Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol

Version 1 : Received: 20 February 2021 / Approved: 22 February 2021 / Online: 22 February 2021 (15:27:24 CET)

How to cite: Anghel, C. A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol. Preprints 2021, 2021020486 (doi: 10.20944/preprints202102.0486.v1). Anghel, C. A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol. Preprints 2021, 2021020486 (doi: 10.20944/preprints202102.0486.v1).

Abstract

This paper presents the development, comparison and analysis of several implementations of the B92 Quantum Key Distribution (QKD) protocol. In order to achieve this objective a prototype which consists of traditional (non-quantum) simulators was created, one for B92 protocol, one for B92 protocol with eavesdropper and one for B92 protocol with Quantum Bit Travel Time (QBTT) eavesdropper detection method. The principles of quantum mechanics were studied, as a foundation of quantum cryptography, for the realization of simulation programs that were written in C ++, focusing mainly on the B92 protocol and QBTT eavesdropper detection method. We compared the Quantum Bit Error Rate (QBER) for implementation of B92 protocol without eavesdropper, B92 protocol with eavesdropper and B92 protocol with QBTT eavesdropper detection method and found that QBTT eavesdropper detection method significantly reduces the QBER from the final key.

Keywords

quantum cryptography; quantum physics; quantum key distribution; qkd; quantum protocol; B92 protocol; QBTT eavesdropper detection method; qbit

Subject

MATHEMATICS & COMPUTER SCIENCE, Algebra & Number Theory

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.