ijaers social
facebook
twitter
Blogger
google plus

International Journal of Advanced Engineering, Management and Science


Performance Evaluation of Secure Key Distribution Based on the B92 Protocol

( Vol-4,Issue-6,June 2018 )

Author(s): Brahim Ouchao, Abdeslam Jakimi



Total View : 1142
Downloads : 167
Page No: 466-469
ijaems crossref doiDOI: 10.22161/ijaems.4.6.6

Keywords:

QKD, Qubit, BB84, B92.

Abstract:

Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primitives. Precisely, this technique is based on two laws of quantum mechanics, namely uncertainty principle and no-cloning theorem. The best known QKD is the BB84 protocol published by Bennett and Brassard in 1984. Since then, various QKD protocols have been developed for example a B92 protocol. This latter is similar to that of BB84but this time using only two non-orthogonal states of the four states of BB84. In this work, we develop the java simulation B92 protocol and we give some details of the implementation. Next, we show by an example how Alice (Initiator) can configure the protocol parameters before execution. Finally, we give the statistical results allowing to compare this protocol with that of BB84.

Cite This Article:
Show All (MLA | APA | Chicago | Harvard | IEEE | Bibtex)
Share: