Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/18332
Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Bhatia, Vimal | en_US |
| dc.date.accessioned | 2026-05-14T12:28:25Z | - |
| dc.date.available | 2026-05-14T12:28:25Z | - |
| dc.date.issued | 2025 | - |
| dc.identifier.citation | Saxena, S., Srivastava, A., Bhatia, V., Kumar, P., & Singh, R. R. (2025). Detection Challenges in BB84 Quantum Key Distribution under Random Number Generator Compromise and QBER Analysis. International Symposium on Advanced Networks and Telecommunication Systems, ANTS. https://doi.org/10.1109/ANTS66931.2025.11429807 | en_US |
| dc.identifier.isbn | 979-833152681-8 | - |
| dc.identifier.issn | 2153-1684 | - |
| dc.identifier.other | EID(2-s2.0-105036507839) | - |
| dc.identifier.uri | https://dx.doi.org/10.1109/ANTS66931.2025.11429807 | - |
| dc.identifier.uri | https://dspace.iiti.ac.in:8080/jspui/handle/123456789/18332 | - |
| dc.description.abstract | This paper investigates the compromised random number generator (CRNG) attack, a novel quantum hacking threat to the quantum key distribution (QKD) that compromises random number generators (RNGs) that are crucial for basis selection and key generation. These vulnerabilities at the device level are a complement to previous research on implementation and side-channel attacks against hardware used in quantum communication, which take advantage of real-world flaws rather than the quantum channel itself. By preventing an increase in the quantum bit error rate (QBER), CRNG makes undetected key recovery possible, in contrast to quantum channel attacks. In addition to the above investigation, two methods are highlighted in the paper, namely, parametric tampering and reconstruction, which are supported by a mathematical model. 100% key recovery at insignificant QBER is possible with totally compromised RNGs, according to simulations. The simulations also show how the effect of a noisy quantum channel diminishes the similarity between the recreated key and the legitimate key. The findings highlight the necessity for protections beyond channel monitoring, such as quantum RNGs and hybrid key generation methods, and reveal weaknesses in traditional QKD components. © 2025 IEEE. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | IEEE Computer Society | en_US |
| dc.source | International Symposium on Advanced Networks and Telecommunication Systems, ANTS | en_US |
| dc.title | Detection Challenges in BB84 Quantum Key Distribution under Random Number Generator Compromise and QBER Analysis | en_US |
| dc.type | Conference Paper | en_US |
| Appears in Collections: | Department of Electrical Engineering | |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: