Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
- URL: http://arxiv.org/abs/2401.15869v1
- Date: Mon, 29 Jan 2024 03:56:21 GMT
- Title: Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
- Authors: Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer,
- Abstract summary: A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks.
This paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets.
- Score: 11.148634764855407
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this threat, this paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets. With access to power traces, attackers can recover information about the control pulses sent to quantum computers. From the control pulses, the gate level description of the circuits, and eventually the secret algorithms can be reverse engineered. This work demonstrates how and what information could be recovered. This work uses algebraic reconstruction from power traces to realize two new types of single trace attacks: per-channel and total power attacks. The former attack relies on per-channel measurements to perform a brute-force attack to reconstruct the quantum circuits. The latter attack performs a single-trace attack using Mixed-Integer Linear Programming optimization. Through the use of algebraic reconstruction, this work demonstrates that quantum circuit secrets can be stolen with high accuracy. Evaluation on 32 real benchmark quantum circuits shows that our technique is highly effective at reconstructing quantum circuits. The findings not only show the veracity of the potential attacks, but also the need to develop new means to protect quantum circuits from power trace attacks. Throughout this work real control pulse information from real quantum computers is used to demonstrate potential attacks based on simulation of collection of power traces.
Related papers
- SWAP Attack: Stealthy Side-Channel Attack on Multi-Tenant Quantum Cloud System [3.4804333771236875]
Crosstalk on shared quantum devices allows adversaries to interfere with victim circuits within a neighborhood.
We show that SWAP-based side-channel attack operates in both active and passive modes, as verified on real IBM quantum devices.
Our work highlights the urgent need for robust security measures to safeguard quantum computations against emerging threats.
arXiv Detail & Related papers (2025-02-14T12:25:08Z) - Masking Countermeasures Against Side-Channel Attacks on Quantum Computers [0.2624902795082451]
We propose a modification to the transpiler of a quantum computer to safeguard against side-channel attacks.
We provide examples of implementing this protection on IBM's quantum computers.
arXiv Detail & Related papers (2025-01-13T21:14:55Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Security Attacks Abusing Pulse-level Quantum Circuits [10.353892677735212]
This work presents the first thorough exploration of the attacks on the interface between gate-level and pulse-level quantum circuits.
It shows that most current software development kits are vulnerable to these new types of attacks.
The exploration of security and privacy issues of the rising pulse-level quantum circuits provides insight into the future development of secure quantum software development kits and quantum computer systems.
arXiv Detail & Related papers (2024-06-10T00:11:05Z) - QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum
Circuits [82.50620782471485]
QuantumSEA is an in-time sparse exploration for noise-adaptive quantum circuits.
It aims to achieve two key objectives: (1) implicit circuits capacity during training and (2) noise robustness.
Our method establishes state-of-the-art results with only half the number of quantum gates and 2x time saving of circuit executions.
arXiv Detail & Related papers (2024-01-10T22:33:00Z) - Exploration of Quantum Computer Power Side-Channels [6.531546527140474]
In today's cloud-based quantum computer setting, users lack physical control over the computers.
This work shows for the first time that power-based side-channel attacks could be deployed against quantum computers.
arXiv Detail & Related papers (2023-04-06T18:15:05Z) - Quantum circuit debugging and sensitivity analysis via local inversions [62.997667081978825]
We present a technique that pinpoints the sections of a quantum circuit that affect the circuit output the most.
We demonstrate the practicality and efficacy of the proposed technique by applying it to example algorithmic circuits implemented on IBM quantum machines.
arXiv Detail & Related papers (2022-04-12T19:39:31Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Synthesis of Quantum Circuits with an Island Genetic Algorithm [44.99833362998488]
Given a unitary matrix that performs certain operation, obtaining the equivalent quantum circuit is a non-trivial task.
Three problems are explored: the coin for the quantum walker, the Toffoli gate and the Fredkin gate.
The algorithm proposed proved to be efficient in decomposition of quantum circuits, and as a generic approach, it is limited only by the available computational power.
arXiv Detail & Related papers (2021-06-06T13:15:25Z) - Cyberattacks on Quantum Networked Computation and Communications --
Hacking the Superdense Coding Protocol on IBM's Quantum Computers [0.0]
We study two types of attacks on automated quantum communications protocols.
We show that, due to quantum entanglement and symmetries, the second type of attack works as a way to strategically disrupt quantum communications networks.
arXiv Detail & Related papers (2021-05-15T09:42:36Z) - A P4 Data Plane for the Quantum Internet [68.97335984455059]
A new -- quantum -- network stack will be needed to account for the fundamentally new properties of quantum entanglement.
In the non-quantum world, programmable data planes have broken the pattern of ossification of the protocol stack.
We demonstrate how we use P4$_16$ to explore abstractions and device architectures for quantum networks.
arXiv Detail & Related papers (2020-10-21T19:37:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.