Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy.
Hicham AmellalSalma El HajjamiKeshav KaushikGunjan ChhabraSuman Avdhesh YadavPublished in: IC3I (2023)
Keyphrases
- countermeasures
- malicious users
- malicious attacks
- attack detection
- security protocols
- differential power analysis
- denial of service attacks
- cryptographic protocols
- dos attacks
- network intrusions
- authentication protocol
- cyber attacks
- digital watermark
- security vulnerabilities
- denial of service
- attack scenarios
- network intrusion
- power analysis
- data corruption
- detecting malicious
- network traffic
- injection attacks
- ddos attacks
- intrusion detection
- fault injection
- network attacks
- quantum computation
- security risks
- security threats
- defense mechanisms
- watermarking technique
- anomaly detection
- buffer overflow
- network security
- security measures
- block cipher
- security properties
- secret key