Cyberattacks on Quantum Networked Computation and Communications --
Hacking the Superdense Coding Protocol on IBM's Quantum Computers
- URL: http://arxiv.org/abs/2105.07187v1
- Date: Sat, 15 May 2021 09:42:36 GMT
- Title: Cyberattacks on Quantum Networked Computation and Communications --
Hacking the Superdense Coding Protocol on IBM's Quantum Computers
- Authors: Carlos Pedro Gon\c{c}alves
- Abstract summary: We study two types of attacks on automated quantum communications protocols.
We show that, due to quantum entanglement and symmetries, the second type of attack works as a way to strategically disrupt quantum communications networks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The development of automated gate specification for quantum communications
and quantum networked computation opens up the way for malware designed at
corrupting the automation software, changing the automated quantum
communications protocols and algorithms. We study two types of attacks on
automated quantum communications protocols and simulate these attacks on the
superdense coding protocol, using remote access to IBM's Quantum Computers
available through IBM Q Experience to simulate these attacks on what would be a
low noise quantum communications network. The first type of attack leads to a
hacker-controlled bijective transformation of the final measured strings, the
second type of attack is a unitary scrambling attack that modifies the
automated gate specification to effectively scramble the final measurement,
disrupting quantum communications and taking advantage of quantum randomness
upon measurement in a way that makes it difficult to distinguish from hardware
malfunction or from a sudden rise in environmental noise. We show that, due to
quantum entanglement and symmetries, the second type of attack works as a way
to strategically disrupt quantum communications networks and quantum networked
computation in a way that makes it difficult to ascertain which node was
attacked. The main findings are discussed in the wider setting of quantum
cybersecurity and quantum networked computation, where ways of hacking
including the role of insider threats are discussed.
Related papers
- Jailbreaking Quantum Computers [10.353892677735212]
This work presents the first thorough exploration of the attacks on the interface between gate-level and pulse-level quantum circuits.
It shows that most current software development kits are vulnerable to these new types of attacks.
The exploration of security and privacy issues of the rising pulse-level quantum circuits provides insight into the future development of secure quantum software development kits and quantum computer systems.
arXiv Detail & Related papers (2024-06-10T00:11:05Z) - QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum
Circuits [82.50620782471485]
QuantumSEA is an in-time sparse exploration for noise-adaptive quantum circuits.
It aims to achieve two key objectives: (1) implicit circuits capacity during training and (2) noise robustness.
Our method establishes state-of-the-art results with only half the number of quantum gates and 2x time saving of circuit executions.
arXiv Detail & Related papers (2024-01-10T22:33:00Z) - Secured Quantum Identity Authentication Protocol for Quantum Networks [2.3317857568404032]
This paper proposes a quantum identity authentication protocol that protects quantum networks from malicious entanglements.
Unlike the existing protocols, the proposed quantum authentication protocol does not require periodic refreshments of the shared secret keys.
arXiv Detail & Related papers (2023-12-10T05:36:49Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Forty Thousand Kilometers Under Quantum Protection [0.0]
Quantum key distribution (QKD) is a revolutionary cryptography response to the cyberattacks threat posed by quantum computing.
Here, we build the long-distance security of the QKD upon the quantum foundations of the Second Law of Thermodynamics.
Our approach enables us to realize quantum states' repetition by optical amplifiers keeping states' wave properties and phase coherence.
arXiv Detail & Related papers (2023-01-25T14:43:19Z) - Optimal Stochastic Resource Allocation for Distributed Quantum Computing [50.809738453571015]
We propose a resource allocation scheme for distributed quantum computing (DQC) based on programming to minimize the total deployment cost for quantum resources.
The evaluation demonstrates the effectiveness and ability of the proposed scheme to balance the utilization of quantum computers and on-demand quantum computers.
arXiv Detail & Related papers (2022-09-16T02:37:32Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Password authentication schemes on a quantum computer [0.5156484100374059]
Quantum copy-protection prevents adversaries from making copies of existing quantum software.
We show an implementation of quantum copy-protection for password verification on IBM quantum computers.
arXiv Detail & Related papers (2022-01-29T06:40:39Z) - A P4 Data Plane for the Quantum Internet [68.97335984455059]
A new -- quantum -- network stack will be needed to account for the fundamentally new properties of quantum entanglement.
In the non-quantum world, programmable data planes have broken the pattern of ossification of the protocol stack.
We demonstrate how we use P4$_16$ to explore abstractions and device architectures for quantum networks.
arXiv Detail & Related papers (2020-10-21T19:37:23Z) - Anti-Forging Quantum Data: Cryptographic Verification of Quantum
Computational Power [1.9737117321211988]
Quantum cloud computing is emerging as a popular model for users to experience the power of quantum computing through the internet.
How can users be sure that the output strings sent by the server are really from a quantum hardware?
arXiv Detail & Related papers (2020-05-04T14:28:14Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.