# Cyberattacks on Quantum Networked Computation and Communications -- Hacking the Superdense Coding Protocol on IBM's Quantum Computers

@inproceedings{Gonccalves2021CyberattacksOQ, title={Cyberattacks on Quantum Networked Computation and Communications -- Hacking the Superdense Coding Protocol on IBM's Quantum Computers}, author={Carlos Pedro Gonccalves}, year={2021} }

The development of automated gate specification for quantum communications and quantum networked computation opens up the way for malware designed at corrupting the automation software, changing the automated quantum communications protocols and algorithms. We study two types of attacks on automated quantum communications protocols and simulate these attacks on the superdense coding protocol, using remote access to IBM’s Quantum Computers available through IBM Q Experience to simulate these…

## Figures and Tables from this paper

## References

SHOWING 1-10 OF 24 REFERENCES

Quantum Malware

- Computer Science, PhysicsQuantum Inf. Process.
- 2006

A simple solution for storage of quantum information in a manner, which protects quantum networks from quantum malware, which involves swapping the quantum information at random times between the network and isolated, distributed ancillas.

Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution

- Physics, Computer ScienceScience Advances
- 2015

This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency, and it is shown how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace.

A practical trojan horse for bell-inequality-based quantum cryptography

- Computer Science, PhysicsQuantum Inf. Comput.
- 2002

The old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device, even when you do violate the Bell inequality.

Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

- Computer Science, MathematicsNature communications
- 2011

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

Faked states attack on quantum cryptosystems

- Computer Science, Mathematics
- 2005

A new type of attack on quantum cryptography systems is proposed. In this attack, Eve utilizes various optical imperfections in Bob's scheme and constructs light pulses so that Bob does not…

Quantum Key Distribution: Boon or Bust

- Computer Science
- 2016

This article provides an accessible introduction to QKD and describes this seemingly strange quantum communications protocol in readily understandable terms and highlights recent developments in the field.

Quantum key distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option

- Computer Science2010 International Computer Symposium (ICS2010)
- 2010

This paper proposes a method for strengthening classical cryptographic algorithms by the use of small amounts of one time pads, so that these algorithms can be used for an emergency operation when suffering a Denial-of-Service attack and during the time needed to fix it.

Quantum Neural Machine Learning: Theory and Experiments

- Computer Science, PhysicsArtificial Intelligence - Applications in Medicine and Biology
- 2019

The current work experimentally implements quantum artificial neural networks on IBM’s quantum computers, accessed via cloud, showing how decision can be integrated into a quantum artificial intelligence system, where an artificial agent learns how to select an optimal action when facing a classical gamble.

The future of cybersecurity is quantum

- Computer ScienceIEEE Spectrum
- 2018

In 1882, a banker in Sacramento, Calif., named Frank Miller developed an absolutely unbreakable encryption method. Nearly 140 years later, cryptographers have yet to come up with something better.…

Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals

- Computer Science, PhysicsIT Professional
- 2016

The authors present a readily understandable introduction and discussion of post-quantum cryptography, including quantum-resistant algorithms and quantum key distribution.