Abstract
Asymmetric cryptography, specifically key exchange and digital signatures, enables secure
digital communication. However, sufficiently powerful Quantum Computers, which could
be available within a few years , would be able to break classical primitives like
Elliptic-Curve Diffie–Hellman (ECDH) and RSA in polynomial time. Moreover, the
„harvest-then-decrypt“-attack poses the danger that stored encrypted data can be
decrypted later. Thus, alternative approaches are urgently needed. Besides Post Quantum
Cryptography (PQC), which is based on mathematical problems, Quantum Key
Distribution (QKD) uses quantum effects, to establish keys in an information-theoretically
secure way. Nevertheless, there are no reliable QKD modules that bridge distances
of more than 150 km. Therefore, a QKD Network (QKDN) uses a concatenation of
QKD links. End users are connected to each other via a series of QKD nodes performing
a hop-by-hop key forwarding. All nodes involved have access to the final shared secret.
If a node cannot be trusted the security of the system is no longer guaranteed. Physical
protection or key hybridization can mitigate this risk, where hybridization refers to the
combination of QKD and PQC. By using both schemes appropriately, the security objectives
are met as long as at least one of the schemes used has not been compromised.
Nonetheless, there is a lack of concrete concepts and analyzes to enable a secure and
efficient key forwarding process. In the following, ’secure’ implies the security objectives of
confidentiality and authenticity. ’Efficient’ refers to the time taken to complete the process,
the amount of data transferred and the amount of computing required. The analyses available
often only consider specific sub-processes, e.g., forwarding between two directly adjacent
nodes. The integration into the entire system and its resulting effects are disregarded. A
systematic comparison of different options is missing. When implementing a QKDN, it is
unclear which variant is suitable for one’s own intentions. This PhD project aims to address
the problem by defining the key establishment process, analyzing security requirements,
designing and implementing corresponding schemes, and evaluating these approaches.