Journal of Computer Science

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Iyed Ben Slimen, Olfa Trabelsi, Houria Rezig, Ridha Bouallègue and Ammar Bouallègue

DOI : 10.3844/jcssp.2007.424.429

Journal of Computer Science

Volume 3, Issue 6

Pages 424-429


BB84 (Bennett and Brassard 1984) is one of the well known protocols of quantum keys distribution. It is built to allow two interlocutors commonly called Alice and Bob to share two similar binary keys and to detect the eavesdropper presence (the eavesdropper is commonly called Eve). However, Eve presence in a disturbed environment causes errors to the sifted keys and decreases the amount of secure information between Alice and Bob. One of the most important stages in BB84 protocol is to decide by using error probability estimation if we can continue the protocol phases or no. Indeed, this decision is function of some factors like: what is the amount of information that we will lose in the error correction phase? What is the degree of errors detected in our sifted keys? What is the origin of these errors: Eve strategy or the channel disturbance? For these reasons, we will study in this study some conditions to stop BB84 protocol in the context of depolarizing channel. We implement two types of eavesdropping strategy: Intercept and Resend and Cloning Attack.


© 2007 Iyed Ben Slimen, Olfa Trabelsi, Houria Rezig, Ridha Bouallègue and Ammar Bouallègue. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.