Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, D. | - |
dc.contributor.author | Kim, G. | - |
dc.contributor.author | Heo, D. | - |
dc.contributor.author | Kim, S. | - |
dc.contributor.author | Kim, H. | - |
dc.contributor.author | Hong, S. | - |
dc.date.accessioned | 2021-12-03T12:41:27Z | - |
dc.date.available | 2021-12-03T12:41:27Z | - |
dc.date.created | 2021-08-31 | - |
dc.date.issued | 2021-03 | - |
dc.identifier.issn | 2405-9595 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/129119 | - |
dc.description.abstract | Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on the key reconciliation in the quantum key distribution system. In this system, the sifted key and the syndrome are used to derive a shared secret key between two users. From our attack, these can be fully recovered through a single power consumption trace measured during the syndrome computation on the sender's side. Additionally, we propose efficient countermeasures to thwart such side-channel attacks. © 2021 The Korean Institute of Communications and Information Sciences (KICS) | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | Korean Institute of Communication Sciences | - |
dc.title | Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, H. | - |
dc.contributor.affiliatedAuthor | Hong, S. | - |
dc.identifier.doi | 10.1016/j.icte.2021.01.013 | - |
dc.identifier.scopusid | 2-s2.0-85101030326 | - |
dc.identifier.wosid | 000631986200007 | - |
dc.identifier.bibliographicCitation | ICT Express, v.7, no.1, pp.36 - 40 | - |
dc.relation.isPartOf | ICT Express | - |
dc.citation.title | ICT Express | - |
dc.citation.volume | 7 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 36 | - |
dc.citation.endPage | 40 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Low-density parity-check code | - |
dc.subject.keywordAuthor | Quantum key distribution | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Side-channel attack | - |
dc.subject.keywordAuthor | Single trace attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.