Toward a Quantum Information System Cybersecurity Taxonomy and Testbed: Exploiting a Unique Opportunity for Early Impact
- URL: http://arxiv.org/abs/2404.12465v1
- Date: Thu, 18 Apr 2024 18:56:21 GMT
- Title: Toward a Quantum Information System Cybersecurity Taxonomy and Testbed: Exploiting a Unique Opportunity for Early Impact
- Authors: Benjamin Blakely, Joaquin Chung, Alec Poczatek, Ryan Syed, Raj Kettimuthu,
- Abstract summary: We propose a preliminary taxonomy for quantum cybersecurity vulnerabilities that accounts for the latest advances in quantum information systems.
We envision a testbed environment designed and instrumented with the specific purpose of enabling a broad collaborative community of cybersecurity and quantum information system experts to conduct experimental evaluation of software and hardware security.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Any human-designed system can potentially be exploited in ways that its designers did not envision, and information systems or networks using quantum components do not escape this reality. We are presented with a unique but quickly waning opportunity to bring cybersecurity concerns to the forefront for quantum information systems before they become widely deployed. The resources and knowledge required to do so, however, may not be common in the cybersecurity community. Yet, a nexus exist. Cybersecurity starts with risk, and there are good taxonomies for security vulnerabilities and impacts in classical systems. In this paper, we propose a preliminary taxonomy for quantum cybersecurity vulnerabilities that accounts for the latest advances in quantum information systems, and must evolve to incorporate well-established cybersecurity principles and methodologies. We envision a testbed environment designed and instrumented with the specific purpose of enabling a broad collaborative community of cybersecurity and quantum information system experts to conduct experimental evaluation of software and hardware security including both physical and virtual quantum components. Furthermore, we envision that such a resource may be available as a user facility to the open science research community.
Related papers
- Quantum-Accelerated Wireless Communications: Concepts, Connections, and Implications [59.0413662882849]
Quantum computing is poised to redefine the algorithmic foundations of communication systems.<n>This article outlines the fundamentals of quantum computing in a style familiar to the communications society.<n>We highlight a mathematical harmony between quantum and wireless systems, which makes the topic more enticing to wireless researchers.
arXiv Detail & Related papers (2025-06-25T22:25:47Z) - Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World [0.0]
The study employs PSALSAR systematic review methodology to ensure rigour and depth.<n>The analysis shows that quantum computing enhances encryption techniques to superior possibilities than classical ones.<n>The study concludes that quantum-resistant algorithms and quantum key distribution (QKD) are necessary for securing the accounting and finance systems of the future.
arXiv Detail & Related papers (2025-06-12T15:15:55Z) - Security Vulnerabilities in Quantum Cloud Systems: A Survey on Emerging Threats [0.0]
Quantum computing is becoming increasingly widespread due to the potential and capabilities to solve complex problems beyond the scope of classical computers.
However, the inherent vulnerabilities of these environments pose significant security concerns.
This survey delivers a comprehensive analysis of the security challenges that emerged in quantum cloud systems.
arXiv Detail & Related papers (2025-04-27T01:01:36Z) - Quantum Computing and Cybersecurity Education: A Novel Curriculum for Enhancing Graduate STEM Learning [3.1515473193934778]
Quantum computing is an emerging paradigm with the potential to transform numerous application areas by addressing problems considered intractable in the classical domain.
The exponential rise in cyber attacks, further complicated by quantum capabilities, poses serious risks to financial systems and national security.
Traditional cybersecurity education, often reliant on didactic methods, lacks hands on, student centered learning experiences necessary to prepare students for these evolving challenges.
arXiv Detail & Related papers (2025-03-12T13:26:54Z) - Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems [42.184783937646806]
We investigate the potential impact of quantum computing and machine learning (QML) on cybersecurity applications of traditional ML.
First, we explore the potential advantages of quantum computing in machine learning problems specifically related to cybersecurity.
Then, we describe a methodology to quantify the future impact of fault-tolerant QML algorithms on real-world problems.
arXiv Detail & Related papers (2025-02-16T15:49:25Z) - Open Problems in Machine Unlearning for AI Safety [61.43515658834902]
Machine unlearning -- the ability to selectively forget or suppress specific types of knowledge -- has shown promise for privacy and data removal tasks.
In this paper, we identify key limitations that prevent unlearning from serving as a comprehensive solution for AI safety.
arXiv Detail & Related papers (2025-01-09T03:59:10Z) - A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - Cyber Protection Applications of Quantum Computing: A Review [0.0]
scoping review was conducted by considering 815 papers.
Numerous quantum computing applications for cyber protection and a number of techniques to protect our data and privacy were identified.
arXiv Detail & Related papers (2024-06-19T06:46:31Z) - Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure [0.04096453902709291]
This analysis explores the impact of quantum computing on critical infrastructure and cloud services.
We advocate for proactive security strategies and collaboration between sectors to develop and implement quantum-resistant cryptography.
This blueprint strengthens each area's defenses against potential quantum-induced cyber threats.
arXiv Detail & Related papers (2024-04-16T15:36:23Z) - Assessing the Benefits and Risks of Quantum Computers [0.7224497621488283]
We review what is currently known on the potential uses and risks of quantum computers.
We identify 2 large-scale trends -- new approximate methods and the commercial exploration of business-relevant quantum applications.
We conclude there is a credible expectation that quantum computers will be capable of performing computations which are economically-impactful.
arXiv Detail & Related papers (2024-01-29T17:21:31Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - ShadowNet for Data-Centric Quantum System Learning [188.683909185536]
We propose a data-centric learning paradigm combining the strength of neural-network protocols and classical shadows.
Capitalizing on the generalization power of neural networks, this paradigm can be trained offline and excel at predicting previously unseen systems.
We present the instantiation of our paradigm in quantum state tomography and direct fidelity estimation tasks and conduct numerical analysis up to 60 qubits.
arXiv Detail & Related papers (2023-08-22T09:11:53Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Cybersecurity for Quantum Computing [3.867124349164785]
Quantum computing companies, institutions and research groups may become targets of nation-state actors, cybercriminals and hacktivists.
This paper discusses the status quo of quantum computing technologies and the quantum threat associated with it.
We propose recommendations on how to proactively reduce the cyberattack surface through threat intelligence and by ensuring security by design of quantum software and hardware components.
arXiv Detail & Related papers (2021-10-27T18:41:30Z) - Multi Agent System for Machine Learning Under Uncertainty in Cyber
Physical Manufacturing System [78.60415450507706]
Recent advancements in predictive machine learning has led to its application in various use cases in manufacturing.
Most research focused on maximising predictive accuracy without addressing the uncertainty associated with it.
In this paper, we determine the sources of uncertainty in machine learning and establish the success criteria of a machine learning system to function well under uncertainty.
arXiv Detail & Related papers (2021-07-28T10:28:05Z) - The Computational and Latency Advantage of Quantum Communication
Networks [70.01340727637825]
This article summarises the current status of classical communication networks.
It identifies some critical open research challenges that can only be solved by leveraging quantum technologies.
arXiv Detail & Related papers (2021-06-07T06:31:02Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.