Attacking the Quantum Internet
نویسندگان
چکیده
The main service provided by the coming Quantum Internet will be creating entanglement between any two quantum nodes. We discuss and classify attacks on repeaters, which serve roles similar to those of classical routers. have modeled components for structure repeater network With this model, we point out attack vectors, then analyze in terms confidentiality, integrity availability. While are reassured about promises networks from confidentiality view, availability present new vulnerabilities not require care handle properly. observe that requirements computing/networking elements affect systems' overall security risks. This component-based analysis establishes a framework further investigation network-wide vulnerabilities.
منابع مشابه
Attacking the Washington, D.C. Internet Voting System
In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. Prior to deploying the system in the general election, the District held a unique public trial: a mock election during which anyone was invited to test the system or attempt to compromise its security. This paper describes our experience...
متن کاملfactor influencing the adoption of internet banking
دوره مشترک کارشناسی ارشد بازاریابی و تجارت الکترونیک دانشگاه تربیت مدرس_ دانشگاه تکنولوژی lule? چکیده پایان نامه عوامل موثر بر پذیرش اینترنت بانک توسط مشتریان پیشرفت فناوری اطلاعات و ارتباطات و به طور خاص رشد اینترنت جهت تراکنش های معاملات بازرگانی، تاثیر بسیار عمیقی در صنعت بانکداری داشته است.این در حالی ست که نفوذ بانکداری اینترنتی در کشورهای در حال توسعه بسیار کندتر از نفوذ آن ...
15 صفحه اولFrom the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television
In the attempt to bring modern broadband Internet features to traditional broadcast television, the Digital Video Broadcasting (DVB) consortium introduced a specification called Hybrid Broadcast-Broadband Television (HbbTV), which allows broadcast streams to include embedded HTML content which is rendered by the television. This system is already in very wide deployment in Europe, and has recen...
متن کاملCloser to Quantum Internet
Quantum computers are one of the most promising technologies under development, and all their promises are completely justified. Quantum systems are extremely expensive to compute, where “expensiveness” can be measured either by the memory or the computational time required in classical computers. But it should be much cheaper if the computer uses quantum mechanics rules. The comparison is simp...
متن کاملAttacking the OutGuess
In this paper, we describe new methodology for developing steganalytic methods for JPEG images. The proposed framework can be applied to virtually all current methods for JPEGs including OutGuess, F5, and J-Steg. It also enables accurate estimation of the length of the embedded secret message. The methodology is demonstrated on OutGuess 0.2.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE transactions on quantum engineering
سال: 2021
ISSN: ['2689-1808']
DOI: https://doi.org/10.1109/tqe.2021.3094983