Abstract
Due to the necessity for using the security to the end-users, the conventional methods for security are not sufficient for the highly equipped attacker and new ways to violate security. Moreover, the quantum age is coming and brings more vulnerability to classical security techniques. On the other hand, Quantum security relies on the natural physical phenomena (quantum mechanics) and gives a suitable and strong way for security. One of the quantum security protocols is BB84 that depends on the polarization of photons. This paper proposes a new method for the simulation of quantum key distribution (QKD) in the BB84 protocol. The method is practical to use; moreover, it is flexible and can implement any required number of photons as quantum bits, also, the paper evaluates the technique with other techniques that generate and simulate QKD.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bruss D, Erdélyi G, Meyer T, Riege T, Rothe J (2007) Quantum cryptography: a survey ACM Comput Surv 39(2)
Lohachab A, Lohachab A, Jangra A (2020) A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet of Things 9, p. 100174
Sasaki M (2018) Quantum key distribution and its applications. IEEE Secur Priv 16(5):42–48
Editors F et al (2010) Applied Quantum Cryptography (Lecture Notes in Physics, 797). Springer Berlin Heidelberg
Muruganantham B, Shamili P, Ganesh Kumar S, Murugan A (2020) Quantum cryptography for secured communication networks. Int J Electr Comput Eng 10(1): 407–414
Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85(2):441–444
M. E. System, “using OptSim,” IEEE sponsere, Int. Conf. Electron. Commun. Syst. (ICECS 2015) Implement., no. Icecs, pp. 457–460, 2015.
Prithvik HC, Charan KR, Sachin BS, Rakesh KR (2020) “Implementation of Quantum Key Distribution using Python”, Wutan Huatan Jisuan Jishu, vol. XVI 190:190–196
Quantum cryptography, Modelling Fuzzy Logic Quantum Key Distribution using Simulink, https://www.mathworks.com/content/dam/mathworks/mathworks-dot-com/solutions/automotive/files/in-expo-2015/modelling-fuzzy-logic-quantum-key-distribution-using-simulink.pdf, last accessed 2021/1/19.
Zhang H, Ji Z, Wang H, Wu W (2019) Survey on quantum information security. China Commun. 16(10):1–36
El-Latif AAA et al (2020) Providing End-to-End Security Using Quantum Walks in IoT Networks. IEEE Access 8:92687–92696
M. Mina and E. Simion, “A Scalable Simulation of the BB84 Protocol Involving Eavesdropping,” Cryptol. ePrint Arch., vol. 1, no. Report 2020/1074, pp. 1–19, 2020.
Singh H, Gupta DL, Singh A (2014) Quantum Key Distribution Protocols: A Review. IOSR J. Comput. Eng. 16(2):01–09
Mavromatis A, Ntavou F, Salas EH, Kanellos GT, Nejabati R, Simeonidou D (2018) Experimental Demonstration of Quantum Key Distribution (QKD) for Energy-Efficient Software-Defined Internet of Things. Eur. Conf. Opt. Commun. ECOC, vol. 2018-Septe, no. 1, pp. 1–3
QKD simulator, Homepage. https://www.qkdsimulator.com/. Last accessed 19 Jan 2019
Viacheslav B (2015) Security Issues of quantum cryptographic systems with imperfect detectors. Doctoral Diss., vol 151,September 2016, pp. 1–133
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Al-Mohammed, H.A., Yaacoub, E. (2022). New Way to Generating and Simulation QKD. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 216. Springer, Singapore. https://doi.org/10.1007/978-981-16-1781-2_69
Download citation
DOI: https://doi.org/10.1007/978-981-16-1781-2_69
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1780-5
Online ISBN: 978-981-16-1781-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)