Research Article Open Access

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Iyed Ben Slimen1, Olfa Trabelsi2, Houria Rezig2, Ridha Bouallègue1 and Ammar Bouallègue1
  • 1 , Afganistan
  • 2 ,
Journal of Computer Science
Volume 3 No. 6, 2007, 424-429

DOI: https://doi.org/10.3844/jcssp.2007.424.429

Submitted On: 24 March 2007 Published On: 30 June 2007

How to Cite: Slimen, I. B., Trabelsi, O., Rezig, H., Bouallègue, R. & Bouallègue, A. (2007). Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) . Journal of Computer Science, 3(6), 424-429. https://doi.org/10.3844/jcssp.2007.424.429

Abstract

BB84 (Bennett and Brassard 1984) is one of the well known protocols of quantum keys distribution. It is built to allow two interlocutors commonly called Alice and Bob to share two similar binary keys and to detect the eavesdropper presence (the eavesdropper is commonly called Eve). However, Eve presence in a disturbed environment causes errors to the sifted keys and decreases the amount of secure information between Alice and Bob. One of the most important stages in BB84 protocol is to decide by using error probability estimation if we can continue the protocol phases or no. Indeed, this decision is function of some factors like: what is the amount of information that we will lose in the error correction phase? What is the degree of errors detected in our sifted keys? What is the origin of these errors: Eve strategy or the channel disturbance? For these reasons, we will study in this study some conditions to stop BB84 protocol in the context of depolarizing channel. We implement two types of eavesdropping strategy: Intercept and Resend and Cloning Attack.

  • 1,200 Views
  • 1,459 Downloads
  • 6 Citations

Download

Keywords

  • Error probability
  • secure information
  • decision threshold
  • sifted keys