum-resistant methodologies are expected to proliferate.


There are challenges with quantum-resistant methodologies namely related to physical QKD, including a requirement to use special purpose hardware for QKD, increased cost and insider threats, securing and validating QKD, and the like. Solutions to these challenges are proposed herein.


BRIEF SUMMARY OF THE DISCLOSURE

The present disclosure relates to systems and methods for Quantum Key Distribution in an optical network and quantum-secured optical channels. Variously, the present disclosure includes approaches to integrate Quantum Key Distribution with existing optical networks, including more than a single point-to-point span. Further, the present disclosure contemplates uses of quantum cryptography to secure individual optical channels. This includes QKD distribution using existing physical optical networks that include terminal (e.g., Reconfigurable Optical Add/Drop Multiplexer (ROADM), fixed OADM, etc.) sites and optical amplifier sites, secured hardware included with existing optical networking hardware, and quantum-resistant encryption transmission technology. Within the existing structure of optical networks, the present disclosure includes a quantum-optical trusted repeater system for transporting quantum-secured optical channels including quantum-optical user nodes, multi-degree quantum-optical trusted repeater systems, quantum-secured coherent hyper service channels, and key management modules, all of which work in tandem to provide a versatile highly secure system. In an embodiment, the hyper service channel is used as the Optical Service Channel (OSC) used in existing optical networks. Of note, the present disclosure refers to this channel as a hyper service channel and those skilled in the art will appreciate other terminology is contemplated. Also, the present disclosure utilizes various terms for elements in the quantum-secured optical network and those skilled in the art will recognize different names with the same functions are possible.


Advantageously, the present disclosure provides an approach to integrate QKD into optical networks, thereby allowing key distribution as a service thereby removing the need for end users to separately deploy and manage the infrastructure of special purpose hardware. For example, encryption keys based on mathematical complexity can also be distributed on a quantum-secure optical channel as there is no public portion of the key.


In an embodiment, a node for operation in an optical network includes one or more degrees each connected to a corresponding optical span including one or more fibers; and one or more Quantum-Optical Service Modules (QOSM) for each of the one or more degrees, each QOSM supporting Quantum Key Distribution (QKD) for establishing a quantum-secured channel and Optical Service Channel (OSC) functionality over the quantum-secured channel. Each quantum-secured channel can be formed with an adjacent node which is one of another node or a line amplifier, and wherein the one or more QOSMs include circuitry configured to exchange keys over the quantum-secured channel. The node can further include one or more optical modems configured to support traffic channels over an optical span, wherein data transmitted via the one or more modems is encrypted based on one of the keys. A QOSM of the one or more QOSMs can include a transmitter and receiver, each supporting coherent modulation. The one or more QOSMs include a plurality of QOSMs, and the node further includes a session key transfer switch configured to switch keys from a first QOSM to a second QOSM, of the plurality of QOSMs.


A QOSM of the one or more QOSMs can include circuitry configured to implement a QKD service channel, a session key transfer service channel, the OSC functionality, and a key management service channel. A QOSM of the one or more QOSMs can include circuitry configured to implement a QKD service channel, wherein the circuitry is further configured to detect an intrusion on the QKD service channel and to one or more of provide an alarm and nullify any keys based thereon. The node can further include circuitry configured to implement an Application Programming Interface (API) between the one or more QOSMs and any data interfaces connected to associated degrees. A QOSM of the one or more QOSMs can include a hardened enclosure configured to detect physical intrusions and to adjust any keys based on detection of the physical intrusions. The node can further include a plurality optical modems configured to support traffic channels over the one or more degrees, wherein data transmitted via the plurality optical modems is encrypted based on a key from a corresponding QOSM, and at least two of the plurality optical modems utilize different keys.


In another embodiment, an intermediate node for operation in an optical network include one or more optical amplifiers configured to amplify optical channels over an optical span in the optical network; and a trusted quantum repeater, connected to the optical span, and configured to support Quantum Key Distribution (QKD) for establishing a first quantum-secured channel and a second quantum-secured channel and Optical Service Channel (OSC) functionality over the first quantum-secured channel and the second quantum-secured channel. The optical channels through the one or more optical amplifiers can be encrypted based on a key exchanged between nodes through the first quantum-secured channel and the second quantum-secured channel. The trusted quantum repeater can include a first transceiver connected to the first quantum-secured channel and a second transceiver connected to the second quantum-secured channel, wherein each of the first transceiver and the second transceiver utilize encryption based on the QKD. Each of the first transceiver and the second transceiver can support coherent modulation.


The trusted quantum repeater can include circuitry configured to securely transfer keys between the first quantum-secured channel and the second quantum-secured channel. The trusted quantum repeater can include circuitry configured to implement a QKD service channel, a session key transfer service channel, the OSC functionality, and a key management service channel. The trusted quantum repeater can include circuitry configured to implement a QKD quantum channel, wherein the circuitry is further configured to detect an intrusion on the QKD quantum channel and to one or more of provide an alarm and nullify any keys based thereon. The trusted quantum repeater can include a hardened enclosure configured to detect physical intrusions and to adjust any keys based on detection of the physical intrusions. The intermediate node can further include a hardened enclosure including the one or more optical amplifiers and the trusted quantum repeater, and circuitry configured to detect physical intrusions and to adjust any keys based on detection of the physical intrusions. The optical channels can include a plurality of optical channels, at least two of which utilize different keys for encryption thereof.





BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated and described herein with reference to the various drawings, in which like reference numbers are used to denote like system components/method steps, as appropriate, and in which:



FIG. 1 is a diagram of two nodes (endpoints) configured for key generation and quantum resistance.



FIG. 2 depicts a Quantum-Secured optical channel established between two sites A, B utilizing QKD over a single fiber span.



FIG. 3 depicts a multi-span quantum channel established with quantum repeaters.



FIG. 4 is a network diagram of Quantum-Secured Optical Channels established via a satellite for a QKD channel.



FIG. 5 is a network diagram of a point-to-point link such as, for example, Data Center Interconnection (DCI).



FIG. 6 is a network diagram of a point-to-point link with DWDM channels with one or more additional spans interconnecting enterprises or the like.



FIG. 7 is a network diagram of a mesh or ring interconnect with DWDM channels along with one or more additional spans interconnecting enterprises or the like.



FIG. 8 is a network diagram of a long-haul link between two sites (data centers) along with one or more additional spans interconnecting enterprises or the like.



FIG. 9 is a network diagram of the point-to-point link from FIG. 5 illustrating the inclusion of QKD therein.



FIG. 10 is a network diagram of the point-to-point link with DWDM channels with one or more additional spans interconnecting enterprises from FIG. 6 illustrating the inclusion of QKD therein.



FIG. 11 is a network diagram of a regional network illustrating the inclusion of QKD therein with multiple spans.



FIG. 12 is a network diagram of an optical line span between two sites A, B with an intermediate trusted node at a site E.



FIG. 13 is a network diagram of a two-degree Quantum-Optical Trusted Repeater System.



FIG. 14 is a diagram of a Multi-Degree Quantum-Optical Trusted Repeater System.



FIG. 15 illustrates a diagram of a Multi-Degree Quantum-Optical Trusted Repeater System in a Network Environment.





DETAILED DESCRIPTION OF THE DISCLOSURE

Again, the present disclosure relates to systems and methods for quantum key distribution in an optical network and quantum-secured optical channels. In particular, the present disclosure includes techniques for securely delivering keys over a quantum-secured optical network. These techniques leverage the existing infrastructure of optical networks.


Thread Posed by Quantum Computers

Future quantum computers pose a threat for today's key exchange encryption technology such as through a concept called “harvest now, decrypt later” . . . when quantum computers are powerful enough, especially with PKI. One way to provide quantum resistance is to have an eternal key provided to the encryption endpoints that is not transmitted between them. FIG. 1 is a diagram of two nodes (endpoints, labeled Alice and Bob) utilizing today's algorithmic based key exchange mechanism. Each node includes a True Random Number Generator (TRNG) used to generate a key pair (public and private keys) and the public keys are shared via Elliptic-curve Diffie-Hellman (ECDH) which allows the parties to establish a shared secret over an insecure channel. However, as shown in FIG. 1 quantum resistance using an EXT key, which could be a QKD-generated key is added to this functionality.


One of the biggest threats facing companies today is from hack now, decrypt later. This is the practice of cybercriminals stealing encrypted information with the intention of cracking it once quantum computers are powerful enough to break the encryption. Thanks to a better understanding of error mitigation and improved algorithms it is expected this point could be reached within a decade.


Quantum security via QKD is in the initial phases of deployment. There is a need to support this security today to protect today's data from decryption at a later date when quantum computing will readily support such techniques to overcome conventional public key cryptography.


QKD Approaches

QKD generally is a cryptographic process based on the principles of quantum mechanics for two endpoints to provide a shared, random secret key known only to them, i.e., a quantum key. The endpoints can use this quantum key to encrypt and decrypt messages, securely and without concern that an eavesdropper could break the encryption even with quantum computers. A first aspect of quantum keys is QKD, namely how do the two endpoints initially establish the quantum key.


Sneakernet—a simple way to protect the shared key is to have a person physically carry the key between the endpoints and apply it locally such that the key itself is not transmitted on the wire where interception is possible. This assumes that the endpoints, where the un-encrypted data and the keys are present is physically secured. This solution requires human effort and is inherently slow to update keys. It also relies on the human with the secret keys not being compromised. There is simply no way to scale this approach.


QKD—Single Span Solution—QKD provides a means to generate symmetric keys on both communicating sides without actually transmitting the keys. The quantum state of the signal is perturbed by any potential intrusion which is detected by the endpoints which then do not allow the keys to be used, i.e., the endpoints known in advance the quantum key has not been intercepted. The issue with this technology is that it is incompatible with optical amplification which renders it to be a single span technology, between 80-120 km. Of course, the vast majority of optical networks are more than a single span, i.e., this approach does not scale to regional and long-haul networks.



FIG. 2 is a network diagram of a single optical span 10 between two sites A, B for providing QKD over an insecure fiber span 12. The sites A, B can be nodes where there is a set of Dense Wavelength Division Multiplexed (DWDM) channels 14 (“traffic channels”), such as ROADMs, OADMs, DWDM terminals, etc. The channels 14 formed by corresponding modems 16 at each of the sites A, B along with degree equipment 18, such as a Wavelength Selective Switch (WSS), amplifiers, etc. Those skilled in the art will appreciate this is a simplified view of an optical network, as the single span 10. A quantum channel 20 can either be established in the same fiber pair as the traffic channels or in its own fiber, via a pair of QKD transceiver (Tx/Rx) 22. The choice here depends on the details of the technology and the loss and interference encountered in the fiber.


Quantum Repeater—Multi-span Solution—Another promised technology is the so-called quantum repeater which uses an entangled state in order to establish long-distance quantum channel. FIG. 3 is a network diagram of a multi-span quantum network comprising quantum repeaters. This solution has not yet been demonstrated. Given its inherent complexity, the transmitters and receivers are likely to be more expensive than the single-span QKD solution and requires complex repeaters at each site. This technology has not yet been demonstrated in product.


Satellite QKD—Long Distance Solution—Yet another technology uses satellite communications for the QKD signal. FIG. 4 is a network diagram of two endpoints connected via a satellite for a QKD channel. This technology requires deployment of satellites with QKD capability which is expensive. It also requires the endpoints to have line-of-sight to the satellite. Also, this approach will face scalability issues as well.


Optical Networks

Of note, there are various approaches today for encrypting networks, using conventional PKI techniques. PKI poses a security problem in that the keys are generated based on some mathematical algorithms and the fact that there is sharing of a portion of the keys (public keys) in the open. The present disclosure addresses how optical networks can generate and distribute quantum keys as well as providing a quantum-secured channel where other keys can be distributed securely. That is, in some embodiments, in addition to QKD via the optical network, the present disclosure utilizes QC to encrypt the optical network as well. This can be required for providing the secure hardware infrastructure for QKD.


Optical networks can include various topologies with FIGS. 5-8 illustrating some example topologies for illustrating encryption on the optical channels. Those skilled in the art will appreciate these are some example network topologies; other topologies are also contemplated. FIGS. 5-8 illustrate physical locations interconnected by links and those skilled in the are will understand there is corresponding network equipment, e.g., network elements, at each of the physical locations for implementing the optical network.



FIG. 5 is a network diagram of a point-to-point link 30 such as, for example, Data Center Interconnection (DCI). Here, there are two nodes (e.g., data centers) interconnected by a single span with one or more DWDM channels. The single span means there are no intermediate sites for optical line amplifiers. The DWDM channels between the two data centers can utilize encryption thereon.



FIG. 6 is a network diagram of a point-to-point link 32 with DWDM channels with one or more additional spans 34 interconnecting enterprises or the like. This includes the DCI, e.g., along with additional optical spans to connect external users, e.g., enterprises. In this manner, there can be encrypted channels between the data centers as well as encryption between the data center and the external users, i.e., two to three spans or more, each encrypted.



FIG. 7 is a network diagram of a mesh 38 or ring 40 interconnect with DWDM channels along with one or more additional spans interconnecting enterprises or the like. This includes more than one span in the core DWDM network, i.e., a mesh, ring, or combinations. There can be multiple spans, each encrypted. FIG. 8 is a network diagram of a long-haul link 42 between two sites (data centers) along with one or more additional spans interconnecting enterprises or the like. Note, the long-haul link can include multiple other nodes including express through nodes and line amplifiers (intermediate nodes). There can be a QKD channel 44 via a satellite 46.


Again, those skilled in the art will recognize there can be various other topologies. The key here is a practical optical network is not a single span in practice. Also, again, quantum key distribution requires a single span. The present disclosure addresses how to incorporate QKD in multiple span optical networks as well as how to support QC encryption on the optical channels. As described herein and as is known in the art, a span refers to a link in an optical network between two sites, and, more specifically, between two amplifiers. The point-to-point links 30, 32 are each a single span whereas FIGS. 6-8 illustrates multiple spans. In optical networking terminology, an optical multiplex section (OMS) includes one or more spans between nodes. A multi-span OMS or link is one that includes one more line amplifiers (intermediate nodes).


QKD Box


FIGS. 9-11 illustrate the use of a QKD box 50 and key management system (KMS) 52 with an optical network. Specifically, the QKD box 50 includes various equipment integrated with optical networking equipment for enabling QKD, across multiple spans within an existing optical network. In some embodiments, the QKD box 50 is referred to herein as a Quantum-Optical Service Module (QOSM), and the KMS 52 is implemented via Key Management Modules (KMM).



FIG. 9 is a network diagram of the point-to-point link 30 from FIG. 5 illustrating the inclusion of QKD therein. In addition to the optical networking equipment used to support the point-to-point link, there can be a QKD box 50 at each site that communicate to one another via the fiber span and to the KMS 52. The QKD boxes 50 can support a high throughput, high baud modem, to provide “many” QKD sessions on one channel. As this is a single span, the reach can be about 24 dB.



FIG. 10 is a network diagram of the point-to-point link 32 with DWDM channels with one or more additional spans 34 interconnecting enterprises from FIG. 6 illustrating the inclusion of QKD therein. Here, there needs to be multiple QKD boxes 50 at the data centers, supporting the DWDM fiber link, and one for each site on the additional spans 34. Now, there is a need for end-to-end key management to extend multiple spans, paths, vendors, etc., which is implemented via the KMS 52. The KMS 52 includes an approach to securely switch keys between the QKD boxes 50. Each point-to-point link between QKD boxes 50 is a quantum-secured channel, with a quantum key between each QKD box 50 pair. The KMS 52 provides an ability to switch other keys securely between QKD boxes 50, so that the keys are never transmitted in the open, on an insecure fiber link, but rather over quantum-secured channels. Also, there can be multiple QKD boxes 50 per site, e.g., the data centers can have QKD boxes 50 for the point-to-point link 32, which is called a trunk QKD link, and then additional QKD boxes 50 facing sites on the additional spans 34. That is, each QKD link is a point-to-point connection in the optical network, similar to an optical service channel (OSCs). Also, there can be different variants of QKD modems in the QKD boxes 50, for different performance, reach, etc. This approach requires trusted nodes in the network.



FIG. 11 is a network diagram of a regional network illustrating the inclusion of QKD therein with multiple spans. This allows connecting end users via data centers between cities. The KMS 52 becomes more critical. Reach is now beyond commercial technology solutions available today. There is a requirement for a trusted node in the data center, as well as inside the optical network (e.g., at optical line amplifiers). The present disclosure includes approaches for integrated trusted nodes in the optical network. The trusted nodes can include the QKD boxes 50 and the like.


Secure Regen-Based QKD Transmission in an Optical Line System


FIG. 12 is a network diagram of an optical line span 60 between two sites A, B with an intermediate trusted node at a site E. The sites A, B are nodes and the site E is a line amplifier, with fiber spans 62, 64 between the sites A, E, B. The sites A, B can be viewed as secure, having physical security, e.g., data centers with physical access control and monitoring. However, the fiber spans 62, 64 and the site E are viewed as non-secure. Specifically, the fiber spans 62, 64 are distributed between the sites A, E, B, e.g., on the road, right-of-way, etc. The site E can be at a non-secure location, e.g., telecom hut along the road, etc.


The sites A, B include optical transponders 66, 68 and amplifiers 70, 72, 74, 76. The intermediate line amplifier site E includes amplifiers 78, 80. As is known in the art, a typical optical network includes bi-directional communication between the sites A, B typically with two fibers, namely one for transmit from the site A to the site B and one for transmit from the site B to the site A. Of course, those skilled in the art will appreciate other approaches are possible, e.g., single fiber with bi-directional WDM therein, more than two fibers, etc.


The present disclosure includes QKD devices 50 at each of the sites A, E, B. The QKD devices 50 include QKD transmitters (Tx) and receivers (Rx). At the sites A, B, the QKD devices 50 include a single QKD Tx/Rx whereas at the site E, the QKD device 50 includes back-to-back QKD Tx/Rx in physically secure hardware, i.e., the QKD device 50 at the site E can be a physically secure trusted node at the site E. The physically secure trusted node can be a secure QKD regenerator, i.e., back-to-back QKD Tx/Rx. As is described herein, this can replace the existing OSC. Note, the QKD device 50 at the sites A, B can also be in a secure enclosure. One aspect of the physically secure hardware can include detection of any access attempt, e.g., alarm, so that any keys can be revoked, reissued, etc.


The operating principle is to use standard QKD technology plus additional session key transfer features at the end points, but in the insecure amplifier locations, to provide a secure deployment of the same QKD technology. The product provides a physically secured tamper proof environment for the QKD such that the unprotected key data is never exposed. Tampering with the QKD equipment results in destruction of the transponder and the key material itself. Similar tamper-proof designs are used in Federal Information Processing Standard (FIPS) compliant equipment today for any location where key material can be found.


In this way, one can provide an arbitrary number of fiber spans between the endpoints and create a secure network which can span the usual distances required by fiber optic transmission equipment today. There can be a REST API 82 between the QKD Tx/Rx at the sites A, B, and the optical transponders for also enabling QC encryption on the fiber span.


Hyper Service Channel (HSC)

Conventional optical networks utilize a so-called OSC (optical service channel or optical supervisory channel). This is a point-to-point channel, optically terminated at every node, including ROADMs, terminals, OADMs, line amplifiers, etc., with a wavelength that is typically out-of-band relative to traffic channels (i.e., outside of the amplification band). The OSC channel is used to provide Operations, Administration, Maintenance, and Provisioning (OAM&P) communications between every node. Specifically, intermediate optical amplifiers have no access to digital communications as the inputs and outputs are all optical through the amplifiers included therein. That is, conventional optical networks with amplifiers include OSCs throughout, providing a point-to-point network for telemetry, OAM&P, and the like, such as at the site E.


In various embodiments, the present disclosure contemplates a new channel that can take the place of the OSC. We call this channel a Hyper Service Channel (HSC), but those skilled in the art will recognize other names can be used. This channel can support:

    • 1) QKD service channels, including clocking, two-way communications for postprocessing operations, etc.,
    • 2) Session Key Transfer service channel,
    • 3) Conventional OSC communication carrying inter-node communications, clocking, remote updates, etc., and/or
    • 4) Key Management Service channel.


This can be referred to as a multi-degree quantum-optical trusted repeater system for quantum-secured optical channels. By utilizing an end-to-end multi-degree integrated quantum-optical architecture based on a quantum-secured coherent hyper service channel described herein, the present disclosure provides a higher level of security comparing to the current trusted node solutions and can be scaled for the deployment of quantum-secured channels in a large-scale network environment. Advantageously, this architecture can be integrated into existing optical line systems, allowing QKD, key management, and the like in addition to traditional OSC communications.


Multi-Degree Quantum-Optical Trusted Repeater System

The purpose of the present disclosure, i.e., the multi-degree quantum-optical trusted repeater system for quantum-secured optical channels, is to extend the reach of the QKD-based quantum-secured optical channels to long distances beyond the limit of the non-repeater-based systems (a single span). The present disclosure reuses the concepts of trusted nodes and QKD, and incorporates them into an optical line system. This end-to-end concept provides a versatile and highly secure trusted system for transporting long-distance quantum-secured optical channels in a network environment.



FIG. 13 is a network diagram of the optical line span 60 with a two-degree quantum-optical trusted repeater system 100 at the site E. Note, this is a subset of a typical deployment, i.e., two-degrees, and those skilled in the art will appreciate practical embodiments may include more than two-degrees.


This end-to-end architecture of the optical line span includes two types of nodes: a Quantum-Optical User Node, such as at the sites A (Alice), B (Bob), and the Quantum-Optical Trusted Repeater System 100 at the site E. Basically, terminal sites include the Quantum-Optical User Node and intermediate line amplifier sites include the Quantum-Optical Trusted Repeater System 100. As described herein, the functionality described herein can be modules, and a module can be realized with physical hardware including circuitry, optical interfaces, firmware, software, and the like, to perform the associated functionality described herein.


Each one of the Quantum-Optical User Nodes (Alice and Bob) includes four main modules.


1) Ks Generator Module: The Session Key (Ks) Generator module generates the session keys that will be used to secure an end-to-end long-distance communication between the sites A, B.


2) Quantum-Optical Service Module (QOSM): In tandem with its corresponding QKD QOSM inside the Two-Degree Quantum-Optical Trusted Repeater System (TDQOTRS), this module conducts the following operations:

    • 2.1) Generating QKD keys (KQKD) via the Quantum and QKD service channels.
    • 2.2) Receiving the Session Keys (Ks) from the Ks Generator module and passing them to the TDQOTRS (if there is an intermediate line amplifier).
    • 2.3) Establishing the required service channels for the QKD key generation process to provide services such as clocking and two-way communications for postprocessing operations.
    • 2.4) Establishing the Session Key Transfer channel to transfer/receive the Session Keys (Ks).
    • 2.5) Establishing an OSC to provide services such as inter-node communications, clocking and remote updates/diagnosis.
    • 2.6) Establishing the Key Management Service channel (discussed later herein).
    • 2.7) Providing the established Session Keys (Ks) to the Optical Data Module
    • 2.8) Multiplexing/demultiplexing all the QKD service channels, the Session Key Transfer channel, the OSC channel and the Key Management Service channel into a Hyper Service Channel (HSC). The HSC channel can be a coherently-modulated channel.
    • 2.9) Using the QKD-generated keys to quantum-secure the coherent Hyper Service Channel (HSC).


3) Optical Data Module: This module uses the Session Keys (Ks) to encrypt the optical data channels using an optical-layer encryption method (such as AES-256).


4) Mux/Demux Module: This module multiplex/demultiplex the Quantum Channel, the HSC and the optical data channels into/out of the transport fiber. This is used when the HSC is on the same fiber as the traffic-carrying channels.


5) Control Module: This module conducts the key management operation at the Quantum-Optical User Nodes via communications with the Key Management Module (discussed later) over the HSC.


These Quantum-Optical User Nodes are served as the end nodes and might be located at the terminal nodes in the optical network. Conversely, the Two-Degree Quantum-Optical Trusted Repeater System (TDQOTRS) are located at intermediate line amplifier sites.


The TDQOTRS includes three main modules:


1) Quantum-Optical Service Module (QOSM): This module mirrors the QOSM on the Quantum-Optical User Nodes (Alice or Bob), providing all the required services described before and also exchanging the Session Keys (Ks) from one Quantum-Optical User Node to the other via passing it to the other QOSM.


2) Mux/Demux: This module mirrors the Mux/Demux module on the Quantum-Optical User Nodes, as discussed before.


3) Optical Amplifier/Regen: This module amplifies/regenerates the optical data channels, as required.


The Quantum-Optical User Node that initiates the session generates the Session Keys (Ks) using the Session Key (Ks) Generator module, as frequently as required, during the communication period. The Session Keys (Ks) are transferred quantum-securely between each Quantum-Optical User Node and the TDQOTRS. Inside the TDQOTRS, the Session Keys (Ks) are transferred from one QOSM to the next and eventually to the other Quantum-Optical User Node. Therefore, the present disclosure requires a trusted system for the Session Key (Ks) transfer between the spans, hence the word “Trusted” in the Quantum-Optical Trusted Repeater System. Depending on the distance between the two communication parties, as many TDQOTRS as required could be utilized to connect the short-distance spans (over which QKD can be established). Obviously, one might consider a simpler version of this by only quantum-securing the Session Key Transfer channel using a QKD-generated key for each span instead of the entire HSC. However, that implementation would lower/nullify the high level of security provided by the quantum-secured coherent HSC methodology proposed in this invention.



FIG. 14 is a diagram of a Multi-Degree Quantum-Optical Trusted Repeater System (MDQOTRS) 200. The Multi-Degree Quantum-Optical Trusted Repeater System (MDQOTRS) utilizes the same idea discussed for the Two-Degree Quantum-Optical Trusted Repeater System, expanded into multi-degrees to support multi users. The MDQOTRS 200 can be deployed at a terminal node that supports more than one degree, to enable secure key transport between degrees.


In addition to the QOSM, Mux/Demux and the Optical Amplifier/Regen modules discussed in the Two-Degree case, the Multi-Degree Quantum-Optical Trusted Repeater System (MDQOTRS) also contains the following modules:


1) Session Key Transfer Switch: This module transfers the Session Keys (Ks) between different Quantum-Optical User Nodes depending on the session request submitted by each one of those nodes to the Key Management Module.


2) Optical Switch: This module connects the optical data channels between different users depending on the session request submitted by the users to the Key Management Module.


3) Control Module: This module controls the Session Key Transfer Switch and the Optical Switch based on the communications with the Key Management Module (discussed later).



FIG. 15 illustrates a diagram of a Multi-Degree Quantum-Optical Trusted Repeater System in a Network Environment. The Multi-Degree Quantum-Optical Trusted Repeater System (MDQOTRS) operates in a network environment with multiple Quantum-Optical User Nodes in coordination with the Key Management Module (KMM). Once a Quantum-Optical User Node submits a request to the KMM to establish an end-to-end quantum-secured communication channel with another user, the KMM communicates that request to the Control Module inside each MDQOTRS to establish the end-to-end quantum-secured channel.



FIGS. 14 and 15 depict the present disclosure for four users (sites Alice, Bob, Charlie, and Deborah) to convey the idea. However, those skilled in the art will appreciate there is no limit on the number of users that the MDQOTRS can support. Even multiple ports in a MDQOTRS can be assigned as backup routes for a single Quantum-Optical User Node to provide rerouting in case of a route failure, thereby increasing the network reliability.


Several MDQOTRS systems can be connected to support a large network topology in any shape and form.


Multiple Key Management Modules (KMM) could be deployed as a part of an overall key management system for a network in order to eliminate a single point of failure for the key management process.


HSC/OSC Encryption

The OSC is also a vulnerability to attack both the classical channel and the communication. One element of the novelty here is the use of a quantum encrypted (self generated at the repeater) and the use of a coherent channel for the OSC (to reduce cross talk as an attack vector).


Technology and Standardization

It is noted there will need to be QKD interoperability standards for multi-vendor support, and the present disclosure contemplates various approaches including, e.g.,

    • Continuous-variable quantum key distribution (CV-QKD)
    • Discrete-variable quantum key distribution (DV-QKD)
    • Entanglement-based QKD
    • Measurement-device-independent quantum key distribution (MDI-QKD)
    • Coherent one-way (COW) QKD
    • Bennett-Brassard 1984 (BB84) protocol
    • Twin-field (TF) QKD
    • Bennett, Brassard and Mermin in 1992 (BBM92) protocol


Physical Security

Various physical devices described herein, such as the QKD device 50, the Quantum-Optical Service Modules (QOSM), the session key transfer switch, and the like, can be secured in that any attempt to access these physical devices can raise an alarm, notification, etc. Further, any attempt can cause nullification of keys. This ensures the quantum-secured channel maintains its security. In this manner, the system is protected from intrusions, from rogue repeaters, etc. For example, a rogue repeater can be a device that is added to the system or where an existing device is taken over by a third party.


Authentication for Startup

Prior to startup of the quantum-secured channel, there is a requirement to authenticate the associated modules in the quantum-secured channel, i.e., to ensure they are trusted, not compromised, not rogue, etc. In a point-to-point system the endpoints are assumed to be secured locations and the quantum-secured channel protects the transmission between the end points. The user does the authentication, i.e., provides key material, at the protected endpoints. In an optical network, every ROADM or terminal node can be an endpoint. The problem of quantum repeaters in the middle is that they are not protected, but rather trusted nodes.


The present disclosure contemplates an authentication process where each component, e.g., the QKD device 50, the Quantum-Optical Service Modules (QOSM), the session key transfer switch, and the like, are authenticated before they start the quantum-secured channel, for the purpose of ensuring the devices are trusted. The present disclosure contemplates various approaches including visual inspection, certificates installed on the physical devices, etc. For example, a user can validate that the equipment is as expected visually before applying the authentication for the current link (between the two ends of a quantum-secured channel). The issue is that if the authentication was more automatic, each node in the link would be remotely authenticated without verification that the equipment is not compromised. This compromise can be prevented by applying physical means like potting, fuses, tamperproof packaging, etc. such that compromised equipment becomes inoperable or obviously tampered with. Remote authentication without inspection may open the system up to rogue equipment, i.e., rogue repeater, which could be compromised. The authentication process should therefore be a one-time process which is locked out once key materials are validated at system turn up. To repair a compromised line (each node on the two ends of a quantum-secured channel) would require site visits to the trusted nodes to put them back into authentication mode and the link brought up link by link.


CONCLUSION

It will be appreciated that some embodiments described herein may include one or more generic or specialized processors (“one or more processors”) such as microprocessors; central processing units (CPUs); digital signal processors (DSPs): optical and quantum-specific elements, customized processors such as network processors (NPs) or network processing units (NPUs), graphics processing units (GPUs), or the like; field programmable gate arrays (FPGAs); and the like along with unique stored program instructions (including both software and firmware) for control thereof to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the methods and/or systems described herein. Alternatively, some or all functions may be implemented by a state machine that has no stored program instructions, or in one or more application-specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic or circuitry. Of course, a combination of the aforementioned approaches may be used. For some of the embodiments described herein, a corresponding device in hardware and optionally with software, firmware, and a combination thereof can be referred to as “circuitry configured or adapted to,” “logic configured or adapted to,” etc. perform a set of operations, steps, methods, processes, algorithms, functions, techniques, etc. on digital and/or analog signals as described herein for the various embodiments.


Moreover, some embodiments may include a non-transitory computer-readable storage medium having computer-readable code stored thereon for programming a computer, server, appliance, device, processor, circuit, etc. each of which may include a processor to perform functions as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, an optical storage device, a magnetic storage device, a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), Flash memory, quantum memory and the like. When stored in the non-transitory computer-readable medium, software can include instructions executable by a processor or device (e.g., any type of programmable circuitry or logic) that, in response to such execution, cause a processor or the device to perform a set of operations, steps, methods, processes, algorithms, functions, techniques, etc. as described herein for the various embodiments.


Although the present disclosure has been illustrated and described herein with reference to preferred embodiments and specific examples thereof, it will be readily apparent to those of ordinary skill in the art that other embodiments and examples may perform similar functions and/or achieve like results. All such equivalent embodiments and examples are within the spirit and scope of the present disclosure, are contemplated thereby, and are intended to be covered by the following claims. Further, the various elements, operations, steps, methods, processes, algorithms, functions, techniques, modules, circuits, etc. described herein contemplate use in any and all combinations with one another, including individually as well as combinations of less than all of the various elements, operations, steps, methods, processes, algorithms, functions, techniques, modules, circuits, etc.

Claims
  • 1. A node for operation in an optical network, the node comprising: one or more degrees each connected to a corresponding optical span including one or more fibers; andone or more Quantum-Optical Service Modules (QOSM) for each of the one or more degrees, each QOSM supporting Quantum Key Distribution (QKD) for establishing a quantum-secured channel and Optical Service Channel (OSC) functionality over the quantum-secured channel.
  • 2. The node of claim 1, wherein each quantum-secured channel is formed with an adjacent node which is one of another node or a line amplifier, and wherein the one or more QOSMs include circuitry configured to exchange keys over the quantum-secured channel.
  • 3. The node of claim 2, further comprising one or more optical modems configured to support traffic channels over an optical span, wherein data transmitted via the one or more modems is encrypted based on one of the keys.
  • 4. The node of claim 1, wherein a QOSM of the one or more QOSMs includes a transmitter and receiver, each supporting coherent modulation.
  • 5. The node of claim 1, wherein the one or more QOSMs include a plurality of QOSMs, and further comprising a session key transfer switch configured to switch keys from a first QOSM to a second QOSM, of the plurality of QOSMs.
  • 6. The node of claim 1, wherein a QOSM of the one or more QOSMs includes circuitry configured to implement a QKD service channel, a session key transfer service channel, the OSC functionality, and a key management service channel.
  • 7. The node of claim 1, wherein a QOSM of the one or more QOSMs includes circuitry configured to implement a QKD service channel, wherein the circuitry is further configured to detect an intrusion on the QKD service channel and to one or more of provide an alarm and nullify any keys based thereon.
  • 8. The node of claim 1, further comprising circuitry configured to implement an Application Programming Interface (API) between the one or more QOSMs and any data interfaces connected to associated degrees.
  • 9. The node of claim 1, wherein a QOSM of the one or more QOSMs includes a hardened enclosure configured to detect physical intrusions and to adjust any keys based on detection of the physical intrusions.
  • 10. The node of claim 1, further comprising a plurality optical modems configured to support traffic channels over the one or more degrees, wherein data transmitted via the plurality optical modems is encrypted based on a key from a corresponding QOSM, and at least two of the plurality optical modems utilize different keys.
  • 11. An intermediate node for operation in an optical network, the intermediate node comprising: one or more optical amplifiers configured to amplify optical channels over an optical span in the optical network; anda trusted quantum repeater, connected to the optical span, and configured to support Quantum Key Distribution (QKD) for establishing a first quantum-secured channel and a second quantum-secured channel and Optical Service Channel (OSC) functionality over the first quantum-secured channel and the second quantum-secured channel.
  • 12. The intermediate node of claim 11, wherein the optical channels through the one or more optical amplifiers are encrypted based on a key exchanged between nodes through the first quantum-secured channel and the second quantum-secured channel.
  • 13. The intermediate node of claim 11, wherein the trusted quantum repeater includes a first transceiver connected to the first quantum-secured channel and a second transceiver connected to the second quantum-secured channel, wherein each of the first transceiver and the second transceiver utilize encryption based on the QKD.
  • 14. The intermediate node of claim 13, wherein each of the first transceiver and the second transceiver support coherent modulation.
  • 15. The intermediate node of claim 11, wherein the trusted quantum repeater includes circuitry configured to securely transfer keys between the first quantum-secured channel and the second quantum-secured channel.
  • 16. The intermediate node of claim 11, wherein the trusted quantum repeater includes circuitry configured to implement a QKD service channel, a session key transfer service channel, the OSC functionality, and a key management service channel.
  • 17. The intermediate node of claim 11, wherein the trusted quantum repeater includes circuitry configured to implement a QKD service channel, wherein the circuitry is further configured to detect an intrusion on the QKD service channel and to one or more of provide an alarm and nullify any keys based thereon.
  • 18. The intermediate node of claim 11, wherein the trusted quantum repeater includes a hardened enclosure configured to detect physical intrusions and to adjust any keys based on detection of the physical intrusions.
  • 19. The intermediate node of claim 11, further comprising a hardened enclosure including the one or more optical amplifiers and the trusted quantum repeater, and circuitry configured to detect physical intrusions and to adjust any keys based on detection of the physical intrusions.
  • 20. The intermediate node of claim 11, wherein the optical channels include a plurality of optical channels, at least two of which utilize different keys for encryption thereof.
CROSS-REFERENCE TO RELATED APPLICATIONS

The present disclosure claims priority to U.S. Provisional Patent Application Ser. No. 63/585,545, entitled “Quantum key distribution in an optical network and protection thereof,” and filed Sep. 26, 2023, the contents of which are incorporated by reference in their entirety.

Provisional Applications (1)
Number Date Country
63585545 Sep 2023 US