Exploration of Quantum Computer Power Side-Channels
- URL: http://arxiv.org/abs/2304.03315v2
- Date: Tue, 9 May 2023 14:50:56 GMT
- Title: Exploration of Quantum Computer Power Side-Channels
- Authors: Chuanqi Xu, Ferhat Erata, Jakub Szefer
- Abstract summary: In today's cloud-based quantum computer setting, users lack physical control over the computers.
This work shows for the first time that power-based side-channel attacks could be deployed against quantum computers.
- Score: 6.531546527140474
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the rapidly growing interest in quantum computing also grows the
importance of securing these quantum computers from various physical attacks.
Constantly increasing qubit counts and improvements to the fidelity of the
quantum computers hold great promise for the ability of these computers to run
novel algorithms with highly sensitive intellectual property. However, in
today's cloud-based quantum computer setting, users lack physical control over
the computers. Physical attacks, such as those perpetrated by malicious
insiders in data centers, could be used to extract sensitive information about
the circuits being executed on these computers. Indeed, this work shows for the
first time that power-based side-channel attacks could be deployed against
quantum computers. Such attacks can be used to recover information about the
control pulses sent to these computers. By analyzing these control pulses,
attackers can reverse-engineer the equivalent gate-level description of the
circuits, and possibly even the secret algorithms being run. This work
introduces five new types of attacks, and evaluates them using control pulse
information available from cloud-based quantum computers. This work
demonstrates how and what circuits could be recovered, and then in turn how to
defend from the newly demonstrated side-channel attacks on quantum~computers.
Related papers
- The curse of random quantum data [62.24825255497622]
We quantify the performances of quantum machine learning in the landscape of quantum data.
We find that the training efficiency and generalization capabilities in quantum machine learning will be exponentially suppressed with the increase in qubits.
Our findings apply to both the quantum kernel method and the large-width limit of quantum neural networks.
arXiv Detail & Related papers (2024-08-19T12:18:07Z) - A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers [11.148634764855407]
A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks.
This paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets.
arXiv Detail & Related papers (2024-01-29T03:56:21Z) - Classification of Quantum Computer Fault Injection Attacks [10.353892677735212]
There is a significant gap in our understanding of the vulnerabilities these computers face in terms of security and privacy attacks.
This paper presents an exploration of fault-injection attacks as one class of physical attacks on quantum computers.
By shedding light on the vulnerabilities of quantum computers to fault-injection attacks, this work contributes to the development of robust security measures for this emerging technology.
arXiv Detail & Related papers (2023-09-11T14:16:43Z) - Hardware Architecture for a Quantum Computer Trusted Execution
Environment [7.9098355641304865]
Cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property.
This work presented the first hardware architecture for a trusted execution environment for quantum computers.
arXiv Detail & Related papers (2023-08-07T20:18:36Z) - Demonstration of quantum-digital payments [36.136619420474766]
We show how quantum light can secure daily digital payments by generating inherently unforgeable quantum cryptograms.
Unlike previously proposed protocols, our solution does not depend on long-term quantum storage or trusted agents and authenticated channels.
It is practical with near-term technology and may herald an era of quantum-enabled security.
arXiv Detail & Related papers (2023-05-23T20:20:14Z) - A Primer on Security of Quantum Computing [5.510992382274774]
Quantum computing can potentially transform several application areas by solving intractable problems from classical domain.
Quantum computing stack may contain sensitive Intellectual Properties (IP) that requires protection.
Quantum computers suffer from crosstalk that couples two programs in a multi-tenant setting to facilitate traditionally known fault injection attacks.
arXiv Detail & Related papers (2023-05-04T02:30:27Z) - Iterative Qubits Management for Quantum Index Searching in a Hybrid
System [56.39703478198019]
IQuCS aims at index searching and counting in a quantum-classical hybrid system.
We implement IQuCS with Qiskit and conduct intensive experiments.
Results demonstrate that it reduces qubits consumption by up to 66.2%.
arXiv Detail & Related papers (2022-09-22T21:54:28Z) - Cyberattacks on Quantum Networked Computation and Communications --
Hacking the Superdense Coding Protocol on IBM's Quantum Computers [0.0]
We study two types of attacks on automated quantum communications protocols.
We show that, due to quantum entanglement and symmetries, the second type of attack works as a way to strategically disrupt quantum communications networks.
arXiv Detail & Related papers (2021-05-15T09:42:36Z) - A P4 Data Plane for the Quantum Internet [68.97335984455059]
A new -- quantum -- network stack will be needed to account for the fundamentally new properties of quantum entanglement.
In the non-quantum world, programmable data planes have broken the pattern of ossification of the protocol stack.
We demonstrate how we use P4$_16$ to explore abstractions and device architectures for quantum networks.
arXiv Detail & Related papers (2020-10-21T19:37:23Z) - Chapter: Vulnerability of Quantum Information Systems to Collective Manipulation [41.94295877935867]
We present and discuss a new form of vulnerability in such systems.
Groups of adversaries can maximally disrupt these systems' global quantum state.
It will be almost impossible to detect these attacks since they do not change the Hamiltonian.
A countermeasure could be to embed future quantum technologies within redundant classical networks.
arXiv Detail & Related papers (2019-01-25T13:51:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.