Simulation and evolution of BB84 quantum cryptography protocol
Other Title(s)
محاكاة و تطوير بروتوكول التشفير الكمي (BB84)
Dissertant
Huntush, Hasanayn Abd al-Hassan
Thesis advisor
Comitee Members
Abd Allah, Abd al-Karim Yunus
Hassun, Sad T.
Sadun, Haytham Laftah
University
University of Basrah
Faculty
Science College
Department
Department of Computer Science
University Country
Iraq
Degree
Master
Degree Date
2012
English Abstract
Quantum cryptography is a novel technology in which two parties can secure network communication by applying the phenomena of quantum physics. Their security stems from the impossibility of distinguishing non-orthogonal quantum states with certainty.
If the eavesdropper (Eve) eavesdrops on the quantum channel, she will introduce errors in the transmissions which can later be discovered by the sender and the receiver. In this work, new steps to the original BB84 protocol have been added and simulated.
The system is assumed to use the polarization of single photon.
Thus, the eavesdropper (Eve) cannot use the beam-splitting method to eavesdrop on the quantum channel.
The only eavesdropping strategy available to Eve is the intercept-resend attack.
The simulation results indicate that the length of the final key obtained from the modified version of the BB84 protocol with eavesdropping is always near the length of that obtained from the original BB84 protocol without eavesdropping.
The suggested first improvement occurs after the error correction stage in which half of the parity bits revealed during the error correction and confirmation stages will be retained to the reconciled keys by applying random but identical permutation.
The second improvement occurs after the privacy amplification stage in which the length of the final key is increased by half of the length of the key obtained after the privacy amplification process.
Main Subjects
Information Technology and Computer Science
Topics
No. of Pages
102
Table of Contents
Table of contents.
Abstract.
Chapter One : general considerations.
Chapter Two : fundamental concepts of quantum cryptography.
Chapter Three : quantum protocols.
Chapter Four : modeling and simulation of (IBB84) protocol.
Chapter Five : conclusions and future works.
References.
American Psychological Association (APA)
Huntush, Hasanayn Abd al-Hassan. (2012). Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317099
Modern Language Association (MLA)
Huntush, Hasanayn Abd al-Hassan. Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah. (2012).
https://search.emarefa.net/detail/BIM-317099
American Medical Association (AMA)
Huntush, Hasanayn Abd al-Hassan. (2012). Simulation and evolution of BB84 quantum cryptography protocol. (Master's theses Theses and Dissertations Master). University of Basrah, Iraq
https://search.emarefa.net/detail/BIM-317099
Language
English
Data Type
Arab Theses
Record ID
BIM-317099