当前位置: X-MOL 学术arXiv.cs.ET › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Cyberattacks on Quantum Networked Computation and Communications -- Hacking the Superdense Coding Protocol on IBM's Quantum Computers
arXiv - CS - Emerging Technologies Pub Date : 2021-05-15 , DOI: arxiv-2105.07187
Carlos Pedro Gonçalves

The development of automated gate specification for quantum communications and quantum networked computation opens up the way for malware designed at corrupting the automation software, changing the automated quantum communications protocols and algorithms. We study two types of attacks on automated quantum communications protocols and simulate these attacks on the superdense coding protocol, using remote access to IBM's Quantum Computers available through IBM Q Experience to simulate these attacks on what would be a low noise quantum communications network. The first type of attack leads to a hacker-controlled bijective transformation of the final measured strings, the second type of attack is a unitary scrambling attack that modifies the automated gate specification to effectively scramble the final measurement, disrupting quantum communications and taking advantage of quantum randomness upon measurement in a way that makes it difficult to distinguish from hardware malfunction or from a sudden rise in environmental noise. We show that, due to quantum entanglement and symmetries, the second type of attack works as a way to strategically disrupt quantum communications networks and quantum networked computation in a way that makes it difficult to ascertain which node was attacked. The main findings are discussed in the wider setting of quantum cybersecurity and quantum networked computation, where ways of hacking including the role of insider threats are discussed.

中文翻译:

量子网络计算和通信网络攻击-在IBM量子计算机上破解超级编码协议

用于量子通信和量子网络计算的自动门规范的开发为设计用于破坏自动化软件,更改自动化量子通信协议和算法的恶意软件开辟了道路。我们研究了对自动量子通信协议的两种类型的攻击,并通过对IBM Q Experience提供的对IBM量子计算机的远程访问来模拟对低密度量子通信网络上的这些攻击,并模拟了针对超密编码协议的这些攻击。第一种类型的攻击会导致黑客控制最终测量字符串的双射变换,第二种类型的攻击是单一加扰攻击,它会修改自动门规范以有效地对最终度量进行加扰,破坏量子通信并在测量时利用量子随机性,从而难以与硬件故障或环境噪声的突然升高区分开。我们表明,由于量子纠缠和对称性,第二种攻击方式以一种策略性地破坏量子通信网络和量子网络计算的方式,使得难以确定受到攻击的节点。在更广泛的量子网络安全和量子网络计算环境中讨论了主要发现,并在其中讨论了包括内部威胁作用在内的黑客入侵方式。由于量子的纠缠和对称性,第二种攻击方式以一种策略性的方式破坏了量子通信网络和量子网络计算的方式,从而使得难以确定受到攻击的节点。在更广泛的量子网络安全和量子网络计算环境中讨论了主要发现,并在其中讨论了包括内部威胁作用在内的黑客入侵方式。由于量子的纠缠和对称性,第二种攻击方式以一种策略性的方式破坏了量子通信网络和量子网络计算的方式,从而使得难以确定受到攻击的节点。在更广泛的量子网络安全和量子网络计算环境中讨论了主要发现,并在其中讨论了包括内部威胁作用在内的黑客入侵方式。
更新日期:2021-05-18
down
wechat
bug