TY - JOUR AU - Dehmani, Mustapha AU - Ez-Zahraouy, Hamid AU - Benyoussef, Abdelilah PY - 2010 TI - Quantum Cryptography with Several Cloning Attacks JF - Journal of Computer Science VL - 6 IS - 7 DO - 10.3844/jcssp.2010.684.688 UR - https://thescipub.com/abstract/jcssp.2010.684.688 AB - Problem statement: In a previous research, we investigated the quantum key distribution of the well known BB84 protocol with several intercept and resend attacks. In the present research, we studied the effect of many eavesdroppers cloning attacks of the Bennett-Brassard cryptographic protocol on the quantum error and mutual information between honest parties and information with sender for each eavesdropper. Approach: The quantum error and the mutual information were calculated analytically and computed for arbitrary number of cloning attacks. Our objective in this study was to know if the number of the eavesdroppers and their angle of cloning act on the safety of information. Results: It was found that the quantum error and the secured/no secured transition depend strongly on the number of eavesdropper and their angle of attacks. The particular cases where all eavesdroppers collaborate were also investigated. Conclusion: Furthermore, the cloning attack’s quantum error is lower than the intercept and resends attacks one, which means that the cloning attacks is the optimal one for arbitrary number of eavesdropper.