Search papers, labs, and topics across Lattice.
This paper introduces the Manipulate-and-Observe attack on Quantum Key Distribution (QKD), which exploits parity-leakage during the classical post-processing reconciliation phase. The attack involves intercepting a fraction of qubits during key exchange, injecting errors up to the tolerated threshold, and then probing and exploiting parity-leakage during reconciliation using a vectorized brute-force filter. Simulations on BB84 and Cascade protocols demonstrate that this attack can significantly reduce security, even fully recovering the key in the worst case.
Quantum Key Distribution, often considered unconditionally secure, crumbles under a new "Manipulate-and-Observe" attack that exploits vulnerabilities in classical post-processing, potentially leaking the entire key.
Quantum key distribution is often regarded as an unconditionally secure method to exchange a secret key by harnessing fundamental aspects of quantum mechanics. Despite the robustness of key exchange, classical post-processing reveals vulnerabilities that an eavesdropper could target. In particular, many reconciliation protocols correct errors by comparing the parities of subsets between both parties. These communications occur over insecure channels, leaking information that an eavesdropper could exploit. Currently there is no holistic threat model that addresses how parity-leakage during reconciliation might be actively manipulated. In this paper we introduce a new form of attack, namely the Manipulate-and-Observe attack in which the adversary (1) partially intercepts a fraction $蟻$ of the qubits during key exchange, injecting the maximally tolerated amount of errors up to the 11 percent error threshold whilst remaining undetected and (2) probes the maximum amount of parity-leakage during reconciliation, and exploits it using a vectorised, parallel brute force filter to shrink the search space from 2n down to as few as a single candidate, for an n-bit reconciled key. We perform simulations of the attack, deploying it on the most widely used protocol, BB84, andthe benchmark reconciliation protocol, Cascade. Our simulation results demonstrate that the attack can significantly reduce the security below the theoretical bound and, in the worst case, fully recover the reconciled key material. The principles of the attack could threaten other parity-based reconciliation schemes, like Low Density Parity Check, which underscores the need for urgent consideration of the combined security of key exchange and post-processing.