Quantum Key Distribution for Critical Infrastructures: Towards Cyber
Physical Security for Hydropower and Dams
- URL: http://arxiv.org/abs/2310.13100v1
- Date: Thu, 19 Oct 2023 18:59:23 GMT
- Title: Quantum Key Distribution for Critical Infrastructures: Towards Cyber
Physical Security for Hydropower and Dams
- Authors: Adrien Green, Jeremy Lawrence, George Siopsis, Nicholas Peters, Ali
Passian
- Abstract summary: Hydropower facilities are often remotely monitored or controlled from a centralized remote-control room.
Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine.
The content could be encrypted and decrypted using a public key to protect the communicated information.
In contrast, quantum key distribution (QKD) is not based upon a computational problem, and offers an alternative to conventional public-key cryptography.
- Score: 0.4166512373146748
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Hydropower facilities are often remotely monitored or controlled from a
centralized remote-control room. Additionally, major component manufacturers
monitor the performance of installed components. While these communications
enable efficiencies and increased reliability, they also expand the
cyber-attack surface. Communications may use the internet to remote control a
facility's control systems, or it may involve sending control commands over a
network from a control room to a machine. The content could be encrypted and
decrypted using a public key to protect the communicated information. These
cryptographic encoding and decoding schemes have been shown to be vulnerable, a
situation which is being exacerbated as more advances are made in computer
technologies such as quantum computing. In contrast, quantum key distribution
(QKD) is not based upon a computational problem, and offers an alternative to
conventional public-key cryptography. Although the underlying mechanism of QKD
ensures that any attempt by an adversary to observe the quantum part of the
protocol will result in a detectable signature as an increased error rate,
potentially even preventing key generation, it serves as a warning for further
investigation. When the error rate is low enough and enough photons have been
detected, a shared private key can be generated known only to the sender and
receiver. We describe how this novel technology and its several modalities
could benefit the critical infrastructures of dams or hydropower facilities.
The presented discussions may be viewed as a precursor to a quantum
cybersecurity roadmap for the identification of relevant threats and
mitigation.
Related papers
- Onion Routing Key Distribution for QKDN [1.8637078358591843]
The advance of quantum computing poses a significant threat to classical cryptography.
Two main approaches have emerged: quantum cryptography and post-quantum cryptography.
We propose a secure key distribution protocol for Quantum Key Distribution Networks (QKDN)
arXiv Detail & Related papers (2025-02-10T16:47:42Z) - Post-Quantum Key Agreement Protocols Based on Modified Matrix-Power Functions over Singular Random Integer Matrix Semirings [0.0]
Post-quantum cryptography is essential for securing digital communications against threats posed by quantum computers.
This paper introduces two novel post-quantum key agreement protocols that can be easily implemented on standard computers.
arXiv Detail & Related papers (2025-01-04T14:01:09Z) - Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security [12.773068584968804]
We evaluate a key exchange protocol based on combining public-key schemes with physical-layer security.
We outline the protocol, discuss its security, and point out challenges to be resolved.
arXiv Detail & Related papers (2024-12-17T21:56:04Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Modulation leakage-free continuous-variable quantum key distribution [1.8268488712787332]
Continuous-variable (CV) QKD based on coherent states is an attractive scheme for secure communication.
This work is a step towards protecting CVQKD systems against practical imperfections of physical devices and operational limitations without performance degradation.
arXiv Detail & Related papers (2022-05-15T10:07:19Z) - The Computational and Latency Advantage of Quantum Communication
Networks [70.01340727637825]
This article summarises the current status of classical communication networks.
It identifies some critical open research challenges that can only be solved by leveraging quantum technologies.
arXiv Detail & Related papers (2021-06-07T06:31:02Z) - Measurement-device-independent QSDC protocol using Bell and GHZ states
on quantum simulator [0.0]
Quantum Secure Direct Communication (QSDC) protocol eliminates the necessity of key, encryption and ciphertext transmission.
It is a unique quantum communication scheme where secret information is transmitted directly over a quantum communication channel.
We make use of measurement-device-independent (MDI) protocol in this scheme where all the measurements of quantum states during communication are performed by a third party.
arXiv Detail & Related papers (2020-07-01T07:47:59Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.