Skip to main content

A Scalable Simulation of the BB84 Protocol Involving Eavesdropping

  • Conference paper
  • First Online:
Innovative Security Solutions for Information Technology and Communications (SecITC 2020)

Abstract

In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we provide a theoretical discussion of the steps Alice and Bob take to reach a shared secret using this protocol, while an eavesdropper Eve is either involved or not. Then, we offer and discuss two distinct implementations that simulate BB84 using IBM’s Qiskit framework, the first being an exercise solved during the “IBM Quantum Challenge” event in early May 2020, while the other was developed independently to showcase the intercept-resend attack strategy in detail. We note the latter’s scalability and increased output verbosity, which allow for a statistical analysis to determine the probability of detecting the act of eavesdropping.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hughes, R.J., et al.: Quantum cryptography. Contemporary Phys. 36(3), 149–163 (1995). https://doi.org/10.1080/00107519508222149.eprint

  2. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000). https://doi.org/10.1103/PhysRevLett.85.441

  3. Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005). https://doi.org/10.1103/PhysRevA.72.012332

  4. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175–179, December 1984

    Google Scholar 

  5. Bennett, C.H., Brassard, G.: Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working. In: SIGACT News 20.4, pp. 78–80, November 1989. ISSN: 0163–5700. https://doi.org/10.1145/74074.74087

  6. Liao, S.-K., et al.: Satellite-to-ground quantum key distribution. Nature 549(7670), 43–47 (2017)

    Article  Google Scholar 

  7. Boaron, A., et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 121, 190502 (2018). https://doi.org/10.1103/PhysRevLett.121.190502

  8. Chen, J.-P., et al.: Sending-or-not-sending with independent lasers: secure twin-field quantum key distribution over 509 km. Phys. Rev. Lett. 124, 070501 (2020). https://doi.org/10.1103/PhysRevLett.124.070501

  9. Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)

    Google Scholar 

  10. Dieks, D.: Communication by EPR devices. Phys. Lett. A 92(6), 271–272 (1982). ISSN: 0375–9601. https://doi.org/10.1016/0375-9601(82)90084-6, http://www.sciencedirect.com/science/article/pii/0375960182900846

  11. Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5(1), 3–28, (1992). ISSN: 1432-1378. https://doi.org/10.1007/BF00191318

  12. IBM Quantum Challenge announcement. https://www.ibm.com/blogs/research/2020/04/ibm-quantum-challenge/

  13. Abraham, H., et al.: Qiskit: An Open-source Framework for Quantum Computing (2019). https://doi.org/10.5281/zenodo.2562110

  14. IBM Quantum Challenge BB84 exercise. https://github.com/qiskitcommunity/may4challengeexercises/blob/master/ex03/Challenge3BB84.ipynb

  15. IBM Quantum Challenge repository. https://github.com/qiskit-community/may4challengeexercises

Download references

Acknowledgements

We acknowledge the use of IBM Quantum services for this work. The views expressed are those of the authors, and do not reflect the official policy or position of IBM or the IBM Quantum team.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mihai-Zicu Mina .

Editor information

Editors and Affiliations

A Qiskit Source Code and Output

A Qiskit Source Code and Output

1.1 A.1 “IBM Quantum Challenge”

figure a
figure b

1.2 A.2 Simulation of Intercept-Resend Attack

figure c
figure d
figure e
figure f
figure g
figure h
figure i
figure j

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mina, MZ., Simion, E. (2021). A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. In: Maimut, D., Oprina, AG., Sauveron, D. (eds) Innovative Security Solutions for Information Technology and Communications. SecITC 2020. Lecture Notes in Computer Science(), vol 12596. Springer, Cham. https://doi.org/10.1007/978-3-030-69255-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69255-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69254-4

  • Online ISBN: 978-3-030-69255-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics