1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction
7 Information assets to be protected in key management in the QKDN
7.1 Key data
7.2 Metadata
7.3 Control and management information
8 Security threats of key management in QKDN
8.1 Threats to KMA links (T_K2-1) and key supply links (T-K1, T_K3,
T_A1)
8.2 Threats to KSA links (T_K2-2)
8.3 Threats to control and management links (T_C, T_M, T_C&M)
8.4 Threats to KMA and KSA (T_KMA, T_KSA)
9 Security requirements and measures for information assets of key
management in QKDN
9.1 Security requirements and measures on the key data
9.2 Security requirements and measures on the metadata
9.3 Security requirements and measures on the control and management
information
9.4 Loss and corruption, and DoS
Bibliography