@article {10.3844/jcssp.2007.424.429, article_type = {journal}, title = {Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) }, author = {Slimen, Iyed Ben and Trabelsi, Olfa and Rezig, Houria and Bouallègue, Ridha and Bouallègue, Ammar}, volume = {3}, number = {6}, year = {2007}, month = {Jun}, pages = {424-429}, doi = {10.3844/jcssp.2007.424.429}, url = {https://thescipub.com/abstract/jcssp.2007.424.429}, abstract = {BB84 (Bennett and Brassard 1984) is one of the well known protocols of quantum keys distribution. It is built to allow two interlocutors commonly called Alice and Bob to share two similar binary keys and to detect the eavesdropper presence (the eavesdropper is commonly called Eve). However, Eve presence in a disturbed environment causes errors to the sifted keys and decreases the amount of secure information between Alice and Bob. One of the most important stages in BB84 protocol is to decide by using error probability estimation if we can continue the protocol phases or no. Indeed, this decision is function of some factors like: what is the amount of information that we will lose in the error correction phase? What is the degree of errors detected in our sifted keys? What is the origin of these errors: Eve strategy or the channel disturbance? For these reasons, we will study in this study some conditions to stop BB84 protocol in the context of depolarizing channel. We implement two types of eavesdropping strategy: Intercept and Resend and Cloning Attack.}, journal = {Journal of Computer Science}, publisher = {Science Publications} }