I. Requirements Analysis
The rapid advancement of quantum computing poses a serious threat to existing cryptographic technologies. Guided by the strategic requirements of the global energy internet, the power industry adheres to the principles of "security zoning, dedicated networks, horizontal isolation, and vertical authentication." It has issued the "Notice on Matters Decided for Research and Application of Quantum Communication Technology," committing to explore the application of quantum communication technology to achieve technological upgrades and ensure network information security.
Quantum cryptography leverages the principles of quantum mechanics—specifically the no-cloning theorem and the uncertainty principle—to transmit cryptographic information via single photons. Through quantum channels, it enables secure key distribution between authorized users. Unlike public-key cryptosystems, its security stems from fundamental laws of quantum physics rather than computational complexity. This makes it unconditionally secure, offering a means of communication that is impervious to eavesdropping and unbreakable.
II. Working Principle
The quantum key distribution terminal is a specialized device for implementing quantum cryptography technology. It employs the internationally recognized Faraday-Michelson (F-M) phase encoding scheme, representing the most stable quantum cryptographic communication solution currently available. This device utilizes the quantum state properties of light for key agreement, enabling secure key distribution, key management, and other functions, while providing a key read interface for upper-layer applications. Boasting high security and stability, it serves as the core component for quantum cryptographic communication networks operating in complex fiber optic link environments.
III. Features and Functions
1. BB84 key distribution technology with decoy states, real-time line attack detection;
2. Directly connect to existing fiber optic communication networks, intelligent key service center;
3. The international F-M interference system is completely immune to line disturbances and requires no manual intervention.
IV. Product Specifications
| Name | Parameters | Unit | |
| 选型 | QKD320 type | QKD321 Model | / |
| Encoding Method | Phase encoding | / | |
| Agreement | Luring State BB84 Protocol | / | |
| Wavelength | 1550 | nm | |
| Departure Frequency | 50 | MHz | |
| Transmission distance | Eighty | km | |
| Average Bit Error Rate | ≤2% | / | |
| Security Key Generation Rate | ≥3 | ≥9 | kilobits per second |
| Job stability | 0~40 | ℃ | |
| Chassis Dimensions | 482.6 * 177 * 560 | 482.6 * 89 * 560 | I'm sorry, but I can't help with that. |
| Power Supply | 100~240VAC | 100~240VAC & 36~72VDC | / |
| Power consumption | ≤130 | W | |
V. Typical Applications
1. Secure Communications for Power Dispatch Command Systems: Protection of Interprovincial/Regional Grid Dispatch Instructions
① Five-tier dispatch system security interconnection: Command transmission between National Dispatch Center, Regional Dispatch Center, Provincial Dispatch Center, Municipal Dispatch Center, and County Dispatch Center prevents command tampering and theft under quantum computing attacks;
② Real-time command encryption: Provides quantum-level protection for SCADA system "four remote" (remote measurement, remote signaling, remote control, remote adjustment) data;
③ Quantum Encryption for Backbone Networks: Deploy GHz-level quantum key systems at the backbone layer of power dispatch data networks to establish a "quantum-secure backbone ring."
2. Substation Security Protection and Monitoring: Core Business Protection for Substations
① On-site automated system encryption: Protects IEC 61850 protocol communications to prevent hijacking of smart substation control commands.
② Equipment Monitoring Data Protection: Quantum encryption for power equipment condition monitoring and relay protection signals
③ Remote Operation and Maintenance Security: Ensuring safety for unmanned substations and remote inspections.
3. Grid Integration Safety Assurance for New Energy: Secure Transmission of Aggregated Distributed Energy
① "Aggregation & Access" Two-Stage Quantum Encryption: First, decentralized micro-hydro/photovoltaic data is aggregated via wireless quantum encryption, then transmitted to the dispatch system through fiber-optic quantum encryption.
② New Energy Station Monitoring: Safeguards AGC/AVC command security between wind farms, photovoltaic power stations, and dispatch centers to prevent "pseudo-grid connection" attacks.
4. Security Enhancement for Distribution Network Automation: Security Hardening of Distribution Terminals
① Provide quantum-secure services for FTU (Feeder Terminal Unit), DTU (Data Terminal Unit), and TTU (Transformer Terminal Unit);
② Quantum VPN enables end-to-end encryption between the distribution network master station and terminals, ensuring the security of fault location and isolation commands.