Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers

被引:0
作者
Erata F. [1 ]
Xu C. [1 ]
Piskac R. [1 ]
Szefer J. [1 ]
机构
[1] Yale University, New Haven, CT
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2024年 / 2024卷 / 02期
基金
美国国家科学基金会;
关键词
Automated Reasoning; Mixed Integer Linear Programming; Power Trace Attack; Quantum Circuits; Quantum Computers; Side Channel Attacks;
D O I
10.46586/tches.v2024.i2.735-768
中图分类号
学科分类号
摘要
The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this threat, this paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets. With access to power traces, attackers can recover information about the control pulses sent to quantum computers. From the control pulses, the gate level description of the circuits, and eventually the secret algorithms can be reverse engineered. This work demonstrates how and what information could be recovered. This work uses algebraic reconstruction from power traces to realize two new types of single trace attacks: per-channel and total power attacks. The former attack relies on per-channel measurements to perform a brute-force attack to reconstruct the quantum circuits. The latter attack performs a single-trace attack using Mixed-Integer Linear Programming optimization. Through the use of algebraic reconstruction, this work demonstrates that quantum circuit secrets can be stolen with high accuracy. Evaluation on 32 real benchmark quantum circuits shows that our technique is highly effective at reconstructing quantum circuits. The findings not only show the veracity of the potential attacks, but also the need to develop new means to protect quantum circuits from power trace attacks. Throughout this work real control pulse information from real quantum computers is used to demonstrate potential attacks based on simulation of collection of power traces. © 2024, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:735 / 768
页数:33
相关论文
共 84 条
[1]  
Abromeit Arnold, Bache Florian, Becker Leon A, Gourjon Marc, Guneysu Tim, Jorn Sabrina, Moradi Amir, Orlt Maximilian, Schel-lenberg Falk, Automated masking of software implementations on industrial microcontrollers, 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1006-1011, (2021)
[2]  
Agosta Giovanni, Barenghi Alessandro, Pelosi Gerardo, Compiler-based techniques to secure cryptographic embedded software against side-channel attacks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39, 8, pp. 1550-1554, (2019)
[3]  
AgentANAKIN. Grover’s Algorithm, (2019)
[4]  
(2023)
[5]  
Ash-Saki Abdullah, Alam Mahabubul, Ghosh Swaroop, Analysis of crosstalk in nisq devices and security implications in multi-programming regime, Proceedings of the ACM/IEEE International Symposium on Low Power Electronics and Design, pp. 25-30, (2020)
[6]  
Balas Egon, Disjunctive programming, Annals of discrete mathematics, 5, pp. 3-51, (1979)
[7]  
Barbosa Haniel, Barrett Clark W., Brain Martin, Kremer Gereon, Lachnitt Hanna, Mann Makai, Mohamed Abdalrhman, Mohamed Mudathir, Niemetz Aina, Notzli Andres, Ozdemir Alex, Preiner Mathias, Reynolds Andrew, Sheng Ying, Tinelli Cesare, Zohar Yoni, cvc5: A versatile and industrial-strength SMT solver, Tools and Algorithms for the Construction and Analysis of Systems-28th International Conference, TACAS 2022, volume 13243 of Lecture Notes in Computer Science, pp. 415-442, (2022)
[8]  
Belleville Nicolas, Courousse Damien, Heydemann Karine, Charles Henri-Pierre, Automated software protection for the masses against side-channel attacks, ACM Transactions on Architecture and Code Optimization (TACO), 15, 4, pp. 1-27, (2018)
[9]  
Belaid Sonia, Dagand Pierre-Evariste, Mercadier Darius, Rivain Matthieu, Wintersdorff Raphael, Tornado: Automatic generation of probing-secure masked bitsliced implementations, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 311-341, (2020)
[10]  
Branciard Cyril, Gisin Nicolas, Kraus Barbara, Scarani Valerio, Security of two quantum cryptography protocols using the same four qubit states, Physical Review A, 72, 3, (2005)