Cascade error correction attack; exploiting implicit and side channel information leakage

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Downloads (Pure)

Abstract

This work presents a complete mathematical model of a novel cryptanalytic attack that combines the Cascade error correction leakages with the side channel information leakage to construct a more powerful attack than either of these two launched alone. We find that a higher Quantum Bit Error Rate (QBER) leaves Cascade more vulnerable to reliable information being extracted from side channel leakage and as such, reliable complete key recovery. For a key length of 1024bits and QBER of 0.2, on any device where the ratio between the difference of noiseless power consumption levels of an XOR function outputting 0 or 1, and power consumption noise, is greater than 1.7, a full key recovery is expected. For lower QBER, we see that for the ratio of the difference of noiseless power consumption and power consumption noise must higher in order to successfully recover the key.
Original languageEnglish
Title of host publication2025 International Conference on Quantum Communications, Networking, and Computing (QCNC): Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages502-510
ISBN (Electronic)9798331531591
ISBN (Print)9798331531607
DOIs
Publication statusPublished - 15 May 2025
EventIEEE International Conference on Quantum Communications, Networking, and Computing - Nara, Japan, Nara, Japan
Duration: 31 Mar 202502 Apr 2025
https://www.ieee-qcnc.org/2025/

Conference

ConferenceIEEE International Conference on Quantum Communications, Networking, and Computing
Abbreviated titleQCNC 2025
Country/TerritoryJapan
CityNara
Period31/03/202502/04/2025
Internet address

Fingerprint

Dive into the research topics of 'Cascade error correction attack; exploiting implicit and side channel information leakage'. Together they form a unique fingerprint.

Cite this