Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
- URL: http://arxiv.org/abs/2401.15869v1
- Date: Mon, 29 Jan 2024 03:56:21 GMT
- Title: Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
- Authors: Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer,
- Abstract summary: A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks.
This paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets.
- Score: 11.148634764855407
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this threat, this paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets. With access to power traces, attackers can recover information about the control pulses sent to quantum computers. From the control pulses, the gate level description of the circuits, and eventually the secret algorithms can be reverse engineered. This work demonstrates how and what information could be recovered. This work uses algebraic reconstruction from power traces to realize two new types of single trace attacks: per-channel and total power attacks. The former attack relies on per-channel measurements to perform a brute-force attack to reconstruct the quantum circuits. The latter attack performs a single-trace attack using Mixed-Integer Linear Programming optimization. Through the use of algebraic reconstruction, this work demonstrates that quantum circuit secrets can be stolen with high accuracy. Evaluation on 32 real benchmark quantum circuits shows that our technique is highly effective at reconstructing quantum circuits. The findings not only show the veracity of the potential attacks, but also the need to develop new means to protect quantum circuits from power trace attacks. Throughout this work real control pulse information from real quantum computers is used to demonstrate potential attacks based on simulation of collection of power traces.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Quantum Truncated Differential and Boomerang Attack [10.853582091917236]
In this article, we concentrate on truncated differential and boomerang cryptanalysis.
We first present a quantum algorithm which is designed for finding truncated differentials of symmetric ciphers.
We prove that, with a overwhelming probability, the truncated differentials output by our algorithm must have high differential probability for the vast majority of keys in key space.
arXiv Detail & Related papers (2024-07-21T11:34:29Z) - Jailbreaking Quantum Computers [10.353892677735212]
This work presents the first thorough exploration of the attacks on the interface between gate-level and pulse-level quantum circuits.
It shows that most current software development kits are vulnerable to these new types of attacks.
The exploration of security and privacy issues of the rising pulse-level quantum circuits provides insight into the future development of secure quantum software development kits and quantum computer systems.
arXiv Detail & Related papers (2024-06-10T00:11:05Z) - QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum
Circuits [82.50620782471485]
QuantumSEA is an in-time sparse exploration for noise-adaptive quantum circuits.
It aims to achieve two key objectives: (1) implicit circuits capacity during training and (2) noise robustness.
Our method establishes state-of-the-art results with only half the number of quantum gates and 2x time saving of circuit executions.
arXiv Detail & Related papers (2024-01-10T22:33:00Z) - Exploration of Quantum Computer Power Side-Channels [6.531546527140474]
In today's cloud-based quantum computer setting, users lack physical control over the computers.
This work shows for the first time that power-based side-channel attacks could be deployed against quantum computers.
arXiv Detail & Related papers (2023-04-06T18:15:05Z) - Quantum circuit debugging and sensitivity analysis via local inversions [62.997667081978825]
We present a technique that pinpoints the sections of a quantum circuit that affect the circuit output the most.
We demonstrate the practicality and efficacy of the proposed technique by applying it to example algorithmic circuits implemented on IBM quantum machines.
arXiv Detail & Related papers (2022-04-12T19:39:31Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Quanto: Optimizing Quantum Circuits with Automatic Generation of Circuit
Identities [4.910512799378831]
Existing quantum compilers focus on mapping a quantum circuit to a quantum device and its native quantum gates.
We propose Quanto, the first quantum that automatically generates circuit identities.
arXiv Detail & Related papers (2021-11-22T18:00:03Z) - Cyberattacks on Quantum Networked Computation and Communications --
Hacking the Superdense Coding Protocol on IBM's Quantum Computers [0.0]
We study two types of attacks on automated quantum communications protocols.
We show that, due to quantum entanglement and symmetries, the second type of attack works as a way to strategically disrupt quantum communications networks.
arXiv Detail & Related papers (2021-05-15T09:42:36Z) - A P4 Data Plane for the Quantum Internet [68.97335984455059]
A new -- quantum -- network stack will be needed to account for the fundamentally new properties of quantum entanglement.
In the non-quantum world, programmable data planes have broken the pattern of ossification of the protocol stack.
We demonstrate how we use P4$_16$ to explore abstractions and device architectures for quantum networks.
arXiv Detail & Related papers (2020-10-21T19:37:23Z) - QUANTIFY: A framework for resource analysis and design verification of
quantum circuits [69.43216268165402]
QUANTIFY is an open-source framework for the quantitative analysis of quantum circuits.
It is based on Google Cirq and is developed with Clifford+T circuits in mind.
For benchmarking purposes QUANTIFY includes quantum memory and quantum arithmetic circuits.
arXiv Detail & Related papers (2020-07-21T15:36:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.