Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Journal: International Journal of Advanced engineering, Management and Science (Vol.4, No. 6)Publication Date: 2018-06-01
Authors : Brahim Ouchao Abdeslam Jakimi;
Page : 466-469
Keywords : QKD; Qubit; BB84; B92.;
Abstract
Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primitives. Precisely, this technique is based on two laws of quantum mechanics, namely uncertainty principle and no-cloning theorem. The best known QKD is the BB84 protocol published by Bennett and Brassard in 1984. Since then, various QKD protocols have been developed for example a B92 protocol. This latter is similar to that of BB84but this time using only two non-orthogonal states of the four states of BB84. In this work, we develop the java simulation B92 protocol and we give some details of the implementation. Next, we show by an example how Alice (Initiator) can configure the protocol parameters before execution. Finally, we give the statistical results allowing to compare this protocol with that of BB84.
Other Latest Articles
- QUALITY ASSURANCE OF INFORMATICS EDUCATION WITHIN TERTIARY ECONOMY AND MANAGERIAL STUDY FIELDS
- THE IMPORTANCE OF ‘SIGNIFICANT OTHERS’ IN BRIDGING THE GAPS BETWEEN DIFFERENT READING CONTEXTS
- TEACHERS’ KNOWLEDGE ABOUT HIGHER-ORDER THINKING SKILLS AND ITS LEARNING STRATEGY
- CHARACTERISTICS OF PRESCHOOL TEACHING IN LANGUAGE, COMMUNICATION AND MULTILINGUALISM: EXPRESSIONS FROM TEN SWEDISH MUNICIPALITIES
- THE RELATIONSHIP BETWEEN TEACHERS’ EDUCATION AND THEIR SELF-PERCEIVED COMPETENCE FOR TEACHING HOME ECONOMICS
Last modified: 2018-06-30 00:34:00