• Corpus ID: 234741883

Cyberattacks on Quantum Networked Computation and Communications -- Hacking the Superdense Coding Protocol on IBM's Quantum Computers

@inproceedings{Gonccalves2021CyberattacksOQ,
  title={Cyberattacks on Quantum Networked Computation and Communications -- Hacking the Superdense Coding Protocol on IBM's Quantum Computers},
  author={Carlos Pedro Gonccalves},
  year={2021}
}
The development of automated gate specification for quantum communications and quantum networked computation opens up the way for malware designed at corrupting the automation software, changing the automated quantum communications protocols and algorithms. We study two types of attacks on automated quantum communications protocols and simulate these attacks on the superdense coding protocol, using remote access to IBM’s Quantum Computers available through IBM Q Experience to simulate these… 

References

SHOWING 1-10 OF 24 REFERENCES
Quantum Malware
TLDR
A simple solution for storage of quantum information in a manner, which protects quantum networks from quantum malware, which involves swapping the quantum information at random times between the network and isolated, distributed ancillas.
Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
TLDR
This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency, and it is shown how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace.
A practical trojan horse for bell-inequality-based quantum cryptography
TLDR
The old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device, even when you do violate the Bell inequality.
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
TLDR
It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.
Faked states attack on quantum cryptosystems
A new type of attack on quantum cryptography systems is proposed. In this attack, Eve utilizes various optical imperfections in Bob's scheme and constructs light pulses so that Bob does not
Quantum Key Distribution: Boon or Bust
TLDR
This article provides an accessible introduction to QKD and describes this seemingly strange quantum communications protocol in readily understandable terms and highlights recent developments in the field.
Quantum key distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option
TLDR
This paper proposes a method for strengthening classical cryptographic algorithms by the use of small amounts of one time pads, so that these algorithms can be used for an emergency operation when suffering a Denial-of-Service attack and during the time needed to fix it.
Quantum Neural Machine Learning: Theory and Experiments
  • C. Gonçalves
  • Computer Science, Physics
    Artificial Intelligence - Applications in Medicine and Biology
  • 2019
TLDR
The current work experimentally implements quantum artificial neural networks on IBM’s quantum computers, accessed via cloud, showing how decision can be integrated into a quantum artificial intelligence system, where an artificial agent learns how to select an optimal action when facing a classical gamble.
The future of cybersecurity is quantum
In 1882, a banker in Sacramento, Calif., named Frank Miller developed an absolutely unbreakable encryption method. Nearly 140 years later, cryptographers have yet to come up with something better.
Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals
TLDR
The authors present a readily understandable introduction and discussion of post-quantum cryptography, including quantum-resistant algorithms and quantum key distribution.
...
1
2
3
...