1
/
of
12
PayPal, credit cards. Download editable-PDF and invoice in 1 second!
GM/T 0114-2021 English PDF (GM/T0114-2021)
GM/T 0114-2021 English PDF (GM/T0114-2021)
Regular price
$590.00
Regular price
Sale price
$590.00
Unit price
/
per
Shipping calculated at checkout.
Couldn't load pickup availability
GM/T 0114-2021: Decoy-state BB84 quantum key distribution product test specification
Delivery: 9 seconds. Download (& Email) true-PDF + Invoice.
Get Quotation: Click GM/T 0114-2021 (Self-service in 1-minute)
Historical versions (Master-website): GM/T 0114-2021
Preview True-PDF (Reload/Scroll-down if blank)
GM/T 0114-2021
GM
CRYPTOGRAPHIC INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.030
L 80
Decoy-state BB84 quantum key distribution product test
specification
ISSUED ON: OCTOBER 18, 2021
IMPLEMENTED ON: MAY 01, 2022
Issued by: State Cryptography Administration
Table of Contents
Foreword ... 3
1 Scope ... 4
2 Normative references ... 4
3 Terms and definitions ... 5
4 Symbols and abbreviations ... 8
4.1 Symbols ... 8
4.2 Abbreviations ... 9
5 Detection environment ... 9
5.1 Test reference point ... 9
5.2 Detection environment ... 10
6 Detection content ... 19
6.1 Detection of protocol implementation requirements ... 19
6.2 Detection of quantum key distribution product ... 25
7 Detection method ... 29
7.1 Protocol implementation requirements detection... 29
7.2 Anti-attack detection ... 46
7.3 Detection of quantum key distribution product ... 52
8 Qualification judgment ... 57
Appendix A (Informative) Detection instruments ... 58
References ... 59
Decoy-state BB84 quantum key distribution product test
specification
1 Scope
This document specifies the detection content and methods of the protocol
implementation requirements and basic product requirements of the decoy-state BB84
quantum key distribution product, based on the use of weak coherent state light source.
This document is applicable to the detection of decoy-state BB84 quantum key
distribution products, which are developed in accordance with GM/T 0108-2021; it can
also be used to guide the development. The system security based on quantum key
distribution products and the security of their classical channel networks are not within
the scope of this document.
2 Normative references
The contents of the following documents constitute the essential provisions of this
document through normative references in the text. Among them, for referenced
documents with dates, only the version corresponding to that date applies to this
document; for referenced documents without dates, the latest version (including all
amendments) applies to this document.
GB/T 2423.1 Environmental testing for electric and electronic products - Part 2: Test
methods - Tests A: Cold
GB/T 2423.2 Environmental testing for electric and electronic products - Part 2: Test
methods - Tests B: Dry heat
GB/T 5080.7 Equipment reliability testing - Compliance test plans for failure rate
and mean time between failures assuming constant failure rate
GB/T 15843.2 Information technology - Security techniques - Entity authentication
- Part 2: Mechanisms using symmetric encipherment algorithms
GB/T 15843.4 Information technology - Security techniques - Entity authentication
- Part 4: Mechanisms using a cryptographic check function
GB/T 15852.1 Information technology - Security techniques - Message
authentication codes - Part 1: Mechanisms using a block cipher
GB/T 15852.2 Information technology - Security techniques - Message
Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-
function
GB/T 15852.3 Information technology - Security techniques - Message
authentication codes (MACs) - Part 3: Mechanisms using a universal hash-function
GB/T 32915 Information security technology - Randomness test methods for binary
sequence
GB/T 37092 Information security technology - Security requirements for
cryptographic modules
GB/T 38625 Information security technology - Security test requirements for
cryptographic modules
GM/T 0062 Random number test requirements for cryptographic modules
GM/T 0108-2021 Technical specification for decoy state BB84 quantum key
distribution product
GM/Z 4001 Cryptographic terminology
3 Terms and definitions
The terms and definitions defined in GB/T 37092, GM/T 0050, GM/Z 4001 apply to
this document.
3.1
Privacy amplification
The process in which the transmitter and the receiver perform mathematical
processing on the error-corrected key to extract the shared key from it.
3.2
BB84 protocol
A quantum key distribution protocol proposed by Charles Henry Bennett and Gilles
Brassard in 1984.
3.3
Basis sifting
Also called sifting, it refers to the process in which the transmitter and receiver
the quantum state transmission process meets the requirements of the decoy-state BB84
protocol.
The transmitter sends the light pulse of the quantum state loaded with information that
meets the requirements of 6.2.1 of GM/T 0108-2021 to the receiver, through the
quantum channel; records the light intensity preparation information and encoding
information of the emitted pulse.
6.1.3 Detection of quantum state measurement process
6.1.3.1 Decoding process
The purpose of the decoding process detection is to detect whether the decoding process
of the receiver meets the requirements of the decoy-state BB84 protocol.
The decoding process is that the receiver randomly selects a measurement basis to
demodulate the quantum state loaded with information sent by the transmitter. It shall
meet the decoding requirements of GM/T 0108-2021.
During the decoding process, if the receiver is an active basis selection scheme, it shall
at least have the ability to resist Trojan horse attacks.
During the decoding process, if the receiver is an active basis selection scheme (no state
selection), it shall at least have the ability to resist fluorescence attacks; if the receiver
is an active basis selection scheme (no state selection) and uses multiple detectors, it
shall at least have the ability to resist forged state attacks, time displacement attacks,
device calibration attacks.
During the decoding process, if the receiver is a passive basis selection scheme, it shall
at least have the ability to resist wavelength-related attacks and fluorescence attacks; if
the receiver is a passive basis selection scheme and uses multiple detectors, it shall at
least have the ability to resist forged state attacks, time displacement attacks, device
calibration attacks.
For recommended measures to resist related attacks during the decoding process, see
b), c), d), e), f) in Appendix C of GM/T 0108-2021.
6.1.3.2 Detection process
The detection process includes interface detection, key attribute detection, anti-
detection process attack detection. The detection purposes are to detect whether the
interface attributes and key attributes of the detector meet the requirements of the BB84
protocol in the decoy-state, whether measures to resist related attacks during the
detection process are taken.
The detection process is the detection of a single photon as an information carrier,
converting the quantum state information of the detected light pulse into classical bit
information to obtain the original key. The current implementation method is mainly
based on single-photon detectors.
The detection process shall comply with the interface requirements, key attribute
requirements, anti-attack measures requirements of 6.2.3.2 of GM/T 0108-2021. For
recommended measures to resist related attacks during the detection process, see g), h),
i), j), k) in Appendix C of GM/T 0108-2021.
6.1.4 Detection of basis sifting process
The basis sifting process is that the transmitter and the receiver compare the coding
basis used in the preparation of the quantum state with the measurement basis used by
the receiver. Both parties only retain the data of the same basis vector, to generate the
post-screening key. The purpose of the basis sifting process detection is to detect
whether the basis sifting process of the transmitter and the receiver meets the
requirements of the decoy-state BB84 protocol.
The basis sifting process shall meet the requirements of the basis sifting process of
GM/T 0108-2021.
6.1.5 Detection of error correction process
The error correction process is that the transmitter and the receiver correct the quantum
error bits in the post-screening key at both ends, to obtain a consistent key, that is, the
error-corrected key. The purpose of the error correction process detection is to detect
whether the error correction process of the transmitter and the receiver meets the
requirements of the decoy-state BB84 protocol.
The error correction process shall meet the requirements of the error correction process
of GM/T 0108-2021.
6.1.6 Detection of security enhancement process
The security enhancement process refers to the process in which the transmitter and the
receiver use the hash function class to hash the error-corrected key and extract the
shared key. The purpose of the security enhancement process detection is to detect
whether the security enhancement process of the transmitter and receiver meets the
requirements of the BB84 protocol in a decoy-state.
The security enhancement process shall meet the requirements of the security
enhancement process of GM/T 0108-2021.
6.2 Detection of quantum key distribution product
6.2.1 Basic testing
6.2.1.1 Functional testing
Quantum key distribution product functional testing includes protocol implementation
requirements testing, shared key randomness testing, shared key consistency testing.
The purpose of the protocol implementation requirements testing is to detect whether
the process of quantum key distribution product key generation follows the decoy BB84
protocol. The purpose of the shared key randomness testing is to detect whether the
randomness of the key generated by the quantum key distribution product meets the
performance requirements of the quantum key distribution product. The purpose of the
shared key consistency testing is to detect whether the shared keys generated by the
transmitter and receiver of the quantum key distribution product are consistent.
Quantum key distribution products shall follow the decoy BB84 protocol and shall
comply with the requirements of 6.1 and 6.2 in GM/T 0108-2021. The randomness of
the shared key generated by the quantum key distribution product shall comply with the
requirements of GB/T 32915. The shared keys generated by the transmitter and receiver
of the quantum key distribution product shall be consistent.
6.2.1.2 Performance testing
6.2.1.2.1 Shared key generation rate
The purpose of the shared key generation rate testing is to detect whether the amount
of shared keys generated by the quantum key distribution product per unit time meets
the requirements of the inspection document.
The quantum key distribution product shall meet the requirements of the shared key
generation rate specified in the product inspection document.
6.2.1.2.2 Maximum distance
The purpose of the maximum distance testing of the quantum key distribution product
is to detect the maximum length of the quantum channel between the transmitter and
the receiver of the quantum key distribution product, under the premise of meeting the
performance and security requirements.
The quantum key distribution product shall meet the requirements of the maximum
distance specified in the product inspection document.
6.2.1.2.3 Environmental adaptability and reliability
The purpose of the environmental adaptability testing is to detect the adaptability of the
quantum key distribution product to the working environment; the purpose of the
reliability test is to detect the mean time between failures of the quantum key
distribution product.
The working environment of the quantum key distribution product shall meet the
have the ability to replay attacks.
6.2.3 Interface detection
The purpose of interface detection is to detect whether the type and function of the
interface of the quantum key distribution product meet the requirements of the quantum
key distribution product.
The interface of the quantum key distribution product shall meet the interface
requirements of GM/T 0108-2021.
6.2.4 Detection of random number generator
The purpose of random number generator detection is to detect whether the random
number generator used in the quantum key distribution product meets the requirements
of the quantum key distribution product.
The random number generator used in the quantum key distribution product shall be
approved by the national cryptography management department.
The random number generator used in the quantum key distribution product shall use a
random number generator based on physical processes; it can pass the random number
detection in four different application stages of sample delivery detection, exit-factory
detection, power-on detection, use detection; it shall meet the requirements of Class D
products in GM/T 0062.
6.2.5 Log management detection
The purpose of log management detection is to detect whether the management of logs
by quantum key distribution products meets the requirements of quantum key
distribution products.
The quantum key distribution product shall provide a log function; the log can be
viewed and exported.
The log content includes:
a) Operational behavior, including login authentication, system configuration, key
management and other operations;
b) Security events, including connection with the management platform, key
generation, key update, key destruction and other events;
c) Abnormal events, including authentication failure, illegal access, integrity check
failure and other abnormal events.
6.2.6 Remote management detection
The purpose of remote management detection is to detect whether the remote
management function of quantum key distribution products meets the requirements of
quantum key distribution products.
The remote management of quantum key distribution products shall comply with the
requirements of 7.6 in GM/T 0108-2021.
7 Detection method
7.1 Protocol implementation requirements detection
7.1.1 Base preparation detection
7.1.1.1 Relative error of coding base conjugation
Take the detection of relative error of coding base conjugation of phase-coded quantum
key distribution products as an example:
- Detection conditions:
a) The dotted box part shall select the transmitter base/state pr...
Delivery: 9 seconds. Download (& Email) true-PDF + Invoice.
Get Quotation: Click GM/T 0114-2021 (Self-service in 1-minute)
Historical versions (Master-website): GM/T 0114-2021
Preview True-PDF (Reload/Scroll-down if blank)
GM/T 0114-2021
GM
CRYPTOGRAPHIC INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.030
L 80
Decoy-state BB84 quantum key distribution product test
specification
ISSUED ON: OCTOBER 18, 2021
IMPLEMENTED ON: MAY 01, 2022
Issued by: State Cryptography Administration
Table of Contents
Foreword ... 3
1 Scope ... 4
2 Normative references ... 4
3 Terms and definitions ... 5
4 Symbols and abbreviations ... 8
4.1 Symbols ... 8
4.2 Abbreviations ... 9
5 Detection environment ... 9
5.1 Test reference point ... 9
5.2 Detection environment ... 10
6 Detection content ... 19
6.1 Detection of protocol implementation requirements ... 19
6.2 Detection of quantum key distribution product ... 25
7 Detection method ... 29
7.1 Protocol implementation requirements detection... 29
7.2 Anti-attack detection ... 46
7.3 Detection of quantum key distribution product ... 52
8 Qualification judgment ... 57
Appendix A (Informative) Detection instruments ... 58
References ... 59
Decoy-state BB84 quantum key distribution product test
specification
1 Scope
This document specifies the detection content and methods of the protocol
implementation requirements and basic product requirements of the decoy-state BB84
quantum key distribution product, based on the use of weak coherent state light source.
This document is applicable to the detection of decoy-state BB84 quantum key
distribution products, which are developed in accordance with GM/T 0108-2021; it can
also be used to guide the development. The system security based on quantum key
distribution products and the security of their classical channel networks are not within
the scope of this document.
2 Normative references
The contents of the following documents constitute the essential provisions of this
document through normative references in the text. Among them, for referenced
documents with dates, only the version corresponding to that date applies to this
document; for referenced documents without dates, the latest version (including all
amendments) applies to this document.
GB/T 2423.1 Environmental testing for electric and electronic products - Part 2: Test
methods - Tests A: Cold
GB/T 2423.2 Environmental testing for electric and electronic products - Part 2: Test
methods - Tests B: Dry heat
GB/T 5080.7 Equipment reliability testing - Compliance test plans for failure rate
and mean time between failures assuming constant failure rate
GB/T 15843.2 Information technology - Security techniques - Entity authentication
- Part 2: Mechanisms using symmetric encipherment algorithms
GB/T 15843.4 Information technology - Security techniques - Entity authentication
- Part 4: Mechanisms using a cryptographic check function
GB/T 15852.1 Information technology - Security techniques - Message
authentication codes - Part 1: Mechanisms using a block cipher
GB/T 15852.2 Information technology - Security techniques - Message
Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-
function
GB/T 15852.3 Information technology - Security techniques - Message
authentication codes (MACs) - Part 3: Mechanisms using a universal hash-function
GB/T 32915 Information security technology - Randomness test methods for binary
sequence
GB/T 37092 Information security technology - Security requirements for
cryptographic modules
GB/T 38625 Information security technology - Security test requirements for
cryptographic modules
GM/T 0062 Random number test requirements for cryptographic modules
GM/T 0108-2021 Technical specification for decoy state BB84 quantum key
distribution product
GM/Z 4001 Cryptographic terminology
3 Terms and definitions
The terms and definitions defined in GB/T 37092, GM/T 0050, GM/Z 4001 apply to
this document.
3.1
Privacy amplification
The process in which the transmitter and the receiver perform mathematical
processing on the error-corrected key to extract the shared key from it.
3.2
BB84 protocol
A quantum key distribution protocol proposed by Charles Henry Bennett and Gilles
Brassard in 1984.
3.3
Basis sifting
Also called sifting, it refers to the process in which the transmitter and receiver
the quantum state transmission process meets the requirements of the decoy-state BB84
protocol.
The transmitter sends the light pulse of the quantum state loaded with information that
meets the requirements of 6.2.1 of GM/T 0108-2021 to the receiver, through the
quantum channel; records the light intensity preparation information and encoding
information of the emitted pulse.
6.1.3 Detection of quantum state measurement process
6.1.3.1 Decoding process
The purpose of the decoding process detection is to detect whether the decoding process
of the receiver meets the requirements of the decoy-state BB84 protocol.
The decoding process is that the receiver randomly selects a measurement basis to
demodulate the quantum state loaded with information sent by the transmitter. It shall
meet the decoding requirements of GM/T 0108-2021.
During the decoding process, if the receiver is an active basis selection scheme, it shall
at least have the ability to resist Trojan horse attacks.
During the decoding process, if the receiver is an active basis selection scheme (no state
selection), it shall at least have the ability to resist fluorescence attacks; if the receiver
is an active basis selection scheme (no state selection) and uses multiple detectors, it
shall at least have the ability to resist forged state attacks, time displacement attacks,
device calibration attacks.
During the decoding process, if the receiver is a passive basis selection scheme, it shall
at least have the ability to resist wavelength-related attacks and fluorescence attacks; if
the receiver is a passive basis selection scheme and uses multiple detectors, it shall at
least have the ability to resist forged state attacks, time displacement attacks, device
calibration attacks.
For recommended measures to resist related attacks during the decoding process, see
b), c), d), e), f) in Appendix C of GM/T 0108-2021.
6.1.3.2 Detection process
The detection process includes interface detection, key attribute detection, anti-
detection process attack detection. The detection purposes are to detect whether the
interface attributes and key attributes of the detector meet the requirements of the BB84
protocol in the decoy-state, whether measures to resist related attacks during the
detection process are taken.
The detection process is the detection of a single photon as an information carrier,
converting the quantum state information of the detected light pulse into classical bit
information to obtain the original key. The current implementation method is mainly
based on single-photon detectors.
The detection process shall comply with the interface requirements, key attribute
requirements, anti-attack measures requirements of 6.2.3.2 of GM/T 0108-2021. For
recommended measures to resist related attacks during the detection process, see g), h),
i), j), k) in Appendix C of GM/T 0108-2021.
6.1.4 Detection of basis sifting process
The basis sifting process is that the transmitter and the receiver compare the coding
basis used in the preparation of the quantum state with the measurement basis used by
the receiver. Both parties only retain the data of the same basis vector, to generate the
post-screening key. The purpose of the basis sifting process detection is to detect
whether the basis sifting process of the transmitter and the receiver meets the
requirements of the decoy-state BB84 protocol.
The basis sifting process shall meet the requirements of the basis sifting process of
GM/T 0108-2021.
6.1.5 Detection of error correction process
The error correction process is that the transmitter and the receiver correct the quantum
error bits in the post-screening key at both ends, to obtain a consistent key, that is, the
error-corrected key. The purpose of the error correction process detection is to detect
whether the error correction process of the transmitter and the receiver meets the
requirements of the decoy-state BB84 protocol.
The error correction process shall meet the requirements of the error correction process
of GM/T 0108-2021.
6.1.6 Detection of security enhancement process
The security enhancement process refers to the process in which the transmitter and the
receiver use the hash function class to hash the error-corrected key and extract the
shared key. The purpose of the security enhancement process detection is to detect
whether the security enhancement process of the transmitter and receiver meets the
requirements of the BB84 protocol in a decoy-state.
The security enhancement process shall meet the requirements of the security
enhancement process of GM/T 0108-2021.
6.2 Detection of quantum key distribution product
6.2.1 Basic testing
6.2.1.1 Functional testing
Quantum key distribution product functional testing includes protocol implementation
requirements testing, shared key randomness testing, shared key consistency testing.
The purpose of the protocol implementation requirements testing is to detect whether
the process of quantum key distribution product key generation follows the decoy BB84
protocol. The purpose of the shared key randomness testing is to detect whether the
randomness of the key generated by the quantum key distribution product meets the
performance requirements of the quantum key distribution product. The purpose of the
shared key consistency testing is to detect whether the shared keys generated by the
transmitter and receiver of the quantum key distribution product are consistent.
Quantum key distribution products shall follow the decoy BB84 protocol and shall
comply with the requirements of 6.1 and 6.2 in GM/T 0108-2021. The randomness of
the shared key generated by the quantum key distribution product shall comply with the
requirements of GB/T 32915. The shared keys generated by the transmitter and receiver
of the quantum key distribution product shall be consistent.
6.2.1.2 Performance testing
6.2.1.2.1 Shared key generation rate
The purpose of the shared key generation rate testing is to detect whether the amount
of shared keys generated by the quantum key distribution product per unit time meets
the requirements of the inspection document.
The quantum key distribution product shall meet the requirements of the shared key
generation rate specified in the product inspection document.
6.2.1.2.2 Maximum distance
The purpose of the maximum distance testing of the quantum key distribution product
is to detect the maximum length of the quantum channel between the transmitter and
the receiver of the quantum key distribution product, under the premise of meeting the
performance and security requirements.
The quantum key distribution product shall meet the requirements of the maximum
distance specified in the product inspection document.
6.2.1.2.3 Environmental adaptability and reliability
The purpose of the environmental adaptability testing is to detect the adaptability of the
quantum key distribution product to the working environment; the purpose of the
reliability test is to detect the mean time between failures of the quantum key
distribution product.
The working environment of the quantum key distribution product shall meet the
have the ability to replay attacks.
6.2.3 Interface detection
The purpose of interface detection is to detect whether the type and function of the
interface of the quantum key distribution product meet the requirements of the quantum
key distribution product.
The interface of the quantum key distribution product shall meet the interface
requirements of GM/T 0108-2021.
6.2.4 Detection of random number generator
The purpose of random number generator detection is to detect whether the random
number generator used in the quantum key distribution product meets the requirements
of the quantum key distribution product.
The random number generator used in the quantum key distribution product shall be
approved by the national cryptography management department.
The random number generator used in the quantum key distribution product shall use a
random number generator based on physical processes; it can pass the random number
detection in four different application stages of sample delivery detection, exit-factory
detection, power-on detection, use detection; it shall meet the requirements of Class D
products in GM/T 0062.
6.2.5 Log management detection
The purpose of log management detection is to detect whether the management of logs
by quantum key distribution products meets the requirements of quantum key
distribution products.
The quantum key distribution product shall provide a log function; the log can be
viewed and exported.
The log content includes:
a) Operational behavior, including login authentication, system configuration, key
management and other operations;
b) Security events, including connection with the management platform, key
generation, key update, key destruction and other events;
c) Abnormal events, including authentication failure, illegal access, integrity check
failure and other abnormal events.
6.2.6 Remote management detection
The purpose of remote management detection is to detect whether the remote
management function of quantum key distribution products meets the requirements of
quantum key distribution products.
The remote management of quantum key distribution products shall comply with the
requirements of 7.6 in GM/T 0108-2021.
7 Detection method
7.1 Protocol implementation requirements detection
7.1.1 Base preparation detection
7.1.1.1 Relative error of coding base conjugation
Take the detection of relative error of coding base conjugation of phase-coded quantum
key distribution products as an example:
- Detection conditions:
a) The dotted box part shall select the transmitter base/state pr...
Share











