Page 17 - ETSI-WP-2017-2018.html
P. 17

The specification for an LI interface for Terrestrial Trunked   in several locations around the world and standards are
          Radio (TETRA) will be revised to address new LI capabilities in   needed urgently to enable adoption of these new security
          TETRA and to bring the document in line with LI activity as a   technologies.
          whole.
                                                              Our ISG on QKD is developing standards for the quantum
          We will continue to work on two new ETSI Special Reports.   communications industry that will promote and shape the
          One will provide a guide to LI and RD standards and concepts   market.
          (including an evolutionary overview); the other will offer
          guidance on LI for LTE™ in the form of Frequently Asked   Ongoing work includes the characterisation of the optical
          Questions.                                          output of QKD transmitter modules, QKD deployment
                                                              parameters, and a specification on the design, construction,
          Other possible future topics include the media stream   characterisation and operation of QKD systems to protect
          handover for encrypted data, for handling intercepted   against Trojan horse attacks.
          data from communications which have been encrypted by
          operators.                                          We expect to complete a revision of our specification on the
                                                              properties of the components and internal interfaces of QKD
                                                              systems in 2017.
          Security Algorithms
          Our Security Algorithms Group of Experts (SAGE) is widely
          recognised for its work on authentication and encryption   Information Security Indicators
          mechanisms for different technologies. In 2017, we will   In 2017, our ISG on Information Security Indicators (ISG
          continue to develop security algorithms as needed to   ISI) expects to complete three new specifications: an
          support our standardisation activities.             ISI-compliant measurement and event management
                                                              architecture for cyber security and safety, to enable
          Other work may include the development of algorithm   communication between diversified detection tools;
          variants for 5G. All the radio interface algorithms in 3G and   guidelines for building and operating a secured security
          4G use 128-bit keys, but 5G algorithms are likely to use (or   operations centre; and a description of a comprehensive
          at least support) 256-bit keys. If necessary, therefore, we   security information and event management enterprise-
          will adapt our existing algorithms, as well as the MILENAGE   wide approach involving all stakeholders within companies,
          Authentication and Key Agreement algorithm, to support   from IT and IT security to business management and
          256-bit keys.                                       executive committees. We also plan to revise our existing
                                                              Key Performance Security Indicators which were developed
                                                              to evaluate the maturity of security event detection, to take
          Quantum Key Distribution                            into account users’ feedback.
          Quantum Key Distribution (QKD) enables digital keys to
          be shared privately without relying on computational
          complexity. The security offered by QKD will not be     The ETSI Security Week
          vulnerable to future advances in algorithms, computational   We will organise our annual Security Week which
          power or the emergence of a quantum computer. With      will address issues raised by the latest technological
          QKD, security keys are shared over optical fibre or free   advances.
          space links encoded on single photons or weak pulses of
          light. Demonstrator networks are now being constructed


































                                                                                                                    15
   12   13   14   15   16   17   18   19   20   21   22