Information Leakage Through Electromagnetic Radiation

The threat actor (Eve) measures the electromagnetic radiation emitted by the transmitter (Alice) and/or receiver (Bob) to infer information about the generated key in a Quantum Key Distribution system.


Literature

[BSI2023] BSI. "Implementation Attacks against QKD Systems". (2023) https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/QKD-Systems/QKD-Systems.pdf.
[Kim2018] S. Kim, S. Jin, Y. Lee, B. Park, H. Kim, and S. Hong. "Single Trace Side Channel Analysis on Quantum Key Distribution" In: 2018 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), 736-739. (2018) 10.1109/ICTC.2018. 8539703.
[Molotkov2013] S. Molotkov. "On the quantum-mechanical bound on the loss of information through side channels in quantum cryptography" In: Jetp Lett. 97, 604–610. (2013) 10.1134/S002136401310007X.
[Molotkov2019] S. Molotkov, K. Balygin, A. Klimov, and S. Kulik. "Active sensing and side channels of information leakage in quantum cryptography" In: Laser Physics 29, 124001. (2019) 10.1088/1555-6611/ab4bd9.
[Molotkov2020c] S. Molotkov. "On the Side Quantum-Classical Binary Channel of Information Leakage with Gaussian Noise" In: Jetp Lett. 111, 506–511. (2020) 10.1134/S0021364020090088.

QID: A-0095
Tier: T0
Type: Classical
Tactic: Execution
Created: 2024-06-07
Updated: 2024-08-12

Technique → Countermeasures

List of countermeasures applicable to this technique.

Items: 2
Description Countermeasure

Application of TEMPEST principles, e.g. electromagnetic shielding such as Faraday cage.

Include this attack in your security proof.