|
|
|
Schemes of IPsec integrated with quantum key distribution |
| Chun-Hui Zhang(张春辉)1,2,3, Wen-Xuan Zhang(张文轩)1,2,3, Xing-Yu Zhou(周星宇)1,2,3, Yuan Cao(曹原)1,2,3, Jun Wang(汪军)4, Jian Li(李剑)1,2,3, and Qin Wang(王琴)1,2,3,† |
1 Institute of Quantum Information and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China; 2 Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing 210003, China; 3 Telecommunication and Networks, National Engineering Research Center, Nanjing University of Posts and Telecommunications, Nanjing 210003, China; 4 E-Quantum Information Technology Co., Ltd., Nanjing 211112, China |
|
|
|
|
Abstract With the rapid advancement of quantum computing, traditional security protocols based on classical encryption algorithms are increasingly vulnerable to potential quantum attacks. The current IPsec protocol, which relies on classical cryptographic methods, is insufficient to withstand such threats, thereby compromising the security of long-term data transmission. To address this issue, we propose integrating quantum key distribution (QKD) into the internet protocol security (IPsec) protocol, thereby enhancing its resilience against quantum computing attacks. Here, two schemes that merge QKD-generated keys with classical cryptographic keys are designed to enhance both security and stability. Furthermore, we conduct a comprehensive evaluation of the performance of various QKD protocols implemented with the scheme, along with an assessment of its overall efficacy across a topological network configuration. This approach not only ensures secure data transmission in the era of quantum computing but also highlights the potential application value of integrating QKD with IPsec, providing valuable insights for the design and implementation of future quantum-secure communication systems.
|
Received: 16 October 2025
Revised: 18 November 2025
Accepted manuscript online: 04 January 2026
|
|
PACS:
|
03.67.Dd
|
(Quantum cryptography and communication security)
|
| |
03.67.Hk
|
(Quantum communication)
|
|
| Fund: This work was supported by the Jiangsu Provincial Key R&D Program for Industrialization Prospects and Key Core Technology Project (Grant No. BE2022071), and the National Natural Science Foundation of China (NSFC) (Grant Nos. 62471248, 62201276, and 12074194). |
Corresponding Authors:
Qin Wang
E-mail: qinw@njupt.edu.cn
|
Cite this article:
Chun-Hui Zhang(张春辉), Wen-Xuan Zhang(张文轩), Xing-Yu Zhou(周星宇), Yuan Cao(曹原), Jun Wang(汪军), Jian Li(李剑), and Qin Wang(王琴) Schemes of IPsec integrated with quantum key distribution 2026 Chin. Phys. B 35 040305
|
[1] Shor P W 1999 SIAM Rev. 41, 303 [2] Rivest R L, Shamir A and Adleman L 1978 Commun. ACM 21, 120 [3] Diffie W and Hellman M E 2022 Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman pp. 365 [4] Arute F, Arya K, Babbush R, et al. 2019 Nature 574, 505 [5] Kent S and Seo K 2005 Security Architecture for the Internet Protocol (IETF) [6] Bennett C H and Brassard G 1984 Quantum Cryptography: Public Key Distribution and Coin Tossing, in IEEE Int. Conf. Computers, Systems and Signal Processing, pp. 175 [7] Bernstein D J 2025 Encyclopedia of Cryptography, Security and Privacy (Springer) pp. 1846 [8] Wootters W K and Zurek W H 1982 Nature 299, 802 [9] Vernam G S 1926 J. AIEE 45, 109 [10] Lo H K, Curty M and Qi B 2012 Phys. Rev. Lett. 108, 130503 [11] Pirandola S, Laurenza R, Ottaviani C and Banchi L 2017 Nat. Commun. 8, 1 [12] Lucamarini M, Yuan Z L, Dynes J F and Shields A J 2018 Nature 557, 400 [13] Wang X B, Yu Z W and Hu X L 2018 Phys. Rev. A 98, 062323 [14] Ma X, Zeng P and Zhou H 2018 Phys. Rev. X 8, 031043 [15] Cui C, Yin Z Q,Wang R, ChenW,Wang S, Guo G C and Han Z F 2019 Phys. Rev. Appl. 11, 034053 [16] Liu J, Jiang Q, Ding H, Ma X, Sun M, Xu J, Zhang C H, Xie S, Li J and Zeng G 2023 Sci. China Inf. Sci. 66, 189402 [17] Li W, Zhang L, Lu Y, Li Z P, Jiang C, Liu Y, Huang J, Li H, Wang Z and Wang X B 2023 Phys. Rev. Lett. 130, 250802 [18] Zeng P, Zhou H, Wu W and Ma X 2022 Nat. Commun. 13, 3903 [19] Xie Y M, Lu Y S, Weng C X, Cao X Y, Jia Z Y, Bao Y, Wang Y, Fu Y, Yin H L and Chen Z B 2022 PRX Quantum 3, 020315 [20] Zhu H T, Huang Y, Liu H, Zeng P, Zou M, Dai Y, Tang S, Li H, You L and Wang Z 2023 Phys. Rev. Lett. 130, 030801 [21] Zhou L, Lin J, Xie Y M, Lu Y S, Jing Y, Yin H L and Yuan Z 2023 Phys. Rev. Lett. 130, 250801 [22] Zhu H T, Huang Y, Pan W X, Zhou C W, Tang J, He H, Cheng M, Jin X, Zou M and Tang S 2024 Optica 11, 883 [23] Luo D, Liu X, Qin K, Zhang Z and Wei K 2024 Phys. Rev. A 110, 022605 [24] Liu X, Luo D, Zhang Z and Wei K 2023 Phys. Rev. A 107, 062613 [25] Guo M, Cao Y, Zhu J, Zhou X, Zhang C, Yu X, Zhao Y, Zhang J and Wang Q 2023 J. Opt. Commun. Netw. 15, 700 [26] Cao Y, Zhao Y, Wang Q, Zhang J, Ng S X and Hanzo L 2022 IEEE Commun. Surv. Tut. 24, 839 [27] Cao Y, Zhao Y, Zhang J andWang Q 2022 IEEE Commun. Mag. 60, 38 [28] Cao Y, Zhao Y, Zhang J, Wang Q, Niyato D and Hanzo L 2022 IEEE Netw. 36, 14 [29] Cao Y, Zhao Y, Li J, Lin R, Zhang J and Chen J 2021 IEEE J. Sel. Areas Commun. 39, 2701 [30] Huang C, Chen Y, Luo T, He W, Liu X, Zhang Z and Wei K 2024 Sci. China Phys. Mech. Astron. 67, 240312 [31] Wei K, Li W, Tan H, et al. 2020 Phys. Rev. X 10, 031030 [32] Elliott C, Pearson D and Troxel G 2003 Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications pp. 227 [33] Berzanskis A, Hakkarainen H, Lee K and Hussain M R 2009 Method of Integrating QKD with IPsec, U.S. Patent 7,602,919 [34] Zhang P, Chen N, Shen S, Yu S, Wu S and Kumar N 2022 IEEE Wireless Communications 31, 141 [35] Marksteiner S and Maurhart O 2015 9th Int. Conf. Quantum, Nano/Bio, and Micro Technologies, pp. 35 [36] Cano A, Garcia C R, Frantz R, Monroy I T, Imaña J L and Vegas J J 2024 2024 IEEE 32nd International Conference on Network Protocols (ICNP) pp. 1 [37] Li J, Zheng P, Li Z, Xue K, Xie Z, Yu N, Sun Q and Lu J 2025 IEEE Network 39, 180 [38] Sibson P, Kennard J, Crabtree T, Wright P, White C, Salas E H, Lord A, Grammel G, Mead B and Radev R 2024 Optical Fiber Communication Conference (Optica Publishing Group) pp. Th3B-4 [39] Alia O, Huang A, Luo H, Amer O, Pistoia M and Lim C 2024 Optical Fiber Communication Conference (Optica Publishing Group) pp. Th3B-5 [40] Lawo D C, Abu Bakar R, Cano Aguilera A, Cugini F, Imaña J L, Tafur Monroy I and Vegas Olmos J J 2024 Future Internet 16, 300 [41] Gao X, Xue K, Li J, Li Z, Wu J, Yu N, Sun Q and Lu J 2025 IEEE Comm. Mag. 63 148 [42] Cao Y, Yu X, Zhao Y, Zhang C, Zhou X, Zhang J and Wang Q 2025 Chin. Phys. B 34, 010310 [43] Garcia C R, Cano A, Olmos J V, Rommel S and Monroy I T 2025 Optical Fiber Communications Conference and Exhibition (OFC) (IEEE), pp. 1 [44] Fluhrer S, Kampanakis P, McGrew D and Smyslov V 2020 RFC 8784 [45] Harkins D and Carrel D 1998 RFC 2409: The Internet Key Exchange (IKE) [46] Kaufman C 2005 RFC 4306: Internet Key Exchange (IKEv2) Protocol (RFC Editor) [47] Joan D and Vincent R 2002 Information Security and Cryptography (Springer) [48] Huttner B, Imoto N, Gisin N and Mor T 1995 Phys. Rev. A 51, 1863 [49] Hwang W Y 2003 Phys. Rev. Lett. 91, 057901 [50] Wang X B 2005 Phys. Rev. Lett. 94, 230503 [51] Lo H K, Ma X and Chen K 2005 Phys. Rev. Lett. 94, 230504 [52] Ma X, Qi B, Zhao Y and Lo H K 2005 Phys. Rev. A 72, 012326 [53] Gottesman D, Lo H K, Lutkenhaus N and Preskill J 2004 Security of Quantum Key Distribution with Imperfect Devices, International Symposium on Information Theory [54] Jiang C, Yu Z W, Hu X L and Wang X B 2019 Phys. Rev. Appl. 12, 024061 [55] Wang Z H, Wang R, Yin Z Q, Wang S, Lu F Y, Chen W, He D Y, Guo G C and Han Z F 2023 Commun. Phys. 6, 265 [56] Chernoff H 1952 Ann. Math. Stat. 23, 493-507 [57] Alia O, Huang A, Luo H, Amer O, Pistoia M and Lim C 2024 arXiv:2405.04415 [quant-ph] [58] Fan-Yuan G J, Lu F Y, Wang S, Yin Z Q, He D Y, Chen W, Zhou Z, Wang Z H, Teng J and Guo G C 2022 Optica 9, 812 |
| No Suggested Reading articles found! |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
Altmetric
|
|
blogs
Facebook pages
Wikipedia page
Google+ users
|
Online attention
Altmetric calculates a score based on the online attention an article receives. Each coloured thread in the circle represents a different type of online attention. The number in the centre is the Altmetric score. Social media and mainstream news media are the main sources that calculate the score. Reference managers such as Mendeley are also tracked but do not contribute to the score. Older articles often score higher because they have had more time to get noticed. To account for this, Altmetric has included the context data for other articles of a similar age.
View more on Altmetrics
|
|
|