IEEE_Conference_Template (11)
IEEE_Conference_Template (11)
buildings or across campuses, bypassing the need for IV. WHAT IS A BB84 PROTOCOL?
physical fiber-optic cables. The BB84 protocol, introduced by Charles H. Bennett and
• Fiber-Optic Channel: Fiber-optic channels use optical fibers Gilles Brassard in 1984, is a groundbreaking method for
to transmit quantum information encoded in photons over quantum key distribution. It uses quantum mechanics principles
long distances with minimal loss. These channels are the to secure communication between two parties, known as Alice
backbone of urban and long-haul quantum communication and Bob. The protocol’s security relies on the unique properties
networks due to their high reliability, low attenuation rates, of qubits, which can be in multiple states at once until
and immunity to electromagnetic interference. Fiber-optic measured. Any interception attempt by an eavesdropper causes
channels support high-bandwidth data transmission, noticeable disturbances, allowing Alice and Bob to detect and
essential for secure communication in sectors such as address potential security threats.
finance, government, and healthcare. QKD systems over
fiber-optic channels ensure a secure exchange of
A. Process of BB84 Protocol
cryptographic keys for encrypting sensitive data and
communications. Advances in fiber-optic technology • Preparation and Transmission: Alice prepares a sequence of
continue to enhance the performance and scalability of qubits in one of four possible states: horizontal (|0⟩),
quantum communication networks, enabling secure vertical (|1⟩), diagonal (|+⟩), or anti-diagonal (|−⟩). These
quantum information processing and distribution globally. states correspond to the binary values 0 and 1, with
• Quantum Satellite Channel: Quantum Satellite channels use
quantum satellites orbiting Earth to relay quantum
information between ground stations across continents or
globally. These channels enable secure quantum
communication over large distances, surpassing terrestrial
infrastructure limitations. Quantum satellites act as
intermediaries for exchanging cryptographic keys and
Fig. 1. Quantum Key Distribution Using BB84. Source : From Google Images
quantum states between remote locations, facilitating
secure communications for applications such as
international diplomacy, defense, and financial
transactions. The development of quantum satellite
networks represents a significant advancement in global
quantum communication, offering secure and reliable
connectivity across geopolitical boundaries. Quantum
satellite channels use advanced technologies to mitigate
atmospheric disturbances and ensure the integrity and
confidentiality of quantum information exchanged
between ground stations, advancing the field of quantum
cryptography and secure communication technologies.
Fig. 2. Bases Matching And Bit Generation In BB844. Source : From Google
C. Applications of Quantum Key Distribution Images
• Key Sifting: The remaining bits form a raw key. To detect estimation. After transmitting and receiving the photons,
any eavesdropping, Alice and Bob compare a subset of Alice and Bob publicly reveal their basis choices and
their raw key bits. If the error rate exceeds a predefined compare a subset of their measurement results over a
threshold, they abort the protocol, as it indicates potential public channel to estimate the error rate. If the error rate is
eavesdropping. Otherwise, they proceed to the next step. • too high, it suggests eavesdropping or significant noise and
Error Correction and Privacy Amplification: Alice and Bob the key is discarded. If the error rate is acceptable, the
apply error correction techniques to correct any remaining bits undergo error correction to ensure Alice’s
discrepancies in their raw key. They also perform privacy and Bob’s keys match, and privacy amplification to distill a
amplification to reduce any partial information that Eve shorter, more secure key. This process makes the final key
might have obtained, resulting in a shorter but more secure resilient against any partial information an eavesdropper
final key. might have gained. The error detection mechanism ensures
the integrity of the key distribution and the final key’s
The BB84 protocol offers robust security based on the security.
fundamental principles of quantum mechanics. It has been The provided image illustrates the encoding process of the
experimentally demonstrated in various settings, including fiber- BB84 protocol. It shows how Alice uses two strings a and b to
optic and free-space optical systems. The protocol’s security decide the basis and the bit value for each photon. For instance,
relies on the fact that any attempt to eavesdrop on the in the first column, a =0 and b =1 indicate using the X basis to
quantum channel introduces detectable disturbances, ensuring encode the bit as |+⟩. Bob, upon receiving the photon, also
the integrity and confidentiality of the generated key. randomly chooses a basis for measurement. After the
B. Key Features of BB84 Protocol transmission, they publicly share their basis choices and keep
• Quantum Superposition: The BB84 protocol uses quantum only the bits where the bases match, discarding the rest. This
superposition to encode information in the polarization process is repeated for each bit, ensuring a secure key is derived
states of photons. This means a photon can exist in from the correctly measured bits. The table in the
multiple states at once, like horizontal/vertical or
diagonal/anti-diagonal. For BB84, these states are
represented as |0⟩ and |1⟩ for the rectilinear basis, and |+⟩
and |−⟩ for the diagonal basis. Each state corresponds to a
bit value (0 or 1), and encoding bits this way ensures that
any attempt to measure or intercept them will disturb their
state. This disturbance occurs because of the nocloning
theorem and the Heisenberg uncertainty principle in
quantum mechanics. If an eavesdropper (Eve) tries to
measure the photons’ polarization, she will change the
Fig. 3. Illustration of the BB84 Protocol Encoding Process. This table shows how
state of the photons, introducing detectable errors. This Alice uses two strings a and b to decide the basis and the bit value for each
property of quantum superposition provides the BB84 photon. For example, in the first column, a = 0 and b = 1 indicate using the X
basis to encode the bit as |+⟩. Bob, upon receiving the photon, also randomly
protocol with its security, as any eavesdropping attempt
chooses a basis for measurement. After the transmission, they publicly share
will be evident to Alice and Bob. their basis choices and keep only the bits where the bases match, discarding the
• Random Basis Choice: In the BB84 protocol, both Alice and rest. Source: Quantum Leap YouTube channel.
Bob randomly choose their encoding and measurement
bases from two options: rectilinear (Z) and diagonal (X). For
each bit of the key, Alice randomly selects one of the bases image serves as a clear representation of the BB84 protocol’s
to prepare the photon, and Bob randomly selects one to encoding and decoding process, highlighting the importance of
measure the incoming photon. After transmission, Alice basis choice and the resultant quantum states used for secure
and Bob publicly announce their basis choices for each bit key distribution.
over a classical channel and discard bits where their
choices don’t match, as these are more likely to have been
measured incorrectly. The bits where their bases match C. Applications of BB84 Protocol
form the raw key. This randomness in basis choice makes The BB84 protocol is essential in various fields where secure
eavesdropping difficult, as Eve would have to guess the communication is critical:
correct basis for each photon, introducing detectable
errors. • Telecommunications: Used to create secure communication
• Error Detection: Error detection in the BB84 protocol is channels, ensuring that information remains confidential
achieved through basis reconciliation and error rate and authenticated.
4
• Banking and Finance: Protects financial transactions and whether OTPs match, indicating additional cryptographic
communications between institutions, preventing data steps.
breaches and unauthorized access. 2) Measurements by Alice and Bob:
• Government and Military: Employed by government
• Normal BB84: Shows measurement outcomes (0 or 1) for
agencies and military organizations to safeguard classified
each qubit. Alice’s and Bob’s measurements may correlate
information and sensitive communications.
based on matching bases.
• Healthcare: Ensures the privacy and integrity of medical
• BB84 with Two Shared Keys and OTP Authentication:
data and patient information transmitted over networks,
Includes measurement outcomes influenced by OTP
adhering to stringent privacy regulations.
decryption. Outcomes might differ if OTPs do not match,
• Critical Infrastructure: Secures communications within
indicating potential eavesdropping.
sectors like energy, transportation, and utilities, defending
against cyber threats and ensuring operational resilience. 3) Shared Keys:
• Normal BB84: Displays the bits of the shared key where
bases match (if any). Indicates bits agreed upon by both
V. NORMAL BB84 Alice and Bob.
• BB84 with Two Shared Keys and OTP Authentication: Shows
A. Eavesdropping Probability
shared keys influenced by OTPs and their verification.
• Detection Mechanism: This implementation primarily Additional steps might influence the pattern and length of
focuses on establishing a shared key based on matching shared keys due to OTP inclusion.
measurement bases between Alice and Bob.
• Vulnerabilities: Without additional steps like OTP VIII. COMPARISON INSIGHTS
generation and verification, there’s no built-in mechanism
A. Eavesdropping Probability in Normal BB84 Protocol
to detect eavesdropping.
• Probability: The eavesdropping probability is potentially The probability of no eavesdropping in the normal BB84
higher compared to protocols with additional security protocol is given by:
checks because it relies solely on the correctness of
quantum measurements.
Pno eavesdropping
VI. BB84 WITH TWO SHARED KEYS AND OTP AUTHENTICATION
where n is the number of bases Bob has guessed correctly
A. Eavesdropping Probability
and has matched with the bases of Alice. Here, n can be any
• Detection Mechanism: Introduces OTP generation,
encryption, decryption, and verification steps to detect
potential eavesdropping.
• Enhanced Security: By verifying the equality of the OTPs
before constructing the final shared key, it enhances
security by detecting deviations caused by eavesdropping.
• Probability: The eavesdropping probability is lower
compared to Normal BB84 due to the added cryptographic
checks. Any interference by an eavesdropper would likely
result in a mismatch during OTP verification, triggering the
detection of eavesdropping.
Fig. 4. Normal BB84 Protocol Output Graph
VII. RESULT
A. Output Graph Comparison
1) Bases Used by Alice and Bob:
• Normal BB84: Typically shows a random distribution of
bases (Z and X) used by Alice and Bob. Both Alice’s and
Bob’s bases might show similar distributions due to random
choice.
• BB84 with Two Shared Keys and OTP Authentication:
Similar to Normal BB84, but with an additional step where
OTPs might influence the choice of measurement bases. Fig. 5. BB84 with Two Shared Keys and OTP Authentication Output Graph
Alice and Bob may display different patterns depending on
5
Pno eavesdropping
This indicates a significantly lower probability of
eavesdropping compared to the normal BB84 protocol.
IX. CONCLUSION
In conclusion, the comparative study of the normal BB84
protocol and its enhanced variant with two shared keys and OTP
authentication reveals crucial insights into their security
efficacy. While the normal BB84 protocol offers a foundational
approach to quantum key distribution, it is susceptible to higher
eavesdropping probabilities due to its reliance solely on
quantum mechanics. Conversely, the enhanced BB84 protocol,
with its additional cryptographic measures, significantly reduces
the risk of eavesdropping, as demonstrated by the
eavesdropping probability analysis. This highlights the
importance of integrating supplementary cryptographic
techniques into QKD protocols to bolster network security
against quantum computing threats. Thus, the enhanced BB84
protocol stands out as a more robust solution for secure key
distribution in the quantum era.