Adversary Post-Processing

Adversary Post-Processing is a technique where the threat actor (Eve), having surreptitiously obtained the raw key material during a quantum key distribution (QKD) session, mimics the legitimate post-processing steps performed by the original communicating parties to derive the same final encryption key.

Threat actors may exfiltrate data from the raw quantum data, such as keys from the QKD, through the application of post-processing (key distillation) after being gathered using obtained information during Reconnaissance.


QID: A-0040
Tier: T0
Type: Classical
Tactic: Exfiltration
Created: 2024-01-19
Updated: 2024-05-24

Technique → Countermeasures

List of countermeasures applicable to this technique.

Items: 1
Description Countermeasure

End-to-End Encryption for Classical Channels in Quantum Communication Systems.