BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Drupal iCal API//EN
X-WR-CALNAME:Events items teaser
X-WR-TIMEZONE:America/Toronto
BEGIN:VTIMEZONE
TZID:America/Toronto
X-LIC-LOCATION:America/Toronto
BEGIN:DAYLIGHT
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
DTSTART:20231105T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:69d10f808c332
DTSTART;TZID=America/Toronto:20240710T114500
SEQUENCE:0
TRANSP:TRANSPARENT
DTEND;TZID=America/Toronto:20240710T124500
URL:https://uwaterloo.ca/institute-for-quantum-computing/events/security-im
 plications-device-imperfections-quantum-key
LOCATION:QNC - Quantum Nano Centre 200 University Avenue West 1201 Waterloo
  ON N2L 3G1 Canada
SUMMARY:Security implications of device imperfections in quantum key\ndistr
 ibution
CLASS:PUBLIC
DESCRIPTION:IQC SPECIAL SEMINAR\, JEROME WIESEMANN\, FRAUNHOFER HEINRICH HE
 RTZ\nINSTITUTE HHI\n\nQuantum key distribution (QKD) is on the verge of be
 coming a robust\nsecurity solution\, backed by security proofs that closel
 y model\npractical implementations.  As QKD matures\, a crucial requireme
 nt for\nits widespread adoption is establishing standards for evaluating a
 nd\ncertifying practical implementations\, particularly against\nside-chan
 nel attacks resulting from device imperfections that can\nundermine securi
 ty claims. Today\, QKD is at a stage where the\ndevelopment of such standa
 rds is increasingly prioritized. This works\naims to address some of the c
 hallenges associated with this task by\nfocusing on the process of prepari
 ng an in-house QKD system for\nevaluation. We first present a consolidated
  and accessible baseline\nsecurity proof for the one-decoy state BB84 prot
 ocol with finite-keys\,\nexpressed in a unified language. Building upon th
 is security proof\, we\nidentify and tackle some of the most critical side
 -channel attacks by\ncharacterizing and implementing countermeasures both 
 in the QKD system\nand within the security proof. In this process\, we ite
 ratively\nevaluate the risk of the individual attacks and re-assess the se
 curity\nof the system. Evaluating the security of QKD systems additionally
 \ninvolves performing attacks to potentially identify new loopholes.\nThus
 \, we also aim to perform the first real-time Trojan horse attack\non a de
 coy state BB84 system\, further highlighting the need for robust\ncounterm
 easures. By providing a critical evaluation of our QKD system\nand incorpo
 rating robust countermeasures against side-channel attacks\,\nour research
  contributes to advancing the practical implementation and\nevaluation of 
 QKD as a trusted security solution.
DTSTAMP:20260404T131752Z
END:VEVENT
END:VCALENDAR