High Dimensional Quantum Eavesdropping: A Hypothetical Attack on BB84 & SSP
- URL: http://arxiv.org/abs/2412.08487v1
- Date: Wed, 11 Dec 2024 15:52:05 GMT
- Title: High Dimensional Quantum Eavesdropping: A Hypothetical Attack on BB84 & SSP
- Authors: Christopher Dunne,
- Abstract summary: This paper develops and investigates a novel attack strategy capable of being undetected through error analysis of the shared key.
By measuring a particle in a dimension that spans all possible states in a given quantum key distribution algorithm, the collapsed state of the measured particle should be undetectable.
The results of these simulations show the efficiency of this attack, with an eavesdropper being undetectable through quantum bit error rate analysis in each algorithm.
- Score: 0.0
- License:
- Abstract: Quantum key distribution algorithms are considered secure because they leverage quantum phenomena to provide security. As such, eavesdroppers can be detected by analyzing the error rate in the shared key obtained by the parties performing the key exchange. Nevertheless, this paper developed and investigated a novel attack strategy capable of being undetected through error analysis of the shared key. Said attack entails an eavesdropper measuring the quantum channel (i.e., the channel used to transmit quantum particles between two parties) using a higher dimension than that used by the legitimate parties. By measuring a particle in a dimension that spans all possible states in a given quantum key distribution algorithm, the collapsed state of the measured particle should be undetectable when measured in the lower dimension. To analyze the proposed high-dimensional eavesdropping attack, the simulator Cirq was used to model the attack on BB84, a four-dimensional variant of BB84, and the Six-State Protocol. The results of these simulations show the efficiency of this attack, with an eavesdropper being undetectable through quantum bit error rate analysis in each algorithm This promotes the need for further analysis of the high-dimensional eavesdropping attack on physical hardware and other quantum key distribution algorithms
Related papers
- Quantum Truncated Differential and Boomerang Attack [10.853582091917236]
In this article, we concentrate on truncated differential and boomerang cryptanalysis.
We first present a quantum algorithm which is designed for finding truncated differentials of symmetric ciphers.
We prove that, with a overwhelming probability, the truncated differentials output by our algorithm must have high differential probability for the vast majority of keys in key space.
arXiv Detail & Related papers (2024-07-21T11:34:29Z) - A Quantum Automatic Tool for Finding Impossible Differentials [12.997422492640766]
We propose two quantum automatic tools for searching impossible differentials.
The proposed quantum algorithms exploit the idea of miss-in-the-middle and the properties of truncated differentials.
arXiv Detail & Related papers (2024-07-14T03:00:24Z) - Measuring Quantum Information Leakage Under Detection Threat [7.82527155589504]
Gentle quantum leakage is proposed as a measure of information leakage to arbitrary eavesdroppers.
Measures are used to encode the desire of the eavesdropper to evade detection.
Global depolarizing noise is shown to reduce gentle quantum leakage.
arXiv Detail & Related papers (2024-03-18T03:07:09Z) - Power Characterization of Noisy Quantum Kernels [52.47151453259434]
We show that noise may make quantum kernel methods to only have poor prediction capability, even when the generalization error is small.
We provide a crucial warning to employ noisy quantum kernel methods for quantum computation.
arXiv Detail & Related papers (2024-01-31T01:02:16Z) - Quantum error mitigation for Fourier moment computation [49.1574468325115]
This paper focuses on the computation of Fourier moments within the context of a nuclear effective field theory on superconducting quantum hardware.
The study integrates echo verification and noise renormalization into Hadamard tests using control reversal gates.
The analysis, conducted using noise models, reveals a significant reduction in noise strength by two orders of magnitude.
arXiv Detail & Related papers (2024-01-23T19:10:24Z) - The Quantum Cryptography Approach: Unleashing the Potential of Quantum
Key Reconciliation Protocol for Secure Communication [7.318072482453136]
Quantum Key Distribution (QKD) has been recognized as the most important breakthrough in quantum cryptography.
This paper proposes a novel method that allows users to communicate while generating the secure keys and securing the transmission without any leakage of the data.
arXiv Detail & Related papers (2024-01-17T05:41:17Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Eavesdropping a Quantum Key Distribution network using sequential
quantum unsharp measurement attacks [0.8010615606748019]
We consider a pure two-qubit state shared between two parties Alice and Bob, sharing quantum steerable correlations.
One qubit of the shared state is with Alice and the other one while going to the Bob's place is intercepted by multiple sequential eavesdroppers.
arXiv Detail & Related papers (2021-08-23T19:10:33Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.