@article {10.3844/jcssp.2010.684.688, article_type = {journal}, title = {Quantum Cryptography with Several Cloning Attacks}, author = {Dehmani, Mustapha and Ez-Zahraouy, Hamid and Benyoussef, Abdelilah}, volume = {6}, number = {7}, year = {2010}, month = {Jul}, pages = {684-688}, doi = {10.3844/jcssp.2010.684.688}, url = {https://thescipub.com/abstract/jcssp.2010.684.688}, abstract = {Problem statement: In a previous research, we investigated the quantum key distribution of the well known BB84 protocol with several intercept and resend attacks. In the present research, we studied the effect of many eavesdroppers cloning attacks of the Bennett-Brassard cryptographic protocol on the quantum error and mutual information between honest parties and information with sender for each eavesdropper. Approach: The quantum error and the mutual information were calculated analytically and computed for arbitrary number of cloning attacks. Our objective in this study was to know if the number of the eavesdroppers and their angle of cloning act on the safety of information. Results: It was found that the quantum error and the secured/no secured transition depend strongly on the number of eavesdropper and their angle of attacks. The particular cases where all eavesdroppers collaborate were also investigated. Conclusion: Furthermore, the cloning attackā€™s quantum error is lower than the intercept and resends attacks one, which means that the cloning attacks is the optimal one for arbitrary number of eavesdropper.}, journal = {Journal of Computer Science}, publisher = {Science Publications} }