Side Channel Attack on a Quantum Random Number Generator

The paper presents the results of applying an advanced attack on an external channel to an extractor of a quantum random number generator (QRNG). The attack is based on the verification of mathematical models of the interception channel and the EM signal of the extractor. Numerical simulation of the electromagnetic (EM) signal and the master key interception channel was performed based on the implementation of the DEMA algorithm of the attack on the AES-128 cipher. Measurements of the parameters of the EM signal and the interception channel were carried out on an experimental setup using a modern reference base in the field of electromagnetic compatibility.

[1]  P. X. Wang,et al.  Note: A sampling method for quantum random bit generation. , 2010, The Review of scientific instruments.

[2]  Jude Angelo Ambrose Power analysis side channel attacks: the processor design-level context , 2009 .

[3]  Peter Schwabe,et al.  Faster and Timing-Attack Resistant AES-GCM , 2009, CHES.

[4]  Riccardo Bettati,et al.  Adaptive Channel Estimation in Side Channel Attacks , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).

[5]  Oleksii Nariezhnii,et al.  Differential electromagnetic attack on cryptographies modules of a quantum random number generator , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[6]  Liang Liu,et al.  Side-Channel Attacks in a Real Scenario , 2018, Tsinghua Science and Technology.

[7]  M. A. Wayne,et al.  Optical quantum random number generation: applications of single-photon event timing , 2017 .

[8]  Xiangmin Zhang,et al.  Side-channel collision attack based on multiple-bits , 2017, 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID).

[9]  Seokhie Hong,et al.  Single Trace Side Channel Analysis on Quantum Key Distribution , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[10]  Ming Qu,et al.  Irradiation side-channel attack on cryptographic chip , 2016, 2016 International Conference on Integrated Circuits and Microsystems (ICICM).

[11]  Y. Stasev,et al.  Asymmetric Code-Theoretical Schemes Constructed with the Use of Algebraic Geometric Codes , 2005 .

[12]  Alexandr Kuznetsov,et al.  Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2 , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[13]  Daniel J. Bernstein,et al.  Cache-timing attacks on AES , 2005 .

[14]  Muhammad Faisal Amjad,et al.  Combining algebraic and side channel attacks on stream ciphers , 2017, 2017 International Conference on Communication Technologies (ComTech).

[15]  Johannes Blömer,et al.  Analysis of countermeasures against access driven cache attacks on AES , 2007, IACR Cryptol. ePrint Arch..

[16]  Quantum Random Number Generator Using Photon-Number Path Entanglement , 2009 .

[17]  Adi Shamir,et al.  Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.

[18]  Tevfik Bultan,et al.  Synthesis of Adaptive Side-Channel Attacks , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).