STO-Activities: (no title)

Activity title: Quantum Technology Vulnerabilities
Activity Reference: IST-219
Panel: IST
Security Classification: NATO UNCLASSIFIED
Status: Planning
Activity type: RTG
Start date: 2024-02-05T00:00:00Z
Actual End date: 2027-02-05T00:00:00Z
Keywords: attack vectors, PNT, quantum communications, quantum computing, quantum sensors, Quantum technologies, vulnerabilities
Background: Technologies exploiting quantum properties of single particles or small ensembles of particles are rapidly emerging in recent years. While the main efforts concentrate on the exploration of new possibilities and groundbreaking enhancements of existing capabilities, those new technologies might be prone to new attack vectors not obvious from the start. An example is the secure encryption key generation using quantum key distribution (QKD): In theory, a QKD protocol like the one described by Bennett and Brassard in 1984 is secure against any eavesdroppers, guaranteed by the physical laws governing the quantum world. However practically, prerequisites of the protocol like the possibility to prepare and detect single particles are hard to implement. Experimental QKD setups were proven to be vulnerable to carefully prepared scenarios, where, for instance, keys could be copied or altered. Quantum Key Distribution (QKD) can be attacked by injecting optical noise into the communication link to reroute the link and impersonate the receiver. Additionally, QKD systems can potentially be simply disabled temporarily or permanently using high-power light pulses that overload or damage the photodetectors which are required to detect the transmitted photons.
Other emerging quantum technologies like quantum sensors, quantum positioning, navigation, and timing, and also quantum computing are still in an early stage of development.
Quantum sensors are susceptible to interference from the environment and so can potentially be spoofed by carefully engineered emissions. These tuned spoofing signals can alter or disrupt the measurements of the sensors. Such a spoofing technology is feasible and thus constitutes a potential threat. Quantum computers are complex, precisely calibrated machines, working very often in special environmental conditions. Adequate knowledge of their design by an attacker can lead to influencing working conditions to disrupt or disable their functioning in various ways, e.g., by introducing errors and potentially derailing the validity of the calculations
Inevitably, new vulnerabilities will be found, and quantum advantages might come into conflict with quantum threats.
Objectives: The research task group should identify, through expert knowledge and literature review, known and expected vulnerabilities for existing and upcoming quantum technologies with military use, including quantum sensing, quantum computing, quantum key distribution and quantum communications. Where possible, risk should be assessed, and existing, emerging, or necessary countermeasures should be described. Ideally, a plan of action should be formed that identifies fields of research that must be intensified to address potential threats and opportunities.
Topics: Known and emerging vulnerabilities, means for their exploitation and protection in:
- Quantum Key Distribution,
- Quantum communications,
- Quantum sensors,
- Quantum computing.
Contact:
Open2Partners:
Title:

Created at 18/10/2023 15:00 by System Account
Last modified at 16/05/2024 07:00 by System Account
 
Go back to list
Home(NATO STO)