Quantum Key Distribution: Simulation and Characterizations

Jasim, Omer K.; abbas, Safia abbas; El-Sayed M. El-Horbaty; Salem A.;

Abstract


All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a secure key agreement by using quantum mechanical systems. QKD becomes a significant trend of new cryptographic revolution. This paper explains how cryptography exploits the quantum mechanics in order to achieve an encryption/decryption process. Additionally, this paper provides a standard simulation for QKD-BB84 protocol and describes improvement key generation and key distribution mechanisms. Then, validation, results and efficiency of BB84 protocol are presented using different security configurations. Finally, our results indicated that the QKD is susceptible to corporate with different security applications and achieve the key availability for such applications. However, it suffers from the higher rate of authentication cost.


Other data

Title Quantum Key Distribution: Simulation and Characterizations
Authors Jasim, Omer K.; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. 
Keywords BB84;encryption/decryption algorithms;Key distribution;QKD;qubit;secure communication
Issue Date 1-Jan-2015
Journal Procedia Computer Science 
Volume 65
Start page 701
End page 710
ISSN 18770509
DOI 10.1016/j.procs.2015.09.014
Scopus ID 2-s2.0-84953306544

Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check



Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.