Cargando…
Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7910897/ https://www.ncbi.nlm.nih.gov/pubmed/33573307 http://dx.doi.org/10.3390/e23020176 |
_version_ | 1783656219460763648 |
---|---|
author | Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui |
author_facet | Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui |
author_sort | Zheng, Yi |
collection | PubMed |
description | In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology. |
format | Online Article Text |
id | pubmed-7910897 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-79108972021-02-28 Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui Entropy (Basel) Article In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This is an effective quantum hacking strategy that seriously threatens the security of practical QKD systems. In this paper, we propose a new quantum hacking attack on an integrated silicon photonic continuous-variable quantum key distribution (CVQKD) system, which is known as a power analysis attack. This attack can be implemented by analyzing the power originating from the integrated electrical control circuit in state preparation with the help of machine learning, where the state preparation is assumed to be perfect in initial security proofs. Specifically, we describe a possible power model and show a complete attack based on a support vector regression (SVR) algorithm. The simulation results show that the secret key information decreases with the increase of the accuracy of the attack, especially in a situation with less excess noise. In particular, Eve does not have to intrude into the transmitter chip (Alice), and may perform a similar attack in practical chip-based discrete-variable quantum key distribution (DVQKD) systems. To resist this attack, the electrical control circuit should be improved to randomize the corresponding power. In addition, the power can be reduced by utilizing the dynamic voltage and frequency scaling (DVFS) technology. MDPI 2021-01-30 /pmc/articles/PMC7910897/ /pubmed/33573307 http://dx.doi.org/10.3390/e23020176 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis |
title | Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis |
title_full | Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis |
title_fullStr | Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis |
title_full_unstemmed | Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis |
title_short | Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis |
title_sort | quantum hacking on an integrated continuous-variable quantum key distribution system via power analysis |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7910897/ https://www.ncbi.nlm.nih.gov/pubmed/33573307 http://dx.doi.org/10.3390/e23020176 |
work_keys_str_mv | AT zhengyi quantumhackingonanintegratedcontinuousvariablequantumkeydistributionsystemviapoweranalysis AT shihaobin quantumhackingonanintegratedcontinuousvariablequantumkeydistributionsystemviapoweranalysis AT panwei quantumhackingonanintegratedcontinuousvariablequantumkeydistributionsystemviapoweranalysis AT wangquantao quantumhackingonanintegratedcontinuousvariablequantumkeydistributionsystemviapoweranalysis AT maojiahui quantumhackingonanintegratedcontinuousvariablequantumkeydistributionsystemviapoweranalysis |