Notice, by using this platform, you agree to the Terms of Use and Privacy Policy.
Adversary Post-Processing
Adversary Post-Processing is a technique where the threat actor (Eve), having surreptitiously obtained the raw key material during a quantum key distribution (QKD) session, mimics the legitimate post-processing steps performed by the original communicating parties to derive the same final encryption key.
Threat actors may exfiltrate data from the raw quantum data, such as keys from the QKD, through the application of post-processing (key distillation) after being gathered using obtained information during Reconnaissance.
Technique → Countermeasures
List of countermeasures applicable to this technique.
Items: 1
Description | Countermeasure |
---|---|
End-to-End Encryption for Classical Channels in Quantum Communication Systems. |