Deep-Learning-Based Radio-Frequency Side-Channel Attack on Quantum Key
Distribution
- URL: http://arxiv.org/abs/2310.13738v1
- Date: Fri, 20 Oct 2023 18:00:02 GMT
- Title: Deep-Learning-Based Radio-Frequency Side-Channel Attack on Quantum Key
Distribution
- Authors: Adomas Baliuka and Markus St\"ocker and Michael Auer and Peter
Freiwang and Harald Weinfurter and Lukas Knips
- Abstract summary: Quantum key distribution (QKD) protocols are proven secure based on fundamental physical laws.
Side channels, where the encoded quantum state is correlated with properties of other degrees of freedom of the quantum channel, allow an eavesdropper to obtain information unnoticeably.
We here demonstrate a side-channel attack using a deep convolutional neural network to analyze the recorded classical, radio-frequency electromagnetic emissions.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) protocols are proven secure based on
fundamental physical laws, however, the proofs consider a well-defined setting
and encoding of the sent quantum signals only. Side channels, where the encoded
quantum state is correlated with properties of other degrees of freedom of the
quantum channel, allow an eavesdropper to obtain information unnoticeably as
demonstrated in a number of hacking attacks on the quantum channel. Yet, also
classical radiation emitted by the devices may be correlated, leaking
information on the potential key, especially when combined with novel data
analysis methods.
We here demonstrate a side-channel attack using a deep convolutional neural
network to analyze the recorded classical, radio-frequency electromagnetic
emissions. Even at a distance of a few centimeters from the electronics of a
QKD sender employing frequently used electronic components we are able to
recover virtually all information about the secret key. Yet, as shown here,
countermeasures can enable a significant reduction of both the emissions and
the amount of secret key information leaked to the attacker. Our analysis
methods are independent of the actual device and thus provide a starting point
for assessing the presence of classical side channels in QKD devices.
Related papers
- Increasing Interference Detection in Quantum Cryptography using the Quantum Fourier Transform [0.0]
We present two quantum cryptographic protocols leveraging the quantum Fourier transform (QFT)
The foremost of these protocols is a novel QKD method that leverages this effectiveness of the QFT.
We additionally show how existing quantum encryption methods can be augmented with a QFT-based approach to improve eavesdropping detection.
arXiv Detail & Related papers (2024-04-18T21:04:03Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - How to harness high-dimensional temporal entanglement, using limited
interferometry setups [62.997667081978825]
We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain.
We show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution.
We propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
arXiv Detail & Related papers (2023-08-08T17:44:43Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Modulation leakage-free continuous-variable quantum key distribution [1.8268488712787332]
Continuous-variable (CV) QKD based on coherent states is an attractive scheme for secure communication.
This work is a step towards protecting CVQKD systems against practical imperfections of physical devices and operational limitations without performance degradation.
arXiv Detail & Related papers (2022-05-15T10:07:19Z) - Quantum hacking perceiving for quantum key distribution using temporal
ghost imaging [7.7270491671042425]
Quantum key distribution (QKD) can generate secure key bits between remote users with quantum mechanics.
The most insidious attacks, known as quantum hacking, are the ones with no significant discrepancy of the measurement results.
We propose the method exploring temporal ghost imaging (TGI) scheme to perceive quantum hacking with temporal fingerprints.
arXiv Detail & Related papers (2020-12-28T02:21:09Z) - Quantum Keyless Privacy vs. Quantum Key Distribution for Space Links [0.0]
We study information theoretical security for space links between a satellite and a ground-station.
We demonstrate information theoretical secure communication rates (positive keyless private capacity) over a classical-quantum wiretap channel.
arXiv Detail & Related papers (2020-12-07T01:33:40Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.