UPM Institutional Repository

Implemetation of BB84 quantum key distribution protocol’s with attacks.


Citation

Muhammad, Nur Atiqah and Ahmad Zulkarnain, Zuriati (2009) Implemetation of BB84 quantum key distribution protocol’s with attacks. European Journal of Scientific Research, 32 (4). pp. 460-466. ISSN 1450-216X; ESSN: 1450-202X

Abstract

Quantum cryptography is basically based on a trusted channel in communication between two parties compared to classical channel. Recently, Quantum Key Distribution (QKD has become more secure transmission method used to transmit secret key between two legitimate parties. This paper discusses the implementation of QKD protocol (BB84 protocol), which is widely used today. The implementation simulates the communication of two parties who wish to share a secret key with the existing of eavesdropper. The existing of eavesdropper is simulated with two kinds of attacks, which is use as parameter to measure the length of final key agreed by both authenticated parties at the end of the communication. This paper also discuss about future works to fully implement the shared secret key.


Download File

[img]
Preview
PDF (Abstract)
Implemetation of BB84 quantum key distribution protocol.pdf

Download (167kB) | Preview

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
Publisher: EuroJournals
Keywords: Quantum Key Distribution; Protocol implementation; BB84 protocol; Simulate attacks, Final key.
Depositing User: Ms. Nida Hidayati Ghazali
Date Deposited: 14 May 2014 09:03
Last Modified: 22 Oct 2015 07:53
URI: http://psasir.upm.edu.my/id/eprint/15125
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item