Quantum Key Distribution for Critical Infrastructures: Towards Cyber
Physical Security for Hydropower and Dams
- URL: http://arxiv.org/abs/2310.13100v1
- Date: Thu, 19 Oct 2023 18:59:23 GMT
- Title: Quantum Key Distribution for Critical Infrastructures: Towards Cyber
Physical Security for Hydropower and Dams
- Authors: Adrien Green, Jeremy Lawrence, George Siopsis, Nicholas Peters, Ali
Passian
- Abstract summary: Hydropower facilities are often remotely monitored or controlled from a centralized remote-control room.
Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine.
The content could be encrypted and decrypted using a public key to protect the communicated information.
In contrast, quantum key distribution (QKD) is not based upon a computational problem, and offers an alternative to conventional public-key cryptography.
- Score: 0.4166512373146748
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Hydropower facilities are often remotely monitored or controlled from a
centralized remote-control room. Additionally, major component manufacturers
monitor the performance of installed components. While these communications
enable efficiencies and increased reliability, they also expand the
cyber-attack surface. Communications may use the internet to remote control a
facility's control systems, or it may involve sending control commands over a
network from a control room to a machine. The content could be encrypted and
decrypted using a public key to protect the communicated information. These
cryptographic encoding and decoding schemes have been shown to be vulnerable, a
situation which is being exacerbated as more advances are made in computer
technologies such as quantum computing. In contrast, quantum key distribution
(QKD) is not based upon a computational problem, and offers an alternative to
conventional public-key cryptography. Although the underlying mechanism of QKD
ensures that any attempt by an adversary to observe the quantum part of the
protocol will result in a detectable signature as an increased error rate,
potentially even preventing key generation, it serves as a warning for further
investigation. When the error rate is low enough and enough photons have been
detected, a shared private key can be generated known only to the sender and
receiver. We describe how this novel technology and its several modalities
could benefit the critical infrastructures of dams or hydropower facilities.
The presented discussions may be viewed as a precursor to a quantum
cybersecurity roadmap for the identification of relevant threats and
mitigation.
Related papers
- Simulations of distributed-phase-reference quantum key distribution protocols [0.1398098625978622]
Quantum key distribution protocols provide a secret key between two users with security guaranteed by the laws of quantum mechanics.
We perform simulations on the Interconnect platform to characterise the practical implementation of these devices.
We briefly describe and simulate some possible eavesdropping attempts, backflash attack, trojan-horse attack and detector-blinding attack exploiting the device imperfections.
arXiv Detail & Related papers (2024-06-13T13:19:04Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Secure Data Transmission over Insecure Radio Channel in Wireless of Things (WoT) Network [1.864621482724548]
The Public Key Cryptography (PKC) techniques which use larger keys cannot be fitted in tiny resource constrained Wireless of Things (WoT) devices.
Some Symmetric Key Cryptosystems (SKC) use smaller keys, which can be fitted in the tiny devices.
In large networks where the number of nodes is in the order of 103, the memory constraint does not allow the system to do so.
arXiv Detail & Related papers (2023-11-20T16:00:02Z) - Deep-Learning-Based Radio-Frequency Side-Channel Attack on Quantum Key
Distribution [0.0]
Quantum key distribution (QKD) protocols are proven secure based on fundamental physical laws.
Side channels, where the encoded quantum state is correlated with properties of other degrees of freedom of the quantum channel, allow an eavesdropper to obtain information unnoticeably.
We here demonstrate a side-channel attack using a deep convolutional neural network to analyze the recorded classical, radio-frequency electromagnetic emissions.
arXiv Detail & Related papers (2023-10-20T18:00:02Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Modulation leakage-free continuous-variable quantum key distribution [1.8268488712787332]
Continuous-variable (CV) QKD based on coherent states is an attractive scheme for secure communication.
This work is a step towards protecting CVQKD systems against practical imperfections of physical devices and operational limitations without performance degradation.
arXiv Detail & Related papers (2022-05-15T10:07:19Z) - The Computational and Latency Advantage of Quantum Communication
Networks [70.01340727637825]
This article summarises the current status of classical communication networks.
It identifies some critical open research challenges that can only be solved by leveraging quantum technologies.
arXiv Detail & Related papers (2021-06-07T06:31:02Z) - Measurement-device-independent QSDC protocol using Bell and GHZ states
on quantum simulator [0.0]
Quantum Secure Direct Communication (QSDC) protocol eliminates the necessity of key, encryption and ciphertext transmission.
It is a unique quantum communication scheme where secret information is transmitted directly over a quantum communication channel.
We make use of measurement-device-independent (MDI) protocol in this scheme where all the measurements of quantum states during communication are performed by a third party.
arXiv Detail & Related papers (2020-07-01T07:47:59Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.