Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on the key reconciliation in the quantum key distribution system. In this system, the sifted key and the syndrome are used to derive a shared secret key between two users. From our attack, these can be fully recovered through a single power consumption trace measured during the syndrome computation on the sender's side. Additionally, we propose efficient countermeasures to thwart such side-channel attacks.
Bibliographical noteFunding Information:
This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT, South Korea under Grant NRF-2019R1A2C2088960 .
© 2021 The Korean Institute of Communications and Information Sciences (KICS)
- Low-density parity-check code
- Quantum key distribution
- Side-channel attack
- Single trace attack
ASJC Scopus subject areas
- Information Systems
- Hardware and Architecture
- Computer Networks and Communications
- Artificial Intelligence