Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessAI, Warfare, and Augmented Cities - Small Wars JournalGNews AI USAGamingtak Sony koopt start-up die foto s en video s omzet naar 3dTweakers.netChinese Chip Makers Hit Record Revenue on AI Boom, US Curbs - The Tech BuzzGNews AI ChinaU.S. and China control 90% of AI data centres — the Global South is building a different kind of AI - Silicon CanalsGNews AI ChinaOpen Call: Accelerating AI Readiness and Adoption (United States) - fundsforNGOsGNews AI USA跳出幸存者偏差,从结构性资源分配解析财富真相Dev.to AIJapan s Sakura Internet jumps 20% as Microsoft plans $10 billion AI push with SoftBankCNBC TechnologyJapan's Sakura Internet jumps 20% as Microsoft plans $10 billion AI push with SoftBank - CNBCGNews AI JapanMicrosoft plans $10 billion investment in Japan to grow AI, train 1 million workers by 2030 - livemint.comGNews AI JapanOpenClaw vs Cloud AI: Which One Actually Gives Businesses More Control?Medium AI“In a World of AI Content, Being Human Is Your Superpower”Medium AIHow AI is Transforming the Role of a CFO in 2026.Medium AIBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessAI, Warfare, and Augmented Cities - Small Wars JournalGNews AI USAGamingtak Sony koopt start-up die foto s en video s omzet naar 3dTweakers.netChinese Chip Makers Hit Record Revenue on AI Boom, US Curbs - The Tech BuzzGNews AI ChinaU.S. and China control 90% of AI data centres — the Global South is building a different kind of AI - Silicon CanalsGNews AI ChinaOpen Call: Accelerating AI Readiness and Adoption (United States) - fundsforNGOsGNews AI USA跳出幸存者偏差,从结构性资源分配解析财富真相Dev.to AIJapan s Sakura Internet jumps 20% as Microsoft plans $10 billion AI push with SoftBankCNBC TechnologyJapan's Sakura Internet jumps 20% as Microsoft plans $10 billion AI push with SoftBank - CNBCGNews AI JapanMicrosoft plans $10 billion investment in Japan to grow AI, train 1 million workers by 2030 - livemint.comGNews AI JapanOpenClaw vs Cloud AI: Which One Actually Gives Businesses More Control?Medium AI“In a World of AI Content, Being Human Is Your Superpower”Medium AIHow AI is Transforming the Role of a CFO in 2026.Medium AI
AI NEWS HUBbyEIGENVECTOREigenvector

The Manipulate-and-Observe Attack on Quantum Key Distribution

arXiv cs.CRby William Tighe, George Brumpton, Mark Carney, Benjamin T. H. VarcoeApril 1, 20262 min read0 views
Source Quiz

arXiv:2603.29669v1 Announce Type: cross Abstract: Quantum key distribution is often regarded as an unconditionally secure method to exchange a secret key by harnessing fundamental aspects of quantum mechanics. Despite the robustness of key exchange, classical post-processing reveals vulnerabilities that an eavesdropper could target. In particular, many reconciliation protocols correct errors by comparing the parities of subsets between both parties. These communications occur over insecure channels, leaking information that an eavesdropper could exploit. Currently there is no holistic threat model that addresses how parity-leakage during reconciliation might be actively manipulated. In this paper we introduce a new form of attack, namely the Manipulate-and-Observe attack in which the adver

View PDF HTML (experimental)

Abstract:Quantum key distribution is often regarded as an unconditionally secure method to exchange a secret key by harnessing fundamental aspects of quantum mechanics. Despite the robustness of key exchange, classical post-processing reveals vulnerabilities that an eavesdropper could target. In particular, many reconciliation protocols correct errors by comparing the parities of subsets between both parties. These communications occur over insecure channels, leaking information that an eavesdropper could exploit. Currently there is no holistic threat model that addresses how parity-leakage during reconciliation might be actively manipulated. In this paper we introduce a new form of attack, namely the Manipulate-and-Observe attack in which the adversary (1) partially intercepts a fraction $\rho$ of the qubits during key exchange, injecting the maximally tolerated amount of errors up to the 11 percent error threshold whilst remaining undetected and (2) probes the maximum amount of parity-leakage during reconciliation, and exploits it using a vectorised, parallel brute force filter to shrink the search space from 2n down to as few as a single candidate, for an n-bit reconciled key. We perform simulations of the attack, deploying it on the most widely used protocol, BB84, andthe benchmark reconciliation protocol, Cascade. Our simulation results demonstrate that the attack can significantly reduce the security below the theoretical bound and, in the worst case, fully recover the reconciled key material. The principles of the attack could threaten other parity-based reconciliation schemes, like Low Density Parity Check, which underscores the need for urgent consideration of the combined security of key exchange and post-processing.

Subjects:

Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Cite as: arXiv:2603.29669 [quant-ph]

(or arXiv:2603.29669v1 [quant-ph] for this version)

https://doi.org/10.48550/arXiv.2603.29669

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Benjamin Varcoe [view email] [v1] Tue, 31 Mar 2026 12:27:37 UTC (1,436 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

modelbenchmarkannounce

Knowledge Map

Knowledge Map
TopicsEntitiesSource
The Manipul…modelbenchmarkannouncepaperarxivarXiv cs.CR

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 193 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Models