ISO/IEC 23837-2:2023
(Main)Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 2: Evaluation and testing methods
Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 2: Evaluation and testing methods
This document specifies test and evaluation methods for the security evaluation of quantum key distribution (QKD). It also describes evaluation activities that constitute the test and evaluation methods for the security functional requirements on the implementation of QKD protocols, the quantum optical components and conventional network components in QKD modules. Moreover, supplementary evaluation activities for security assurance requirements are provided to support the security evaluation of QKD with appropriate assurance levels.
Sécurité de l'information — Exigences de sécurité, méthodes d'essais et d'évaluation relatives à la distribution quantique de clés — Partie 2: Méthodes d'essais et d'évaluation
General Information
Overview
ISO/IEC 23837-2:2023 defines test and evaluation methods for the security evaluation of Quantum Key Distribution (QKD) systems. As Part 2 of the ISO/IEC 23837 series, this international standard specifies practical evaluation activities (EAs) used to verify security functional requirements (SFRs) and supplementary security assurance requirements (SARs) for QKD modules, including both quantum optical components and conventional network components. The standard provides structured test procedures, thresholds, input parameters and pass/fail criteria to support consistent security assessments at appropriate assurance levels.
Key topics and technical requirements
The standard focuses on concrete, measurable evaluation methods rather than high-level policy. Major technical topics include:
- Evaluation activities (EAs) for SFRs and SARs: defined procedures to test protocol implementation, component behaviour and assurance controls.
- Quantum transmission and post‑processing tests: tests of quantum-state transmission, sifting, error correction and other post‑processing steps.
- Parameter adjustment procedures: verification of procedures that tune QKD performance and security parameters.
- Transmitter (TX) module tests:
- Photon-number distribution and mean photon number stability
- Intensity independence, state‑encoding accuracy and indistinguishability
- Global phase distribution, optical isolation, injected‑light monitor sensitivity
- Robustness against laser injection
- Receiver (RX) module tests:
- Detection probability consistency and temporal detection profile
- Back‑flash information leakage, optical isolation and injected‑light monitoring
- Robustness against bright‑light blinding and laser injection
- Dead time appropriateness and homodyne detector detection limits
- Test procedures and pass/fail criteria: clear step‑by‑step test methods and evaluation thresholds to determine compliance.
Practical applications and users
This standard is intended for stakeholders involved in designing, evaluating, certifying and deploying QKD systems:
- QKD equipment manufacturers - to validate component and module security during development and QA
- Independent test laboratories and certification bodies - to perform repeatable security evaluations and issue compliance reports
- System integrators and network operators - to assess QKD products prior to deployment in secure networks
- Procurement teams and auditors - to specify and verify security assurance levels for QKD solutions
Adopting ISO/IEC 23837-2:2023 helps ensure consistent, reproducible security testing of QKD modules and supports trustworthy integration of QKD into real‑world cryptographic infrastructures.
Related standards
- Other parts of the ISO/IEC 23837 series (companion documents) and existing information‑security and quantum‑cryptography standards are typically used together with this document when building a complete QKD assurance and certification framework.
Frequently Asked Questions
ISO/IEC 23837-2:2023 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 2: Evaluation and testing methods". This standard covers: This document specifies test and evaluation methods for the security evaluation of quantum key distribution (QKD). It also describes evaluation activities that constitute the test and evaluation methods for the security functional requirements on the implementation of QKD protocols, the quantum optical components and conventional network components in QKD modules. Moreover, supplementary evaluation activities for security assurance requirements are provided to support the security evaluation of QKD with appropriate assurance levels.
This document specifies test and evaluation methods for the security evaluation of quantum key distribution (QKD). It also describes evaluation activities that constitute the test and evaluation methods for the security functional requirements on the implementation of QKD protocols, the quantum optical components and conventional network components in QKD modules. Moreover, supplementary evaluation activities for security assurance requirements are provided to support the security evaluation of QKD with appropriate assurance levels.
ISO/IEC 23837-2:2023 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
You can purchase ISO/IEC 23837-2:2023 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 23837-2
First edition
2023-09
Information security — Security
requirements, test and evaluation
methods for quantum key
distribution —
Part 2:
Evaluation and testing methods
Sécurité de l'information — Exigences de sécurité, méthodes d'essais
et d'évaluation relatives à la distribution quantique de clés —
Partie 2: Méthodes d'essais et d'évaluation
Reference number
© ISO/IEC 2023
© ISO/IEC 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
© ISO/IEC 2023 – All rights reserved
Contents Page
Foreword . vi
Introduction .vii
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 3
5 Overview of the evaluation method for QKD modules . 4
5.1 General . 4
5.2 Scope of the evaluation method . 4
5.3 Overview of evaluation activities for SFRs . 5
5.3.1 General . 5
5.3.2 EAs for SFRs FTP_QKD.1 and FTP_QKD.2 . 6
5.3.3 EAs for SFRs on quantum optical components and parameter adjustment
procedure(s) . 6
5.3.4 EAs for SFRs on conventional network components . 7
5.3.5 Thresholds and input parameters related to the evaluation activities . 7
5.4 Overview of evaluation activities for SARs . 8
6 EAs for the evaluation of FTP_QKD . 8
6.1 General . 8
6.2 EA to test quantum state transmission and sifting procedures . 10
6.2.1 General aspects . 10
6.2.2 Test procedure.12
6.2.3 Pass/fail criteria . 14
6.3 EA to test other post-processing procedures . 14
6.3.1 General aspects . 14
6.3.2 Test procedure. 16
6.3.3 Pass/fail criteria . 17
6.4 EA to test parameter adjustment procedure(s) . 17
6.4.1 General aspects . 17
6.4.2 Test procedure. 19
6.4.3 Pass/fail criteria . 19
7 EAs for evaluating quantum optical components in the transmitter module .19
7.1 General . 19
7.2 EA to test the photon-number distribution of optical pulses .22
7.2.1 General aspects . 22
7.2.2 Test procedure. 24
7.2.3 Pass/fail criteria .25
7.3 EA to test the mean photon number and stability of optical pulses . 25
7.3.1 General aspects . 25
7.3.2 Test procedure.26
7.3.3 Pass/fail criteria .28
7.4 EA to test the independence of the intensities of optical pulses .28
7.4.1 General aspects .28
7.4.2 Test procedure.29
7.4.3 Pass/fail criteria .30
7.5 EA to test the accuracy of state encoding .30
7.5.1 General aspects . 30
7.5.2 Test procedure. 31
7.5.3 Pass/fail criteria . 32
7.6 EA to test the indistinguishability of encoded states . 32
7.6.1 General aspects . 32
7.6.2 Test procedure.34
iii
© ISO/IEC 2023 – All rights reserved
7.6.3 Pass/fail criteria . 35
7.7 EA to test the uniform distribution of the global phase of optical pulses .36
7.7.1 General aspects . 36
7.7.2 Test procedure. 37
7.7.3 Pass/fail criteria .38
7.8 EA to test the degree of optical isolation of the TX module .38
7.8.1 General aspects .38
7.8.2 Test procedure.40
7.8.3 Pass/fail criteria .40
7.9 EA to test the sensitivity of the injected light monitor in the TX module.40
7.9.1 General aspects .40
7.9.2 Test procedure. 41
7.9.3 Pass/fail criteria . 42
7.10 EA to test the robustness of the TX module against laser injection . 42
7.10.1 General aspects . 42
7.10.2 Test procedure.44
7.10.3 Pass/fail criteria .46
8 EAs for the evaluation of quantum optical components in the receiver module .47
8.1 General . 47
8.2 EA to test the consistency of detection probability in the RX module .49
8.2.1 General aspects .49
8.2.2 Test procedure. 51
8.2.3 Pass/fail criteria . 51
8.3 EA to test information leakage of back-flashes from the RX module . 52
8.3.1 General aspects . 52
8.3.2 Test procedure.53
8.3.3 Pass/fail criteria .54
8.4 EA to test the degree of optical isolation of the RX module .54
8.4.1 General aspects .54
8.4.2 Test procedure.55
8.4.3 Pass/fail criteria . 55
8.5 EA to test the sensitivity of the injected light monitor in the RX module .56
8.5.1 General aspects .56
8.5.2 Test procedure. 57
8.5.3 Pass/fail criteria . 57
8.6 EA to test the robustness of the RX module against bright light blinding .58
8.6.1 General aspects .58
8.6.2 Test procedure. 59
8.6.3 Pass/fail criteria .60
8.7 EA to test the appropriateness of dead time settings of SPDs .60
8.7.1 General aspect .60
8.7.2 Test procedure. 61
8.7.3 Pass/fail criteria . 62
8.8 EA to test the temporal profile of the detection efficiency for SPDs . 62
8.8.1 General aspects . 62
8.8.2 Test procedure.63
8.8.3 Pass/fail criteria .63
8.9 EA to test the robustness of the RX module against laser injection .64
8.9.1 General aspects .64
8.9.2 Test procedure.65
8.9.3 Pass/fail criteria .66
8.10 EA to test the detection limits of homodyne detectors in the RX module . 67
8.10.1 General aspects . 67
8.10.2 Test procedure. 67
8.10.3 Pass/fail criteria .68
8.11 EA to test the appropriateness of double-click event handling .68
8.11.1 General aspects .68
8.11.2 Test procedure.69
iv
© ISO/IEC 2023 – All rights reserved
8.11.3 Pass/fail criteria .69
9 EAs for the evaluation of parameter adjustment procedure(s) .69
9.1 General .69
9.2 EA to test the inducibility of detection probability mismatch . 70
9.2.1 General aspects . 70
9.2.2 Test procedure.73
9.2.3 Pass/fail criteria .74
9.3 EA to test the correctness of shot noise alignment .74
9.3.1 General aspects .74
9.3.2 Test procedure. 75
9.3.3 Pass/fail criteria .77
10 Supplementary activities for the evaluation of SFRs on conventional network
components .77
10.1 General .77
10.2 E valuation activities for FCS related SFRs overview . 78
10.3 E valuation activities for other SFRs overview . 78
11 Supplementary activities for SARs .78
11.1 General . 78
11.2 Supplementary activities for Class APE: Protection Profile evaluation .78
11.3 Supplementary activities for Class ASE: Security Target evaluation.80
11.4 Supplementary activities for Class ADV: Development .80
11.4.1 Supplementary activities for ADV_ARC .80
11.4.2 Supplementary activities for ADV_FSP .81
11.5 Supplementary activities for Class AGD: Guidance documents .82
11.5.1 Supplementary activities for AGD_OPE .82
11.5.2 Supplementary activities for AGD_PRE .83
11.6 Supplementary activities for Class ATE: Test .83
11.6.1 Supplementary activities for ATE_FUN .83
11.6.2 Supplementary activities for ATE_IND .84
11.7 Supplementary activities for Class AVA: Vulnerability assessment .85
12 Conformance statement .88
12.1 General .88
12.2 Conformance statement specific to evaluation activities for SFRs .88
12.3 Conformance statement specific to EAs for SARs .89
Annex A (informative) Guidance on the calculation of attack potential for the evaluation of
QKD modules .90
Annex B (informative) Rating examples for AVA attack potential computation .97
Annex C (informative) Thresholds collection . 100
Annex D (informative) Correspondence between EAs and known attacks to quantum
optical components and parameter adjustment procedure(s) of QKD modules . 104
Bibliography . 106
v
© ISO/IEC 2023 – All rights reserved
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria
needed for the different types of document should be noted. This document was drafted in
accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of
any claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC
had not received notice of (a) patent(s) which may be required to implement this document. However,
implementers are cautioned that this may not represent the latest information, which may be obtained
from the patent database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall
not be held responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
A list of all parts in the ISO/IEC 23837 series can be found on the ISO website.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
vi
© ISO/IEC 2023 – All rights reserved
Introduction
The ISO/IEC 23837 series specifies security requirements, test and evaluation methods for quantum
key distribution (QKD) modules under the framework of the ISO/IEC 15408 series. This document
specifies an evaluation method and relevant evaluation activities for the security evaluation of QKD
modules in a relatively general way. The evaluation activities that are necessary for the security
evaluation of QKD modules include supplementary evaluation activities for the QKD-related security
functional requirements (SFRs) specified in ISO/IEC 23837-1 and the supplementary evaluation
activities for security assurance requirements (SARs) with security assurance levels ranging from
evaluation assurance level (EAL) 1 to EAL 5+.
Specifically, the evaluation activities for the testing and evaluation of implementations of QKD
protocols, quantum optical components in QKD transmitter modules, and QKD receiver modules are
described in detail. For SFRs specific to conventional network components, this document does not
specify concrete evaluation activities but mainly refers to existing methods for network devices. In
addition, supplementary activities for security assurance requirements are specified, and refinements
to the generic vulnerability analysis methodology in ISO/IEC 18045 are presented, including guidance
on the calculation of attack potentials.
This document is expected to provide a specification to help QKD manufacturers improve the design
and implementation security of QKD modules, and to guide evaluators in the testing and security
evaluation of QKD modules, thus reducing the risk of failure of security in operation.
vii
© ISO/IEC 2023 – All rights reserved
INTERNATIONAL STANDARD ISO/IEC 23837-2:2023(E)
Information security — Security requirements, test and
evaluation methods for quantum key distribution —
Part 2:
Evaluation and testing methods
1 Scope
This document specifies test and evaluation methods for the security evaluation of quantum key
distribution (QKD). It also describes evaluation activities that constitute the test and evaluation
methods for the security functional requirements on the implementation of QKD protocols, the
quantum optical components and conventional network components in QKD modules. Moreover,
supplementary evaluation activities for security assurance requirements are provided to support the
security evaluation of QKD with appropriate assurance levels.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 15408-4:2022, Information security, cybersecurity and privacy protection — Evaluation criteria
for IT security — Part 4: Framework for the specification of evaluation methods and activities
ISO/IEC 18045, Information security, cybersecurity and privacy protection — Evaluation criteria for IT
security — Methodology for IT security evaluation
ISO/IEC 23837-1:2023, Information security — Security requirements, test and evaluation methods for
quantum key distribution — Part 1: Requirements
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 23837-1 and the following
apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org/
3.1
attenuation
reduction in the intensity of a light beam relative to the distance travelled through a transmission
medium
3.2
attenuator
device used to reduce the power level of a light beam
© ISO/IEC 2023 – All rights reserved
3.3
back-flash
pulse of one or more photons emitted from a single-photon detector
Note 1 to entry: This phenomenon is also known as “backflash light” or “breakdown flash”.
Note 2 to entry: This phenomenon is due to radiative charge recombination, and is observed in devices such as
avalanche photodiodes where large populations of electron-hole pairs are created.
3.4
beam splitter
BS
device which can split an incident light beam at a designed ratio into two or more separate beams
3.5
correlation function
function used to characterize the statistical and coherence properties of light beams
3.6
dark count
detection event registered by an optical detector in the absence of optical illumination
3.7
dead time
time interval after a detection event when the detector as a whole is unable to provide an output in
response to incoming photons at the single photon level
[SOURCE: ETSI GR QKD 007 V1.1.1:2018]
3.8
density matrix
matrix that describes the state of a quantum system
3.9
detection probability
probability that a detector registers a detection event within a stated duration time
3.10
emulator
tool with a known and trusted implementation of the expected functionality under test
3.11
fidelity
measure of the closeness of two quantum states
3.12
injected light monitor
detector for monitoring the power of the laser light injected from the quantum channel
3.13
local oscillator
LO
strong optical signal that acts as a phase reference for interference with a weak optical signal (e.g.,
quantum state) in coherent detection
3.14
mean photon number
average number of photons per optical pulse
[SOURCE: ETSI GR QKD 007 V1.1.1:2018]
© ISO/IEC 2023 – All rights reserved
3.15
polarization
property of electromagnetic waves that describes the orientation of the oscillating electric field vector
[SOURCE: ETSI GR QKD 007 V1.1.1:2018]
3.16
polarization analyser
instrument designed to measure and display the polarization (3.15) of an optical pulse
3.17
quantum state analyser
instrument designed to measure optical states in one or more specified degrees of freedom
3.18
shot noise
noise which can be modelled by a Poisson process, describing the fluctuations of the number of photons
detected due to their occurrence independent of each other
3.19
spectrum analyser
instrument designed to measure and display the distribution of power of an optical source over a
specified wavelength span
4 Abbreviated terms
ATE assurance class of tests
AVA assurance class of vulnerability assessment
cPP collaborative PP
EA evaluation activity
EAL evaluation assurance level
EM evaluation method
IT information technology
NRBG non-deterministic random bit generator
PP protection profile
QKD quantum key distribution
RX receiver
SAR security assurance requirement
SFR security functional requirement
SPD single-photon detector
TOE target of evaluation
TSF TOE security functionality
TSFI TSF interface
TX Transmitter
© ISO/IEC 2023 – All rights reserved
5 Overview of the evaluation method for QKD modules
5.1 General
The primary objective of the security evaluation of QKD modules is to validate whether the
implementation of the core functionality and the IT-related security controls of QKD modules meet the
security requirements of an expected evaluation assurance level (EAL).
Since the high-level generic evaluation activities (EAs) specified in ISO/IEC 18045 do not directly
cover all aspects of the security evaluation of QKD modules, this document gives an evaluation method
(EM) to supplement ISO/IEC 18045, by considering the characteristics of QKD modules. In particular,
this EM includes some specific EAs for security functional requirements (SFRs), which are defined in
ISO/IEC 23837-1, and security assurance requirements (SARs), which are defined or refined based on
the work units in ISO/IEC 18045.
5.2 Scope of the evaluation method
The defined method for the security evaluation of QKD modules is based on the framework specified by
ISO/IEC 15408-4. Figure 1 gives the structure of the EM based on the following considerations.
Figure 1 — Structure of the specific EM for QKD modules and its constituent EAs
The EM includes a collection of EAs for SARs and SFRs. In particular, a set of EAs for some existing
SARs in ISO/IEC 18045 are supplemented to make their work units more specific for the evaluation of
QKD modules, in particular those related to the assurance Class ATE and Class AVA (see 11.6, 11.7 and
Annex A). In addition, a set of EAs for specific SFRs is defined, which addresses SFRs on the quantum
optical components (see ISO/IEC 23837-1:2023, 9.4) and the implementation of QKD protocols (i.e. FTP_
QKD). The EAs for SFRs are intended to help evaluators address evaluation actions required by the
SARs ATE_IND.1 and ATE_IND.2 that are specific to QKD modules (see Clauses 6 to 9 for further detail).
On the other hand, since the objective of this document is to provide a supplementary evaluation
methodology that is specific to QKD modules, EAs for common SFRs on conventional network
components (including SFRs in the classes of FCS, FIA, FDP, FMT defined in ISO/IEC 15408-2) are
not emphasized. As the corresponding methodology for those SFRs is relatively mature in the IT
security evaluation industry, evaluators may reference existing standards or methodologies to handle
© ISO/IEC 2023 – All rights reserved
such aspects. Clause 10 explains this in more detail, and existing standards and methodologies are
referenced to help evaluators select appropriate approaches.
Not all EAs in this document are required for the security evaluation of a specific TOE of QKD modules.
The selection of EAs depends on the implemented QKD protocols and the implementation strategy of
the TOE. Clause 12 describes the requirements of the conformance statement when a specific evaluation
process claims conformance with this document.
5.3 Overview of evaluation activities for SFRs
5.3.1 General
The objective of functional testing in a security evaluation is to verify whether the implementation
of the functionality and IT-related controls are consistent with the design specification, and that
the security requirements defined in the ST are satisfied by the TOE. The EAs for SFRs, as specified
mainly in Clauses 6, 7, 8, and 9, are intended to supplement the work units concerned with independent
functional testing of the TSF, especially the work units regarding the security assurance family of ATE_
IND in ISO/IEC 18045.
NOTE This includes the work units of ATE_IND.1–3, ATE_IND.1–4, ATE_IND.1–5, ATE_IND.1–6 and ATE_
IND.1–7 when ATE_IND.1 is chosen for the expected EAL, or the work units of ATE_IND.2–6, ATE_IND.2–7, ATE_
IND.2–8, ATE_IND.2–9 and ATE_IND.2–10 when ATE_IND.2 is chosen.
Although the EAs are intended to help evaluators of QKD modules, these EAs can also be used to help
developers of QKD modules perform functional testing (for security assurance family of ATE_FUN), and
ensure the evaluator that the tests have been performed and documented correctly, before applying for
security evaluation/certification.
ISO/IEC 15408-4:2022, Clause 6 explains that the content generally required for the specification of an
EA includes:
— objective of the evaluation activity;
— required inputs (from the developer);
— required tool types and setup;
— required evaluator competence;
— rationale (justification of their derivation from the work units in ISO/IEC 18045);
— dependencies (of the activities on other relevant EAs);
— test procedure (for performing the EA);
— pass/fail criteria (for deciding the outcome of the EA).
Regarding these EAs, the general inputs required by the evaluator (but mainly prepared by the
developers) for independent testing are defined in ISO/IEC 18045, and include at least:
a) if ATE_IND.1 is concerned in the evaluation, then the following inputs are required:
— the ST;
— the functional specification;
— the guidance documentation;
— the TOE suitable for testing;
b) if ATE_IND.2 is concerned in the evaluation, then the following additional evidence is required:
— the TOE design description;
© ISO/IEC 2023 – All rights reserved
— the configuration management documentation;
— the test documentation.
In addition, all the test tools required for the EAs shall be calibrated correctly against some specific
standards by default. Otherwise, the reason shall be justified in the corresponding EAs.
For each EA, it is necessary for the developer to present at least the general inputs listed in a) and b)
accordingly to the evaluator. On completion of the evaluation process, the evaluator shall report the
evaluation result of the EA.
The “dependencies” item specified in ISO/IEC 15408-4:2022, Clause 6 is not necessary for the
description of EAs that are independent of all other EAs. The item is therefore neglected from the
description of those EAs hereinafter.
5.3.2 EAs for SFRs FTP_QKD.1 and FTP_QKD.2
ISO/IEC 23837-1 defines an extended security functional family (i.e. FTP_QKD) to specify the
requirements on the FUN_QKD functionality (see ISO/IEC 23837-1:2023, 6.4.2 for the definition) of
QKD modules. Correspondingly, EAs related to the evaluation of the implementation of a QKD protocol,
or rather the implementation of raw data generation, post-processing and parameter adjustment
procedures are specified in 6.2, 6.3, and 6.4 respectively. These EAs are used to examine the correctness
of the implementation of FUN_QKD (or more precisely, the SFRs FTP_QKD.1 and FTP_QKD.2).
Each of the EAs provides the required content listed in 5.3.1, especially the following:
a) Test procedures for checking the correctness of the implementation of raw data generation, post-
processing and parameter adjustment procedure(s) of the TOE.
b) Pass/fail criteria (for the evaluation of an implementation of a QKD protocol).
5.3.3 EAs for SFRs on quantum optical components and parameter adjustment procedure(s)
The SFRs on quantum optical components and parameter adjustment procedure(s) mainly include FPT_
EMS.1/Quantum and FPT_PHP.3 (see ISO/IEC 23837-1:2023, 9.4). These requirements are imposed on
the relevant security functions that relate to quantum optical components of QKD modules and the
parameter adjustment procedure(s). The expectation is that, at the expected EAL, the TOE that meets
these SFRs can resist known attacks (
...
La norme ISO/IEC 23837-2:2023, intitulée "Sécurité de l'information - Exigences de sécurité, méthodes de test et d'évaluation pour la distribution de clés quantiques - Partie 2 : Méthodes d'évaluation et de test", joue un rôle essentiel dans le domaine de la sécurité des systèmes de distribution de clés quantiques (QKD). Cette norme établit des méthodes de test et d'évaluation rigoureuses pour l'évaluation de la sécurité des protocoles de QKD, ce qui en fait un document incontournable pour les professionnels de la sécurité de l'information. L'un des points forts de la norme réside dans sa portée exhaustive. Elle précise non seulement les exigences fonctionnelles de sécurité associées à l'implémentation des protocoles QKD, mais elle inclut également des méthodes d'évaluation pour les composants quantiques optiques et les composants de réseau conventionnels intégrés dans les modules QKD. Cela garantit que tous les aspects des systèmes de QKD sont pris en compte, fournissant ainsi une base solide pour la validation de leur sécurité. De plus, la norme ISO/IEC 23837-2:2023 propose des activités d'évaluation complémentaires pour les exigences de sécurité qui viennent compléter les méthodes de test standard. Ces activités sont cruciales pour soutenir l'évaluation de la sécurité des systèmes de QKD en offrant des niveaux d'assurance appropriés, ce qui répond aux préoccupations des utilisateurs finaux concernant la protection de données sensibles. La pertinence de cette norme est particulièrement marquée dans un contexte où les cybermenaces évoluent constamment et où les systèmes de communication doivent adapter des technologies de pointe comme la cryptographie quantique pour garantir la sécurité des informations. En intégrant des méthodologies claires et détaillées, la norme ISO/IEC 23837-2:2023 permet aux organisations de naviguer efficacement dans le paysage complexe de la sécurité quantique. En somme, la norme ISO/IEC 23837-2:2023 établit des fondations solides pour l'évaluation et le test de la sécurité des systèmes de distribution de clés quantiques, répondant ainsi de manière pertinente aux exigences croissantes en matière de protection des données et de sécurité de l'information dans un monde de plus en plus numérique.
Die Norm ISO/IEC 23837-2:2023 behandelt umfassend die Sicherheitsanforderungen sowie die Test- und Evaluierungsmethoden für die Quantenschlüsselaustauschverteilung (QKD). Der Umfang dieses Dokuments ist klar definiert und konzentriert sich auf die Methoden zur Sicherheitsbewertung von QKD-Systemen, die für die Implementierung von QKD-Protokollen sowie für die quantenoptischen und konventionellen Netzwerkkomponenten in QKD-Modulen von Bedeutung sind. Ein herausragendes Merkmal dieser Norm ist ihre detaillierte Beschreibung der Evaluierungsaktivitäten, die für die Sicherheitsanforderungen implementiert werden müssen. Dadurch wird sichergestellt, dass die Funktionalität der QKD-Protokolle umfassend geprüft wird, was für die Integrität und Vertraulichkeit der Kommunikation von entscheidender Bedeutung ist. Die Norm bietet auch ergänzende Evaluierungsaktivitäten, die sich auf die Sicherheitsgarantieanforderungen konzentrieren, um eine angemessene Sicherheitsbewertung der QKD-Systeme zu unterstützen. Dies ist besonders wichtig in einer Zeit, in der die Bedrohungen für die Informationssicherheit ständig zunehmen. Ein weiterer relevanter Aspekt der ISO/IEC 23837-2:2023 ist ihre Anpassungsfähigkeit an verschiedene Kontextbedingungen und Sicherheitsniveaus. Die Norm ermöglicht es, spezifische Anforderungen je nach Anwendungsfall zu berücksichtigen, was ihre Relevanz in unterschiedlichen Branchen und Szenarien unterstreicht. Diese Flexibilität stellt sicher, dass Organisationen in der Lage sind, die Norm entsprechend ihrer individuellen Sicherheitsbedürfnisse einzusetzen. Zusammenfassend lässt sich sagen, dass die Norm ISO/IEC 23837-2:2023 einen wesentlichen Rahmen für die Sicherheitsbewertung von Quantenschlüsselaustauschsystemen bietet. Ihre umfassenden Test- und Evaluierungsmethoden sind notwendig, um die Herausforderungen und Anforderungen der modernen Informationssicherheit zu bewältigen und die Integration von QKD in bestehende Systeme effektiv zu unterstützen.
ISO/IEC 23837-2:2023は、量子鍵配送(QKD)のセキュリティ評価に関するテストおよび評価方法を明確に定義しています。この標準は、QKDプロトコルの実装におけるセキュリティ機能要件の評価を支えるテストおよび評価方法を詳細に説明しており、量子光学コンポーネントや従来のネットワークコンポーネントを含むQKDモジュールの評価活動も対象としています。 この文書の強みは、量子鍵配送の導入における具体的な評価活動を包括的に提供している点です。特に、セキュリティ機能の要件に対するテスト手法の標準化は、業界での共通理解を促進し、信頼性の高い評価手法を確立します。また、適切な保証レベルをサポートするための補足的な評価活動が含まれていることで、QKDのセキュリティ評価がより一層強化されています。 加えて、ISO/IEC 23837-2:2023の関連性は、量子技術の進展と共に高まっています。量子鍵配送がその本質的な特性から高いセキュリティを提供する可能性を秘めているため、この標準の存在は、情報セキュリティ分野における新たな基準を設け、企業や組織にとって重要なガイドラインとなります。特に、通信の安全性やデータ保護が重要視される現代において、この標準は非常に意義深いものです。 ISO/IEC 23837-2:2023は、量子鍵配送に関連するセキュリティ要件を適切に評価し、テストするための実用的かつ包括的なフレームワークを提供しており、将来的な技術進歩に対応した柔軟性も持っています。この標準に従うことで、安全で信頼性の高い量子鍵配送システムの構築と運用が促進されるでしょう。
The ISO/IEC 23837-2:2023 standard is a pivotal document that outlines rigorous test and evaluation methods specifically for the security assessment of quantum key distribution (QKD). This standard plays a crucial role in establishing a framework for understanding the security functional requirements associated with QKD protocols, as well as the quantum optical components and conventional network components integral to QKD modules. One of the primary strengths of ISO/IEC 23837-2:2023 is its comprehensive coverage of evaluation activities required for a thorough security evaluation. By delineating both test and evaluation methods, the standard ensures that organizations can systematically assess the robustness of their QKD implementations. This dual approach not only enhances the reliability of the security assessments but also allows for the integration of supplementary evaluation activities that address security assurance requirements. This inclusion is essential for organizations seeking to meet various assurance levels in their QKD systems. Furthermore, this standard's relevance in today’s technological landscape cannot be overstated. As the adoption of quantum technologies continues to grow, the need for established security protocols becomes increasingly critical. ISO/IEC 23837-2:2023 stands out by providing necessary guidelines that align with the evolving security landscape, particularly in the realm of quantum computing and quantum cryptography. In summary, ISO/IEC 23837-2:2023 serves as a foundational resource for those involved in the implementation and evaluation of QKD systems, empowering security professionals and organizations with the tools necessary to analyze and ensure the integrity of their quantum key distribution efforts. Its detailed scope, coupled with an emphasis on comprehensive testing and evaluation methods, marks it as an essential standard in the burgeoning field of quantum information security.
ISO/IEC 23837-2:2023 문서는 양자 키 분배(QKD)의 보안 평가를 위한 시험 및 평가 방법을 규정하고 있으며, 그 범위는 QKD 프로토콜의 구현, 양자 광학 구성요소, 그리고 QKD 모듈 내의 기존 네트워크 구성요소에 대한 보안 기능 요구 사항을 테스트하고 평가하는 활동을 포함합니다. 이 표준은 양자 키 분배의 보안 검증을 위한 robust한 기초를 제공하여, 급변하는 정보 보안 환경에서 신뢰할 수 있는 QKD 시스템 개발을 지원합니다. 이 표준의 강점은 보안 기능 요구 사항뿐만 아니라, 보안 보증 요구 사항에 대한 보완 평가 활동도 포함되어 있다는 점입니다. 이는 QKD 솔루션이 다양한 보안 수준을 만족시키기 위해 필요로 하는 적절한 보안 평가를 가능하게 합니다. 따라서, 이 문서는 QKD 시스템의 신뢰성과 보안성을 확보하기 위한 필수적인 지침을 제공합니다. ISO/IEC 23837-2:2023은 보안 평가에서 발생할 수 있는 다양한 요구 사항을 충족시키기 위한 구체적이고 체계적인 접근 방식을 제공함으로써 정보 보안 분야에서 큰 기여를 하고 있습니다. 최신 기술 발전이 요구되는 지금, 이 표준은 정보 보안 업계의 요구에 부응하는 필수적인 도구로 자리 잡고 있습니다. QKD의 평가 및 테스트 방법에 대한 명확한 지침을 제공함으로써, 이 표준은 기업 및 기관이 보안성을 강화하고, 새로운 위협에 효과적으로 대응할 수 있도록 돕습니다.








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...