Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
Netmanias Interview with SK Telecom at MWC 2015: SK Telecom showcased 5G Quantum Cryptography System
April 07, 2015 | By Dr. Michelle M. Do (tech@netmanias.com)
Online viewer:
Comments (0)

For the rest of the Q2 2015 issue of Korea Communication Review magazine please click here


At Mobile World Congress (MWC) 2015, SK Telecom showcased Quantum Cryptography System (QCS) it had developed for secure data transmission in ultra-capacity, ultra-high-speed networks of 5G era.


SK Telecom presented Quantum Cryptography System (QCS) at MWC 2015


Unlike the traditional cryptography system that is based on mathematics, QCS is based on quantum physics. So it is 100% effective in preventing any eavesdrop attempts as it generates secret keys using photons.   


Above figure shows QCS prototype consisting of a Quantum Key Distribution (QKD) server and 2-channel encryptor. QKD enables one party to produce a secret key at 10Kbps, share it with the other party at the other end of the network (up to 50km away), and update the key if any eavesdrop attempt is detected. 


An encryptor, with 2 channels, can encrypt transmitted data at 20 Gbps (that is, 10 Gbps per channel) with less than 10 usec of processing delay. This system allows for up to 800 Gbps data encryption using 40 stacked QCSs.


QKD uses photons, elementary particles of a quantum, in generating and sharing secret keys. When optic fiber signal is on, there exist 9 trillion photons. QKD can generate secret keys by using some of the photons, specifically one photon per user. 


Secret keys are generated based on information on the polarization and phase of a photon, and sent to the receivers for sharing. So, any eavesdrop attempt will cause a state change in the photon embedded in the key, making eavesdropping impossible. 


Traditional cryptosystems are based on mathematics (e.g. RSA), and thus data encrypted using traditional cryptosystems are inevitably vulnerable to hacking. On the contrary, if encrypted using QCS, it is virtually impossible to hack, or even unlawfully access, the encrypted data. Mr. Seung Hwan Kwak, Team Head of QKD Development at SK Telecom, noted that now cryptosystems rely more on physics, rather than mathematics.  



In the demonstration, SK Telecom used a prototype designed for backbone (high-capacity QKD), which is scheduled to be commercialized in late 2015. In addition to high-capacity QKD, low-capacity QKD to be used between LTE RAN and Core network is under development as well. 


In addition to QKD that operates at network level, the company is also working on development of True Random Number Generation (TRNG) chips that generate true random numbers at application level (not demonstrated at the event, though). So far, random numbers have been generated based on SW, and thus they were pseudo.


However, this HW-based TRNG chip generates true random numbers based on quantum mechanics. SK Telecom has been making efforts to develop small-sized, affordable TRNG chips. Thanks to its excellent versatility, the TRNG chips can be used anywhere that requires cryptography, and thus is expected to be quite attractive in the fields such as IoT, smart grid, etc., soon.



Thank you for visiting Netmanias! Please leave your comment if you have a question or suggestion.

[HFR Private 5G: my5G]


Details >>







Subscribe FREE >>

Currently, 55,000+ subscribed to Netmanias.

  • You can get Netmanias Newsletter

  • You can view all netmanias' contents

  • You can download all netmanias'

    contents in pdf file







View All (858)
4.5G (1) 5G (102) AI (8) AR (1) ARP (3) AT&T (1) Akamai (1) Authentication (5) BSS (1) Big Data (2) Billing (1) Blockchain (3) C-RAN/Fronthaul (18) CDN (4) CPRI (4) Carrier Ethernet (3) Charging (1) China (1) China Mobile (2) Cisco (1) Cloud (5) CoMP (6) Connected Car (4) DHCP (5) EDGE (1) Edge Computing (1) Ericsson (2) FTTH (6) GSLB (1) GiGAtopia (2) Gigabit Internet (19) Google (7) Google Global Cache (3) HLS (5) HSDPA (2) HTTP Adaptive Streaming (5) Handover (1) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (21) IoST (3) IoT (56) KT (43) Korea (20) Korea ICT Market (1) Korea ICT Service (13) Korea ICT Vendor (1) LG U+ (18) LSC (1) LTE (78) LTE-A (16) LTE-B (1) LTE-H (2) LTE-M (3) LTE-U (4) LoRa (7) MEC (4) MPLS (2) MPTCP (3) MWC 2015 (8) NB-IoT (6) Netflix (2) Network Protocol (21) Network Slice (1) Network Slicing (4) New Radio (9) Nokia (1) OSPF (2) OTT (3) PCRF (1) Platform (2) Private 5G (11) QoS (3) RCS (4) Railway (1) Roaming (1) SD-WAN (17) SDN/NFV (71) SIM (1) SK Broadband (2) SK Telecom (35) Samsung (5) Security (16) Self-Driving (1) Small Cell (2) Spectrum Sharing (2) Switching (6) TAU (2) UHD (5) VR (2) Video Streaming (12) VoLTE (8) VoWiFi (2) Wi-Fi (31) YouTube (6) blockchain (1) eICIC (1) eMBMS (1) iBeacon (1) security (1) telecoin (1) uCPE (2)
Password confirmation
Please enter your registered comment password.