Notice, by using this platform, you agree to the Terms of Use and Privacy Policy.
Power Consumption Analysis Attack on State Preparation in QKD Systems
The threat actor (Eve) can infer quantum states prepared by the transmitter (Alice) by analyzing the power consumption of the integrated electrical control circuit, using machine learning to correlate power with the transmitted states.
Literature
[Zheng2021] | Y. Zheng, H. Shi, W. Pan, Q. Wang, and J. Mao. "Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis" In: Entropy 23, 176.. (2021) https://doi.org/10.3390/e23020176. |
Technique → Countermeasures
List of countermeasures applicable to this technique.
Items: 1
Description | Countermeasure |
---|---|
Apply Power Analysis Masquerade |