Abstract
This work presents a complete mathematical model of a novel cryptanalytic attack that combines the Cascade error correction leakages with the side channel information leakage to construct a more powerful attack than either of these two launched alone. We find that a higher Quantum Bit Error Rate (QBER) leaves Cascade more vulnerable to reliable information being extracted from side channel leakage and as such, reliable complete key recovery. For a key length of 1024bits and QBER of 0.2, on any device where the ratio between the difference of noiseless power consumption levels of an XOR function outputting 0 or 1, and power consumption noise, is greater than 1.7, a full key recovery is expected. For lower QBER, we see that for the ratio of the difference of noiseless power consumption and power consumption noise must higher in order to successfully recover the key.
Original language | English |
---|---|
Title of host publication | 2025 International Conference on Quantum Communications, Networking, and Computing (QCNC): Proceedings |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 502-510 |
ISBN (Electronic) | 9798331531591 |
ISBN (Print) | 9798331531607 |
DOIs | |
Publication status | Published - 15 May 2025 |
Event | IEEE International Conference on Quantum Communications, Networking, and Computing - Nara, Japan, Nara, Japan Duration: 31 Mar 2025 → 02 Apr 2025 https://www.ieee-qcnc.org/2025/ |
Conference
Conference | IEEE International Conference on Quantum Communications, Networking, and Computing |
---|---|
Abbreviated title | QCNC 2025 |
Country/Territory | Japan |
City | Nara |
Period | 31/03/2025 → 02/04/2025 |
Internet address |