Implemetation of BB84 quantum key distribution protocol’s with attacks.

Quantum cryptography is basically based on a trusted channel in communication between two parties compared to classical channel. Recently, Quantum Key Distribution (QKD has become more secure transmission method used to transmit secret key between two legitimate parties. This paper discusses the imp...

Full description

Saved in:
Bibliographic Details
Main Authors: Muhammad, Nur Atiqah, Ahmad Zulkarnain, Zuriati
Format: Article
Language:English
English
Published: EuroJournals 2009
Online Access:http://psasir.upm.edu.my/id/eprint/15125/1/Implemetation%20of%20BB84%20quantum%20key%20distribution%20protocol.pdf
http://psasir.upm.edu.my/id/eprint/15125/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Putra Malaysia
Language: English
English
Description
Summary:Quantum cryptography is basically based on a trusted channel in communication between two parties compared to classical channel. Recently, Quantum Key Distribution (QKD has become more secure transmission method used to transmit secret key between two legitimate parties. This paper discusses the implementation of QKD protocol (BB84 protocol), which is widely used today. The implementation simulates the communication of two parties who wish to share a secret key with the existing of eavesdropper. The existing of eavesdropper is simulated with two kinds of attacks, which is use as parameter to measure the length of final key agreed by both authenticated parties at the end of the communication. This paper also discuss about future works to fully implement the shared secret key.