Quantum Key Distribution: Simulation and Characterizations
Jasim, Omer K.; abbas, Safia abbas; El-Sayed M. El-Horbaty; Salem A.;
Abstract
All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a secure key agreement by using quantum mechanical systems. QKD becomes a significant trend of new cryptographic revolution. This paper explains how cryptography exploits the quantum mechanics in order to achieve an encryption/decryption process. Additionally, this paper provides a standard simulation for QKD-BB84 protocol and describes improvement key generation and key distribution mechanisms. Then, validation, results and efficiency of BB84 protocol are presented using different security configurations. Finally, our results indicated that the QKD is susceptible to corporate with different security applications and achieve the key availability for such applications. However, it suffers from the higher rate of authentication cost.
Other data
| Title | Quantum Key Distribution: Simulation and Characterizations | Authors | Jasim, Omer K.; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. | Keywords | BB84;encryption/decryption algorithms;Key distribution;QKD;qubit;secure communication | Issue Date | 1-Jan-2015 | Journal | Procedia Computer Science | Volume | 65 | Start page | 701 | End page | 710 | ISSN | 18770509 | DOI | 10.1016/j.procs.2015.09.014 | Scopus ID | 2-s2.0-84953306544 |
Recommend this item
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.