Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 216))

Abstract

Due to the necessity for using the security to the end-users, the conventional methods for security are not sufficient for the highly equipped attacker and new ways to violate security. Moreover, the quantum age is coming and brings more vulnerability to classical security techniques. On the other hand, Quantum security relies on the natural physical phenomena (quantum mechanics) and gives a suitable and strong way for security. One of the quantum security protocols is BB84 that depends on the polarization of photons. This paper proposes a new method for the simulation of quantum key distribution (QKD) in the BB84 protocol. The method is practical to use; moreover, it is flexible and can implement any required number of photons as quantum bits, also, the paper evaluates the technique with other techniques that generate and simulate QKD.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bruss D, Erdélyi G, Meyer T, Riege T, Rothe J (2007) Quantum cryptography: a survey ACM Comput Surv 39(2)

    Google Scholar 

  2. Lohachab A, Lohachab A, Jangra A (2020) A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet of Things 9, p. 100174

    Google Scholar 

  3. Sasaki M (2018) Quantum key distribution and its applications. IEEE Secur Priv 16(5):42–48

    Article  Google Scholar 

  4. Editors F et al (2010) Applied Quantum Cryptography (Lecture Notes in Physics, 797). Springer Berlin Heidelberg

    Google Scholar 

  5. Muruganantham B, Shamili P, Ganesh Kumar S, Murugan A (2020) Quantum cryptography for secured communication networks. Int J Electr Comput Eng 10(1): 407–414

    Google Scholar 

  6. Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85(2):441–444

    Article  Google Scholar 

  7. M. E. System, “using OptSim,” IEEE sponsere, Int. Conf. Electron. Commun. Syst. (ICECS 2015) Implement., no. Icecs, pp. 457–460, 2015.

    Google Scholar 

  8. Prithvik HC, Charan KR, Sachin BS, Rakesh KR (2020) “Implementation of Quantum Key Distribution using Python”, Wutan Huatan Jisuan Jishu, vol. XVI 190:190–196

    Google Scholar 

  9. Quantum cryptography, Modelling Fuzzy Logic Quantum Key Distribution using Simulink, https://www.mathworks.com/content/dam/mathworks/mathworks-dot-com/solutions/automotive/files/in-expo-2015/modelling-fuzzy-logic-quantum-key-distribution-using-simulink.pdf, last accessed 2021/1/19.

  10. Zhang H, Ji Z, Wang H, Wu W (2019) Survey on quantum information security. China Commun. 16(10):1–36

    Article  Google Scholar 

  11. El-Latif AAA et al (2020) Providing End-to-End Security Using Quantum Walks in IoT Networks. IEEE Access 8:92687–92696

    Article  Google Scholar 

  12. M. Mina and E. Simion, “A Scalable Simulation of the BB84 Protocol Involving Eavesdropping,” Cryptol. ePrint Arch., vol. 1, no. Report 2020/1074, pp. 1–19, 2020.

    Google Scholar 

  13. Singh H, Gupta DL, Singh A (2014) Quantum Key Distribution Protocols: A Review. IOSR J. Comput. Eng. 16(2):01–09

    Article  Google Scholar 

  14. Mavromatis A, Ntavou F, Salas EH, Kanellos GT, Nejabati R, Simeonidou D (2018) Experimental Demonstration of Quantum Key Distribution (QKD) for Energy-Efficient Software-Defined Internet of Things. Eur. Conf. Opt. Commun. ECOC, vol. 2018-Septe, no. 1, pp. 1–3

    Google Scholar 

  15. QKD simulator, Homepage. https://www.qkdsimulator.com/. Last accessed 19 Jan 2019

  16. Viacheslav B (2015) Security Issues of quantum cryptographic systems with imperfect detectors. Doctoral Diss., vol 151,September 2016, pp. 1–133

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hasan Abbas Al-Mohammed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Mohammed, H.A., Yaacoub, E. (2022). New Way to Generating and Simulation QKD. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 216. Springer, Singapore. https://doi.org/10.1007/978-981-16-1781-2_69

Download citation

Publish with us

Policies and ethics