Open Access Open Access  Restricted Access Subscription or Fee Access

Quantum Key Distribution Based on BB84 Protocol

Dharma Raj Maharjan, Surendra Shrestha

Abstract


Classical cryptosystem, which is based on mathematical complexity and irrationally time-consuming to decode, is endangered with the inception of quantum computers empowered with unprecedented computational processing along with sophisticated quantum algorithms. Thus requiring quantum cryptography and Quantum Key Distribution (QDK) protocol for secured key distribution. This thesis work contributes to the field of cryptography. First of all, it shows unconditionally secured QKD which is bound by quantum mechanics laws. It is minimal or moreover almost negligible chances of escaping the eavesdropper i.e. almost zero probability. Next, it shows the modified existing QKD protocol named BB84 protocol. The main drawback of the existing protocol is that it is less efficient concerning photon utilization as we know perfect single-photon generation is still challenging to current technology. In this work, the modified protocol has been presented and it is shown the simulated output using the Aer Provider backend ‘aer_simulator’ provided by Qiskit. With the generated key, message is encoded, transmitted and decoded in real quantum computer with backend ‘ibmq_manila’. The errors generated and analyzed and found that without interference in the channel, maximum only upto 15% errors have been generated from the noise of quantum circuit and are in acceptable range but in presence of interference, error rates surpass the acceptable range i.e. 20% error margin and hence the interference in the channel is detected.


Keywords


Quantum key distribution, BB84 protocol, quantum computing, quantum channel, quantum cryptography

Full Text:

PDF

References


Mittal V., Gupta S. and Choudhury T., Comparative analysis of authentication and access control protocols against malicious attacks in wireless sensor networks in Smart Computing and Informatics. Delhi, India: edited by Springer, pp.255–262; 2018.

Bruss D., Erdelyti G., Meyer T., Riege T., Rothe J., "Quantum Cryptography: A Survey" ACM Computing Surveys, June 2007; Vol. 39, No. 2, pp. 6.

Bennett C. H., and Brassard G., “Quantum cryptography: Public key distribution and coin tossing,” Theor. Comput. Sci. 2014; Vol. 560, pp. 7-11.

Magee T. “What is Qiskit, IBM’s open source quantum computing framework “ .Computerworld UK; 2018.

Mavroeidis V. et.al., “The Impact of Quantum Computing on Present Cryptography”, IJACSA, 2018; Vol.9, No. 3.

Kirsch Z., “Quantum Computing: The Risk to Existing Encryption Methods”, Tufts University. 2015;

Easttom W. Chapter:“ Quantum Computing and Cryptography”, Book: “Modern Cryptography”, Springer; 2020.

Impens F., D'Angelis F. M., Pinheiro F. A., and Guéry-Odelin D., Time scaling and quantum speed limit in non-Hermitian Hamiltonians, Phys. Rev. A 104, 052620 ; 2021

Liliana Z, “Efficiency of the Quantum key distribution systems- A comparative study of BB84 protocol with its improved versions”, “Ferdinand I” Military Technical Academy Doctoral School, Bucharest, Romania, Volume 21; Number 1/2020

Bennett C.H., Bessette F., Brassard G., Salvail L. and Smolin J., Experimental quantum cryptography. Journal of Cryptology. 1992; Vol. 5, pp.3–28.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Journal of Semiconductor Devices and Circuits

Publisher: STM Journals, an imprint of CELNET (Consortium e-Learning Network Pvt. Ltd.)

Address: A-118, 1st Floor, Sector-63, Noida, Uttar Pradesh-201301, India

Phone no.: 0120-478-1215/ Email: [email protected]