Simulation and evolution of BB84 quantum cryptography protocol

العناوين الأخرى

محاكاة و تطوير بروتوكول التشفير الكمي (BB84)‎

مقدم أطروحة جامعية

Huntush, Hasanayn Abd al-Hassan

مشرف أطروحة جامعية

Marhun, Ali Fadil

أعضاء اللجنة

Abd Allah, Abd al-Karim Yunus
Hassun, Sad T.
Sadun, Haytham Laftah

الجامعة

جامعة البصرة

الكلية

كلية العلوم

القسم الأكاديمي

قسم علوم الحاسبات

دولة الجامعة

العراق

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2012

الملخص الإنجليزي

Quantum cryptography is a novel technology in which two parties can secure network communication by applying the phenomena of quantum physics. Their security stems from the impossibility of distinguishing non-orthogonal quantum states with certainty.

If the eavesdropper (Eve) eavesdrops on the quantum channel, she will introduce errors in the transmissions which can later be discovered by the sender and the receiver. In this work, new steps to the original BB84 protocol have been added and simulated.

The system is assumed to use the polarization of single photon.

Thus, the eavesdropper (Eve) cannot use the beam-splitting method to eavesdrop on the quantum channel.

The only eavesdropping strategy available to Eve is the intercept-resend attack.

The simulation results indicate that the length of the final key obtained from the modified version of the BB84 protocol with eavesdropping is always near the length of that obtained from the original BB84 protocol without eavesdropping.

The suggested first improvement occurs after the error correction stage in which half of the parity bits revealed during the error correction and confirmation stages will be retained to the reconciled keys by applying random but identical permutation.

The second improvement occurs after the privacy amplification stage in which the length of the final key is increased by half of the length of the key obtained after the privacy amplification process.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

102

قائمة المحتويات

Table of contents.

Abstract.

Chapter One : general considerations.

Chapter Two : fundamental concepts of quantum cryptography.

Chapter Three : quantum protocols.

Chapter Four : modeling and simulation of (IBB84) protocol.

Chapter Five : conclusions and future works.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Huntush, Hasanayn Abd al-Hassan. (2012). Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317099

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Huntush, Hasanayn Abd al-Hassan. Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah. (2012).
https://search.emarefa.net/detail/BIM-317099

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Huntush, Hasanayn Abd al-Hassan. (2012). Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317099

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-317099