The security challenge is led by the University of Cambridge, and tackles one of the most critical aspects of future communication networks: ensuring that increasingly complex systems remain secure and resilient in the face of growing security threats.

NETWORK SECURITY: A CONSTANT & EVOLVING CHALLENGE 

As both wired and wireless technologies continue to converge and evolve, an expanding and more complex attack surface is emerging. The combination of wired infrastructure (e.g., office LANs) and wireless systems (Wi-Fi, 5G, IoT) creates many new vulnerabilities that must be addressed to increase and maintain the confidentiality, integrity, and availability of data.

SECURITY FOR THE PHYSICAL LAYER

The Security Challenge focuses on developing security measures at the physical layer – and exploring techniques such as quantum key distribution (QKD) to safeguard next-generation networks.

A significant focus of the C3 Security challenge is the use of Quantum Key Distribution (QKD), an emerging technology that promises to revolutionise network security. QKD leverages the principles of quantum mechanics to create cryptographic keys that are theoretically immune to eavesdropping. Any attempt to intercept or observe the key would immediately alter its state, alerting the network to the presence of a breach. This makes QKD one of the most secure methods of communication, especially in critical applications where data must remain confidential and tamper-proof.

HASC researchers are working to integrate QKD into both wired and wireless communication systems, ensuring that future networks can benefit from this ultra-secure encryption technique.

The C3 challenge focuses on developing advanced security solutions to protect data and ensure the resilience of future communication systems. Through cryptography, QKD, and physical layer security, HASC researchers aim to help secure next generation wired and wireless networks for both public and private use.


 

Associated Publications
6 December 2023 | Security
Practical, high-speed Gaussian coherent state continuous variable quantum key distribution with real-time parameter monitoring, optimised slicing, and post-processed key distillation
Nature Scientific Reports