SlideShare une entreprise Scribd logo
1  sur  11
July 2021
FSP 3000 ConnectGuard™ now protects data against all forms of cyberattack
ADVA launches world’s first commercial optical transport
solution with post-quantum cryptographic security
© 2021 ADVA. All rights reserved.
2
The emergence of quantum computers
with ultra-high processing power poses a
major threat to data security
Current cryptography methods based
on secret key generation and key
distribution are vulnerable to quantum
computer attacks
Network operators and enterprises should
start adapting their security
measures now
Protect your network today against tomorrow’s threats
Quantum computing challenges data security
© 2021 ADVA. All rights reserved.
3
What will change with quantum computers?
Plaintext Plaintext
Alice
Bob
AES encryption AES encryption
Secret
Diffie-
Hellman
Diffie-
Hellman
Session
key
Key exchange
Secret
Ciphertext
Session
key
Most popular public-key algorithms
can be broken by a quantum computer
New quantum-safe cryptography is urgently needed
© 2021 ADVA. All rights reserved.
4
Making our solution quantum-safe and future-proof
Vulnerable to
quantum attacks
Additional: Quantum key distribution (QKD)
AES-256
Secret
QKD
Session
key
Mitigation
Using quantum
mechanisms to
securely exchange
keys
Baseline: Post-quantum cryptography (PQC)
AES-256
Secret
PQC
Session
key
Applying
quantum-resistant
key exchange
algorithms
Secure key exchange
Secure key exchange
© 2021 ADVA. All rights reserved.
5
Quantum-safe cryptography options
• New cryptographic algorithms, e.g., McEliece
or Frodo, are thought to be secure against
cyberattacks by quantum computers
• The security of the encryption relies on the
computational difficulty
• Works over any network and distance
PQC
Session
key
Session
key
Quantum-safe
key exchange
protocol
Quantum-safe
key exchange
protocol
Key
exchange
• Uses quantum physics for secure key exchange:
An attempt to eavesdrop introduces detectable
anomalies in quantum states
• The security of the encryption relies on the
foundations of quantum mechanics
• Requires optical media access and depends on
optical link budget
Session
key
Session
key
Quantum channel
Key exchange
QKD
© 2021 ADVA. All rights reserved.
6
Industry’s first optical transport solution with PQC
Plaintext Plaintext
Alice
Bob
AES encryption AES encryption
Secret
Diffie-
Hellman
Diffie-
Hellman
Session
key
Key exchange
Secret
Ciphertext
Session
key
FSP 3000 FSP 3000
McEliece
McEliece
Key exchange Protection
against quantum
computer
attacks
Crypto-agility
The ADVA FSP 3000 transport solution is the first commercial solution offering fully
encrypted services secured by PQC
© 2021 ADVA. All rights reserved.
7
• Designed in accordance with the recommendations of leading bodies
• Hybrid key exchange approach combines quantum-safe PQC (McEliece) with
classical (Diffie-Hellmann) key exchange
• Compliant with the strictest pre-standards and regulations
• Ready for software updates to comply with emerging specifications, including
NIST’s PQC standardization competition
• ConnectGuard™ Layer 1 AES-256 encryption technology
• Minimal impact on latency, throughput and performance
Your benefits
Crypto-
agility
Robust
and future-
proof
Built-in
solution
Most robust network protection now and for decades to come
© 2021 ADVA. All rights reserved.
8
ADVA’s leadership in quantum-safe cryptography
First quantum-safe
cryptography demos and field
trials with FSP 3000
ADVA brings post-
quantum security to
packet networks
ADVA deploys first
commercial QKD-based
optical transport
network infrastructure
ADVA launches market's
first optical transport
platform with PQC
2018 2019 2020 2021
Pioneers in optical transport solutions with built-in encryption since 2010
© 2021 ADVA. All rights reserved.
9
FSP 3000 solution with built-in PQC
PQC
Built-in Layer 1 encryption (AES-256)
Hybrid key exchange approach
(McEliece quantum-safe key exchange
protocol and traditional Diffie-Hellman)
Crypto-agility
Quantum-safe 100Gbit/s data transport
Two card variants
100G transponder
3x 32FC muxponder
CFP DWDM interface
50GHz and flexgrid spacing
DP-QPSK
100G
Compact solution
2-slot card that fits in multiple FSP
3000 chassis sizes
QSFP28 client interface
100GbE/OTU4 (WCC transponder)
32G FC (4TCC muxponder)
© 2021 ADVA. All rights reserved.
10
Summary
• ADVA releases market’s first commercial post-quantum encrypted optical
transport solution in its FSP 3000
• ADVA has proven experience and a long history of success with quantum-safe
cryptography (both PQC and QKD), building on many successful demos and
trials as well as close engagement with customers and national security
agencies
• Built for crypto-agility, the FSP 3000 solution complies with the strictest pre-
standard regulations available at this moment, and can be upgraded later to
comply with NIST’s emerging PQC specifications
Protects your data in motion against all forms of cyberattacks
Thank you
IMPORTANT NOTICE
The content of this presentation is strictly confidential. ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation,
direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA.
www.adva.com | info@adva.com

Contenu connexe

Tendances

LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK
 
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
confluent
 

Tendances (20)

Cilium - Network security for microservices
Cilium - Network security for microservicesCilium - Network security for microservices
Cilium - Network security for microservices
 
MSA ( Microservices Architecture ) 발표 자료 다운로드
MSA ( Microservices Architecture ) 발표 자료 다운로드MSA ( Microservices Architecture ) 발표 자료 다운로드
MSA ( Microservices Architecture ) 발표 자료 다운로드
 
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
 
In the Wake of Kerberoast
In the Wake of KerberoastIn the Wake of Kerberoast
In the Wake of Kerberoast
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Ch15
Ch15Ch15
Ch15
 
Key management
Key managementKey management
Key management
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
One-Time Pad Encryption
One-Time Pad EncryptionOne-Time Pad Encryption
One-Time Pad Encryption
 
Lattice-Based Cryptography: CRYPTANALYSIS OF COMPACT-LWE
Lattice-Based Cryptography: CRYPTANALYSIS OF COMPACT-LWELattice-Based Cryptography: CRYPTANALYSIS OF COMPACT-LWE
Lattice-Based Cryptography: CRYPTANALYSIS OF COMPACT-LWE
 
Container Migration Tool
Container Migration Tool Container Migration Tool
Container Migration Tool
 
Understanding Active Directory Enumeration
Understanding Active Directory EnumerationUnderstanding Active Directory Enumeration
Understanding Active Directory Enumeration
 
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
[Confluent] 실시간 하이브리드, 멀티 클라우드 데이터 아키텍처로 빠르게 혀...
 
Flexible Authentication Strategies with SASL/OAUTHBEARER (Michael Kaminski, T...
Flexible Authentication Strategies with SASL/OAUTHBEARER (Michael Kaminski, T...Flexible Authentication Strategies with SASL/OAUTHBEARER (Michael Kaminski, T...
Flexible Authentication Strategies with SASL/OAUTHBEARER (Michael Kaminski, T...
 
iptables 101- bottom-up
iptables 101- bottom-upiptables 101- bottom-up
iptables 101- bottom-up
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Unidad 5 - Criptografía
Unidad 5 - CriptografíaUnidad 5 - Criptografía
Unidad 5 - Criptografía
 
F5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptx
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
CI / CD ( 지속적인 통합 / 지속적인 전달 ) 발표 자료 다운로드
CI / CD ( 지속적인 통합 / 지속적인 전달 ) 발표 자료 다운로드CI / CD ( 지속적인 통합 / 지속적인 전달 ) 발표 자료 다운로드
CI / CD ( 지속적인 통합 / 지속적인 전달 ) 발표 자료 다운로드
 

Similaire à ADVA launches world’s first commercial optical transport solution with post-quantum cryptographic security

Similaire à ADVA launches world’s first commercial optical transport solution with post-quantum cryptographic security (20)

Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
 
Secure Optical Connectivity Solutions for High-Capacity Data Centers
Secure Optical Connectivity Solutions for High-Capacity Data CentersSecure Optical Connectivity Solutions for High-Capacity Data Centers
Secure Optical Connectivity Solutions for High-Capacity Data Centers
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the Future
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport Systems
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth Applications
 
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Connect Halifax 2018   Application agility and programmability with cis...Cisco Connect Halifax 2018   Application agility and programmability with cis...
Cisco Connect Halifax 2018 Application agility and programmability with cis...
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE Solutions
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 

Plus de ADVA

Plus de ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edge
 
Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!
 
Introducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockIntroducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clock
 
Best practices in synchronizing IP-based packet broadcast networks
Best practices in synchronizing IP-based packet broadcast networksBest practices in synchronizing IP-based packet broadcast networks
Best practices in synchronizing IP-based packet broadcast networks
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

ADVA launches world’s first commercial optical transport solution with post-quantum cryptographic security

  • 1. July 2021 FSP 3000 ConnectGuard™ now protects data against all forms of cyberattack ADVA launches world’s first commercial optical transport solution with post-quantum cryptographic security
  • 2. © 2021 ADVA. All rights reserved. 2 The emergence of quantum computers with ultra-high processing power poses a major threat to data security Current cryptography methods based on secret key generation and key distribution are vulnerable to quantum computer attacks Network operators and enterprises should start adapting their security measures now Protect your network today against tomorrow’s threats Quantum computing challenges data security
  • 3. © 2021 ADVA. All rights reserved. 3 What will change with quantum computers? Plaintext Plaintext Alice Bob AES encryption AES encryption Secret Diffie- Hellman Diffie- Hellman Session key Key exchange Secret Ciphertext Session key Most popular public-key algorithms can be broken by a quantum computer New quantum-safe cryptography is urgently needed
  • 4. © 2021 ADVA. All rights reserved. 4 Making our solution quantum-safe and future-proof Vulnerable to quantum attacks Additional: Quantum key distribution (QKD) AES-256 Secret QKD Session key Mitigation Using quantum mechanisms to securely exchange keys Baseline: Post-quantum cryptography (PQC) AES-256 Secret PQC Session key Applying quantum-resistant key exchange algorithms Secure key exchange Secure key exchange
  • 5. © 2021 ADVA. All rights reserved. 5 Quantum-safe cryptography options • New cryptographic algorithms, e.g., McEliece or Frodo, are thought to be secure against cyberattacks by quantum computers • The security of the encryption relies on the computational difficulty • Works over any network and distance PQC Session key Session key Quantum-safe key exchange protocol Quantum-safe key exchange protocol Key exchange • Uses quantum physics for secure key exchange: An attempt to eavesdrop introduces detectable anomalies in quantum states • The security of the encryption relies on the foundations of quantum mechanics • Requires optical media access and depends on optical link budget Session key Session key Quantum channel Key exchange QKD
  • 6. © 2021 ADVA. All rights reserved. 6 Industry’s first optical transport solution with PQC Plaintext Plaintext Alice Bob AES encryption AES encryption Secret Diffie- Hellman Diffie- Hellman Session key Key exchange Secret Ciphertext Session key FSP 3000 FSP 3000 McEliece McEliece Key exchange Protection against quantum computer attacks Crypto-agility The ADVA FSP 3000 transport solution is the first commercial solution offering fully encrypted services secured by PQC
  • 7. © 2021 ADVA. All rights reserved. 7 • Designed in accordance with the recommendations of leading bodies • Hybrid key exchange approach combines quantum-safe PQC (McEliece) with classical (Diffie-Hellmann) key exchange • Compliant with the strictest pre-standards and regulations • Ready for software updates to comply with emerging specifications, including NIST’s PQC standardization competition • ConnectGuard™ Layer 1 AES-256 encryption technology • Minimal impact on latency, throughput and performance Your benefits Crypto- agility Robust and future- proof Built-in solution Most robust network protection now and for decades to come
  • 8. © 2021 ADVA. All rights reserved. 8 ADVA’s leadership in quantum-safe cryptography First quantum-safe cryptography demos and field trials with FSP 3000 ADVA brings post- quantum security to packet networks ADVA deploys first commercial QKD-based optical transport network infrastructure ADVA launches market's first optical transport platform with PQC 2018 2019 2020 2021 Pioneers in optical transport solutions with built-in encryption since 2010
  • 9. © 2021 ADVA. All rights reserved. 9 FSP 3000 solution with built-in PQC PQC Built-in Layer 1 encryption (AES-256) Hybrid key exchange approach (McEliece quantum-safe key exchange protocol and traditional Diffie-Hellman) Crypto-agility Quantum-safe 100Gbit/s data transport Two card variants 100G transponder 3x 32FC muxponder CFP DWDM interface 50GHz and flexgrid spacing DP-QPSK 100G Compact solution 2-slot card that fits in multiple FSP 3000 chassis sizes QSFP28 client interface 100GbE/OTU4 (WCC transponder) 32G FC (4TCC muxponder)
  • 10. © 2021 ADVA. All rights reserved. 10 Summary • ADVA releases market’s first commercial post-quantum encrypted optical transport solution in its FSP 3000 • ADVA has proven experience and a long history of success with quantum-safe cryptography (both PQC and QKD), building on many successful demos and trials as well as close engagement with customers and national security agencies • Built for crypto-agility, the FSP 3000 solution complies with the strictest pre- standard regulations available at this moment, and can be upgraded later to comply with NIST’s emerging PQC specifications Protects your data in motion against all forms of cyberattacks
  • 11. Thank you IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA. www.adva.com | info@adva.com