Quantum Honeypots
Abstract
:1. Introduction
2. Quantum Properties
2.1. Measurement and State Collapse
2.2. Qubits and Quantum Gates
- A
- The Hadamard gate rotates the states and into and , respectively. It contributes towards a universal gate set on a quantum computer as the single quantum gate needed in addition to a universal gate set for classical computation. The Hadamard gate is useful for creating balanced superpositions. The reverse is also true, namely that a Hadamard gate applied to a balanced superposition brings the qubit to the respective base state. The Hadamard gate is its own inverse.
- B
- The NOT gate is also known as the Pauli-X gate and, in this form, is also applied on a single qubit. The |0⟩ state flips to |1⟩ and vice versa. As shown below, it is represented by the Pauli matrix:
- C
- The Controlled Phase Shift gate is a two qubit gate, built from a simple phase shift gate.The simple phase shift gate () operates on a single qubit. It rotates the qubit around the z axis of the Bloch sphere [3]. Thus, the gate changes the phase and the angle of the and , but not the respective percentages of the two within the superposition.The controlled phase shift gate, , has an additional control qubit . This gate is a two qubit gate. The control modifier determines whether the shift is applied or not on the original data-qubit. If the control is , the gate is active, and it is inactive for a control equal to .
3. Quantum Sentinels
- Positional sentinels, which are visible to the intruder, though their quantum state is unknown.
- Hidden sentinels, which are hidden from the user. In this case, both the quantum state and the operation of the sentinel remain unknown to the intruder.
- The Computational Basis, with the base vectors and
- The Hadamard Basis, with the base vectors and
3.1. Positional Sentinels
3.2. Hidden Sentinels
4. Quantum Implementation and Experiments
4.1. Experiments with Positional Sentinels
4.1.1. Positional Sentinels with a Legal User
4.1.2. Positional Sentinels with an Intruder as User
4.2. Hidden Sentinels
4.2.1. Errors on Hidden Sentinels
4.2.2. Sentinel Complexity Comparison
Type of | Number of qubits | Number of | Number of |
Sentinel | for N sentinels | single qubit gates | two qubit gates |
Positional | N | from 0 | 0 |
sentinel | to | ||
Hidden | from | ||
sentinel | to | ||
The resource comparison between positional and hidden sentinels | |||
is done for N sentinels. |
5. Conclusions
- The monitoring of malicious activity can be detailed to the level of bit, that is the information unit.
- The presence of the monitoring system can be fully hidden via hidden quantum sentinels.
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- Fan, W.; Du, Z.; Fernández, D.; Villagra, V. Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. IEEE Syst. J. 2017, 12, 3906–3919. [Google Scholar] [CrossRef]
- Spitzner, L. Honeypots: Tracking Hackers; Addison-Wesley: Boston, MA, USA, 2002. [Google Scholar]
- Nielsen, M.; Chuang, I. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2000. [Google Scholar]
- Grover, L. A fast quantum mechanical algorithm for database search. In Proceedings of the 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; pp. 212–220. [Google Scholar]
- Shor, P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. Spec. Issue Quantum Comput. SIAM J. Comput. 1997, 26, 1484–1509. [Google Scholar] [CrossRef]
- Nagy, M.; Akl, S.G. Quantum computation and quantum information. Int. J. Parallel Emergent Distrib. Syst. 2006, 21, 1–59. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theoretical Aspects of Quantum Cryptography—Celebrating 30 years of BB84. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
- Ladd, T.D.; Jelezko, F.; Laflamme, R.; Nakamura, Y.; Monroe, C.; O’Brien, J.L. Quantum computers. Nature 2010, 464, 45–53. [Google Scholar] [CrossRef] [PubMed]
- Arute, F.; Arya, K.; Babbush, R.; Bacon, D.; Bardin, J.C.; Barends, R.; Biswas, R.; Boixo, S.; Brandao, F.G.S.L.; Buell, D.A. Quantum supremacy using a programmable superconducting processor. Nature 2019, 574, 505–510. [Google Scholar] [CrossRef] [PubMed]
- Asproni, L.; Caputo, D.; Silva, B.; Fazzi, G.; Magagnini, M. Accuracy and minor embedding in subqubo decomposition with fully connected large problems: A case study about the number partitioning problem. Quantum Mach. Intell. 2020, 2, 4. [Google Scholar] [CrossRef]
- Ng, C.K.; Pan, L.; Xiang, Y. Honeypot Frameworks and Their Applications: A New Framework; SpringerBriefs on Cyber Security Systems and Networks; Springer: Singapore, 2018. [Google Scholar] [CrossRef]
- Zhong, H.S.; Wang, H.; Deng, Y.H.; Chen, M.C.; Peng, L.C.; Luo, Y.H.; Qin, J.; Wu, D.; Ding, X.; Hu, Y.; et al. Quantum computational advantage using photons. Science 2020, 370, 1460–1463. [Google Scholar] [CrossRef] [PubMed]
- García-Cobo, I.; Menéndez, H.D. Designing large quantum key distribution networks via medoid-based algorithms. Future Gener. Comput. Syst. 2021, 115, 814–824. [Google Scholar] [CrossRef]
- Mehic, M.; Niemiec, M.; Rass, S.; Ma, J.; Peev, M.; Aguado, A.; Martin, V.; Schauer, S.; Poppe, A.; Pacher, C.; et al. Quantum Key Distribution: A Networking Perspective. ACM Comput. Surv. 2020, 53, 96:1–96:41. [Google Scholar] [CrossRef]
- Nagy, M.; Akl, S.G. Coping with Decoherence: Parallelizing the Quantum Fourier Transform. Parallel Process. Lett. 2010, 20, 213–226. [Google Scholar] [CrossRef]
- IBM-QX. IBM Quantum Experience. 2020. Available online: https://quantum-computing.ibm.com/ (accessed on 1 July 2020).
- Chen, Y.A.; Zhang, Q.; Chen, T.Y.; Cai, W.Q.; Liao, S.K.; Zhang, J.; Chen, K.; Yin, J.; Ren, J.G.; Chen, Z.; et al. An integrated space-to-ground quantum communication network over 4600 kilometres. Nature 2021, 589, 214–219. [Google Scholar] [CrossRef] [PubMed]
Sentinel Value | Correct Reading Basis | User | Server | Probability to Catch | |
---|---|---|---|---|---|
Reading Type | Outcome | Measurement | |||
Computational | honest, Computational | Not applicable | |||
intruder, Computational | 25% | ||||
intruder, Hadamard | or | or | |||
Computational | honest, Computational | Not applicable | |||
intruder, Computational | 25% | ||||
intruder, Hadamard | or | or | |||
Hadamard | honest, Hadamard | Not applicable | |||
intruder, Hadamard | 25% | ||||
intruder, Computation | or | or | |||
Hadamard | honest, Hadamard | Not applicable | |||
intruder, Hadamard | 25% | ||||
intruder, Computation | or | or |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nagy, N.; Nagy, M.; Alazman, G.; Hawaidi, Z.; Alsulaibikh, S.M.; Alabbad, L.; Alfaleh, S.; Aljuaid, A. Quantum Honeypots. Entropy 2023, 25, 1461. https://doi.org/10.3390/e25101461
Nagy N, Nagy M, Alazman G, Hawaidi Z, Alsulaibikh SM, Alabbad L, Alfaleh S, Aljuaid A. Quantum Honeypots. Entropy. 2023; 25(10):1461. https://doi.org/10.3390/e25101461
Chicago/Turabian StyleNagy, Naya, Marius Nagy, Ghadeer Alazman, Zahra Hawaidi, Saja Mustafa Alsulaibikh, Layla Alabbad, Sadeem Alfaleh, and Areej Aljuaid. 2023. "Quantum Honeypots" Entropy 25, no. 10: 1461. https://doi.org/10.3390/e25101461
APA StyleNagy, N., Nagy, M., Alazman, G., Hawaidi, Z., Alsulaibikh, S. M., Alabbad, L., Alfaleh, S., & Aljuaid, A. (2023). Quantum Honeypots. Entropy, 25(10), 1461. https://doi.org/10.3390/e25101461