Some Applications of the BB84 Quantum Encryption Protocol and Related Simulations and Security AnalysisS

Document Type : -

Authors

Sadr Research Center

Abstract

Quantum cryptography or quantum key distribution (QKD) is a technique that allows a bit stream to be used as a key in cryptographic protocols by protecting its distribution. Extensive studies began when it was observed that quantum computers can break public key cryptography based on the number theory. The use of quantum cryptography provides complete security and confidentiality and has proven invincible against major attacks for decryption. Although the security of quantum cryptographic protocols has been mathematically proven, it should be emphasized that its implementation in the real world suffers from the limitations of physical devices, which in turn can make it vulnerable to misuse by eavesdroppers. The result of these studies has been the introduction of the first quantum key distribution protocol called the BB84 protocol. The purpose of this article is to study some if its applications, and then explain and review the protocol structure, implementation, and security analysis.

Keywords


  • C. F. C. Revolution, “Comprehensive scientific map of the Iran(InPersian),”2012,Available: https://irimc.org/Portals/0/PDF/ScientificMap.pdf.##
  • Kaltz and Y. Lindell, “Introduction to modern cryptography: principles and protocols,” ed: Chapman and Hall, 2008.
  • H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” arXiv preprint arXiv:.06557, 2020.##
  • Mayers,“Unconditional-security-in-quantum Journal of
    the ACM, vol. 48, No. 3, pp. 351-406, 2010.##
  • -K. Lo and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,” science, vol. 283, no. 5410, pp. 2050-2056, 1999.##
  • W. Shor and J. Preskill, “Simple proof of security of the BB84 quantum key distribution protocol,” Physical review letters, vol. 85, no. 2, p. 441, 2000.##
  • Laucht and et al., “Roadmap on quantum nano technologies,” Nanotechnology, vol. 32, no. 16, p. 162003, 2021.##
  • -s. Jiang, R.-n. Chi, X.-j. Wen, and J. Fang, “An Implementation Scheme of BB84-Protocol-Based Quantum Key Distribution System,” in Advanced Technologies, Embedded and Multimedia for Human-centric Computing: Springer, pp. 973-978, 2014.##
  • Rubya, N. P. Latha, and B. Sangeetha, “A survey on recent security trends using quantum cryptography,” JCSE, vol. 2, No. 9, pp. 3038-3042, 2015.##
  • H. K. Aizan, Z. A. Zukarnain, and H. Zainuddin,  “ Implementation of BB84 Protocol on 802.11 i,”  in 2016 Second International Conference on Network Applications, Protocols and Services, , pp. 130-134. 2016##
  • Aggarwal, H. Sharma, and D. Gupta, “Analysis of various attacks over bb84 quantum key distribution protocol,” International Journal of Computer Applications, vol. 20, no. 8, pp. 28-31, 2017.##
  • Vakhitov, V. Makarov, and D. R. Hjelme, “Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography,” Journal of modern optics, vol. 48, no. 13, pp. 2023-2038, 2013.##
  • -K. Lo, “Proof of unconditional security of six-state quantum key distribution scheme,” arXiv preprint quant-ph/0102138, 2001.##
  • Wang, H. Wang, Z. Li, and J. Huang, “Man-in-the-middle attack on BB84 protocol and its defence,in 2015 2nd IEEE International Conference on Computer Science and Information Technology, pp. 438-439, 2015.##