Page 17 - ETSI-WP-2017-2018.html
P. 17
The specification for an LI interface for Terrestrial Trunked in several locations around the world and standards are
Radio (TETRA) will be revised to address new LI capabilities in needed urgently to enable adoption of these new security
TETRA and to bring the document in line with LI activity as a technologies.
whole.
Our ISG on QKD is developing standards for the quantum
We will continue to work on two new ETSI Special Reports. communications industry that will promote and shape the
One will provide a guide to LI and RD standards and concepts market.
(including an evolutionary overview); the other will offer
guidance on LI for LTE™ in the form of Frequently Asked Ongoing work includes the characterisation of the optical
Questions. output of QKD transmitter modules, QKD deployment
parameters, and a specification on the design, construction,
Other possible future topics include the media stream characterisation and operation of QKD systems to protect
handover for encrypted data, for handling intercepted against Trojan horse attacks.
data from communications which have been encrypted by
operators. We expect to complete a revision of our specification on the
properties of the components and internal interfaces of QKD
systems in 2017.
Security Algorithms
Our Security Algorithms Group of Experts (SAGE) is widely
recognised for its work on authentication and encryption Information Security Indicators
mechanisms for different technologies. In 2017, we will In 2017, our ISG on Information Security Indicators (ISG
continue to develop security algorithms as needed to ISI) expects to complete three new specifications: an
support our standardisation activities. ISI-compliant measurement and event management
architecture for cyber security and safety, to enable
Other work may include the development of algorithm communication between diversified detection tools;
variants for 5G. All the radio interface algorithms in 3G and guidelines for building and operating a secured security
4G use 128-bit keys, but 5G algorithms are likely to use (or operations centre; and a description of a comprehensive
at least support) 256-bit keys. If necessary, therefore, we security information and event management enterprise-
will adapt our existing algorithms, as well as the MILENAGE wide approach involving all stakeholders within companies,
Authentication and Key Agreement algorithm, to support from IT and IT security to business management and
256-bit keys. executive committees. We also plan to revise our existing
Key Performance Security Indicators which were developed
to evaluate the maturity of security event detection, to take
Quantum Key Distribution into account users’ feedback.
Quantum Key Distribution (QKD) enables digital keys to
be shared privately without relying on computational
complexity. The security offered by QKD will not be The ETSI Security Week
vulnerable to future advances in algorithms, computational We will organise our annual Security Week which
power or the emergence of a quantum computer. With will address issues raised by the latest technological
QKD, security keys are shared over optical fibre or free advances.
space links encoded on single photons or weak pulses of
light. Demonstrator networks are now being constructed
15