RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91

Authors

DOI:

https://doi.org/10.37943/QRKJ7456

Keywords:

quantum cryptography, quantum key distribution, Heisenberg’s uncertainty principle, superposition, quantum gate, quantum entanglement.

Abstract

The proposed article is devoted to the investigation of quantum key distribution protocols. The idiosyncrasy of this theme lies within the truth that present day strategies of key distribution, which utilize classical computing at their center, have critical downsides, in contrast to quantum key distribution. This issue concerns all sorts of calculations and frameworks for scrambling mystery data, both symmetric encryption with a private key and deviated encryption with an open key. A case is that in a communication channel ensured by quantum key distribution, it is conceivable to distinguish an interceptor between two legitimate organize substances utilizing the standards laid down in quantum material science at the starting of the final century. Standards and hypotheses such as the Heisenberg guideline, quantum trap, superposition, quantum teleportation, and the no-cloning hypothesis. The field of ponder of this theme may be a promising and quickly creating zone within the field of data security and data security. There are as of now made commercial items with the usage of a few of the quantum key dispersion conventions. Numerous of the made items are utilized in different circles of human movement. The significance of applying quantum key distribution conventions beneath perfect conditions without taking into consideration blunders within the frame of quantum clamor is analyzed. The usage of three quantum key distribution conventions is illustrated, as well as the comes about of the appearance of keys and the likelihood of event of each of them. The purpose of the article is pointed at analyzing and investigating quantum key distribution conventions. The article examines the points of interest and impediments of the BB84, B92, and E91 quantum key distribution conventions.

Author Biographies

Y. Begimbayeva, Astana IT University, Kazakhstan

PhD, Assistant Professor of the Department of Intelligent Systems and Cybersecurity

T. Zhaxalykov, Kazakh-British Technical University, Kazakhstan

Master student of Cybersecurity, Faculty of Information Technology

References

Kronberg D., Ozhigov Y., Chernyavskyi A. (2006) Kvantovaya kriptographiya [Quantum Cryptography]. MSU named after M.V.Lomonosov - Moscow, p. 23-40.

Vyalyy M. (2011). Kvantovyye algoritmy: vozmozhnosti i ogranicheniya [Quantum Algorithms: Possibilities and Limitations]. St. Petersburg. https://storage.yandexcloud.net/lms-vault/private/2/courses/2011-spring/spb-quantumalgorithms/materials/20110403_quantum_algorithms_vyali_lecture_notes.pdf

Postulates of quantum theory. VSU, (2012). http://www.rec.vsu.ru/rus/ecourse/quantcomp/sem2.pdf

Bennett, C.H., Bessette, F., Brassard, G. et al. (1992). Experimental quantum cryptography. J. Cryptology, 5, 3–28. https://doi.org/10.1007/BF00191318

Gisin, N., Ribordy, G., Tittel, W., Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145-195. https://doi.org/10.1103/RevModPhys.74.145

Baumeyster D. (2002) Fizika kvantovoy informatsii [Physics of quantum information]. Postmarket Moscow. -376 p.

Bechmann-Pasquinucci, H. (2006). Eavesdropping without quantum memory. Physical Review A, 73, 44-305. Retrieved from The Heat Is Online website: https://doi.org/10.1103/PhysRevA.73.044305

Warke A., Behera B. K., Panigrahi P. K. Experimental realization of three quantum key distribution protocols //Quantum Information Processing. – 2020. – Т. 19. – №. 11. – С. 1-15. https://doi.org/10.1007/s11128-020-02914-z

Shicheng Zhao, Wendong Li, Yuan Shen, YongHe Yu, XinHong Han, Hao Zeng, Maoqi Cai, Tian Qian, Shuo Wang, Zhaoming Wang, Ya Xiao, and Yongjian Gu. (2019). "Experimental investigation of quantum key distribution over a water channel," Appl. Opt., 58, 3902-3907. https://doi.org/10.1364/AO.58.003902

Chi Zhang, Xiao-Long Hu, Cong Jiang, Jiu-Peng Chen, Yang Liu, Weijun Zhang, Zong-Wen Yu, Hao Li, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang, and Jian-Wei Pan. (13 May 2022). Experimental Side-Channel-Secure Quantum Key Distribution. Phys. Rev. Lett., 128, 190503

Bennet C. (1992) Quantum Cryptography using any Two Nonorthogonal States. Phys.Rev.Lett., 68, 3121. https://doi.org/10.1103/PhysRevLett.68.3121

IBM Quantum Composer and the IBM Quantum Lab. https://quantum-computing.ibm.com/

Dhoha A. L. M. et al. Quantum cryptography on IBM QX. 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). – IEEE, 2019. – С. 1-6. https://doi.org/10.1109/cais.2019.8769567

Helstrom, C.W. (1969). Quantum detection and estimation theory. J Stat Phys 1, 231–252. https://doi.org/10.1007/BF01007479

Nurhadi A. I., Syambas N. R. Quantum key distribution (QKD) protocols: A survey. 2018 4th International Conference on Wireless and Telematics (ICWT). – IEEE, 2018. – С. 1-5. https://doi.org/10.1109/icwt.2018.8527822

Downloads

Published

2022-06-30 — Updated on 2022-06-30

How to Cite

Begimbayeva, Y. ., & Zhaxalykov, T. . (2022). RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91. Scientific Journal of Astana IT University, 10(10). https://doi.org/10.37943/QRKJ7456

Issue

Section

Information Technologies
betpas
pendik escort anadolu yakasi escort bostanci escort kadikoy escort kartal escort kurtkoy escort umraniye escort
maltepe escort ataşehir escort ataşehir escort ümraniye escort pendik escort kurtköy escort anadolu yakası escort üsküdar escort şerifali escort kartal escort gebze escort kadıköy escort bostancı escort göztepe escort kadıköy escort bostancı escort üsküdar escort ataşehir escort maltepe escort kurtköy escort anadolu yakası escort ataşehir escort beylikdüzü escort