Simulation and evolution of BB84 quantum cryptography protocol

Other Title(s)

محاكاة و تطوير بروتوكول التشفير الكمي (BB84)‎

Dissertant

Huntush, Hasanayn Abd al-Hassan

Thesis advisor

Marhun, Ali Fadil

Comitee Members

Abd Allah, Abd al-Karim Yunus
Hassun, Sad T.
Sadun, Haytham Laftah

University

University of Basrah

Faculty

Science College

Department

Department of Computer Science

University Country

Iraq

Degree

Master

Degree Date

2012

English Abstract

Quantum cryptography is a novel technology in which two parties can secure network communication by applying the phenomena of quantum physics. Their security stems from the impossibility of distinguishing non-orthogonal quantum states with certainty.

If the eavesdropper (Eve) eavesdrops on the quantum channel, she will introduce errors in the transmissions which can later be discovered by the sender and the receiver. In this work, new steps to the original BB84 protocol have been added and simulated.

The system is assumed to use the polarization of single photon.

Thus, the eavesdropper (Eve) cannot use the beam-splitting method to eavesdrop on the quantum channel.

The only eavesdropping strategy available to Eve is the intercept-resend attack.

The simulation results indicate that the length of the final key obtained from the modified version of the BB84 protocol with eavesdropping is always near the length of that obtained from the original BB84 protocol without eavesdropping.

The suggested first improvement occurs after the error correction stage in which half of the parity bits revealed during the error correction and confirmation stages will be retained to the reconciled keys by applying random but identical permutation.

The second improvement occurs after the privacy amplification stage in which the length of the final key is increased by half of the length of the key obtained after the privacy amplification process.

Main Subjects

Information Technology and Computer Science

Topics

No. of Pages

102

Table of Contents

Table of contents.

Abstract.

Chapter One : general considerations.

Chapter Two : fundamental concepts of quantum cryptography.

Chapter Three : quantum protocols.

Chapter Four : modeling and simulation of (IBB84) protocol.

Chapter Five : conclusions and future works.

References.

American Psychological Association (APA)

Huntush, Hasanayn Abd al-Hassan. (2012). Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317099

Modern Language Association (MLA)

Huntush, Hasanayn Abd al-Hassan. Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah. (2012).
https://search.emarefa.net/detail/BIM-317099

American Medical Association (AMA)

Huntush, Hasanayn Abd al-Hassan. (2012). Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317099

Language

English

Data Type

Arab Theses

Record ID

BIM-317099