0% found this document useful (0 votes)
12 views

IEEE_Conference_Template (11)

Uploaded by

bgowda498
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

IEEE_Conference_Template (11)

Uploaded by

bgowda498
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1

I. INTRODUCTION QKD has applications in telecommunications, finance,


In today’s world, traditional cryptographic methods are government, and defense, where data integrity and
becoming more vulnerable due to advancements in quantum confidentiality are critical. It promises to mitigate threats from
computing, making it essential to find stronger security quantum computers, providing a robust solution for secure key
solutions. Quantum Key Distribution (QKD) presents a promising exchange that meets stringent privacy regulations.
method to enhance network security by using quantum Advancements in QKD include quantum communication
mechanics principles. This comparative analysis examines two networks using free-space optical links, fiber optics, and
variants of the BB84 protocol—Normal BB84 and BB84 with satellite-based systems, expanding the reach and reliability of
Two Shared Keys and OTP Authentication. Both aim to establish quantum-secure communications globally.
secure key distribution between parties but differ significantly in A. Types of Keys
how they detect and mitigate potential eavesdropping threats. • Symmetric Key: Symmetric key cryptography uses a single
This study evaluates their output graphs, highlighting the impact shared key for both encryption and decryption. This key
of additional cryptographic measures on security and must be securely distributed to all parties involved. It is
computational complexity. computationally efficient and fast, making it ideal for
II. INVENTION OF QUANTUM KEY DISTRIBUTION encrypting large volumes of data. However, securely
managing and distributing keys is challenging. Common
Charles H. Bennett and Gilles Brassard introduced Quantum
algorithms include AES (Advanced Encryption Standard)
Key Distribution (QKD) in 1984. Their seminal paper, ”Quantum
and DES (Data Encryption Standard), which are widely used
Cryptography: Public Key Distribution and Coin Tossing,”
for securing data transmission and storage across various
introduced the BB84 protocol, a cornerstone of QKD. Bennett
applications.
and Brassard’s work laid the theoretical foundation for using
• Asymmetric Key (Public-Key): Asymmetric key cryptography
quantum mechanics to achieve secure key distribution,
uses a pair of mathematically related keys: a public key for
addressing classical cryptography’s limitations against emerging
encryption and a private key for decryption. Unlike
quantum computing threats.
symmetric cryptography, the encryption key can be freely
QKD marked a significant shift in cryptography, offering a new
distributed, allowing anyone to encrypt messages, while
approach to secure communication based on quantum
only the intended recipient can decrypt them. This
mechanics. By leveraging phenomena such as superposition and
approach addresses the key distribution problem of
entanglement, QKD ensures any interception or measurement
symmetric cryptography but is slower due to its complex
of quantum states disturbs the system, alerting parties to an
mathematical operations. Popular algorithms include RSA
eavesdropper. This feature underpins QKD’s security, providing a
(Rivest-Shamir-Adleman) and ECC (Elliptic Curve
secure method for key distribution resistant to advances in
Cryptography) for securing digital signatures, key exchange
computational power, including quantum computers.
protocols, and secure communication channels.
III. WHAT IS QUANTUM KEY DISTRIBUTION?
B. Quantum Channels
Quantum Key Distribution (QKD) uses quantum mechanics
principles to enable secure communication between two Quantum channels are the physical or logical pathways
parties, commonly known as Alice and Bob, over potentially through which quantum information is transmitted between
insecure channels. Unlike classical cryptographic techniques parties. The security and efficiency of quantum key distribution
that rely on computational complexity, QKD offers a depend heavily on these channels’ properties. 1) Types of
theoretically unbreakable key distribution method. Quantum Channels:
QKD’s security is rooted in fundamental quantum mechanics • Free-Space Optical (FSO) Channel: FSO channels use
principles like the uncertainty principle and the no-cloning photons transmitted through open space or atmospheric
theorem. These principles ensure any attempt to intercept or conditions to facilitate quantum communication. This
measure the quantum states exchanged between Alice and Bob channel is particularly advantageous for point-to-point
will disturb the states, notifying them of an eavesdropper. communication where direct line-of-sight between
Protocols like BB84 illustrate QKD, using properties like transmitter and receiver is maintained. FSO channels offer
quantum superposition and random basis choices (e.g., high bandwidth and low latency, making them suitable for
rectilinear or diagonal) to encode and measure qubits. By real-time data transmission over long distances. They are
comparing a subset of their measurement results over a public commonly used in satellite-based QKD systems, where
channel, Alice and Bob can detect discrepancies caused by secure cryptographic keys are exchanged between ground
eavesdropping, allowing them to discard compromised bits and stations and satellites. FSO technology is also used in
derive a shared secret key resistant to interception. terrestrial applications like secure communication between
2

buildings or across campuses, bypassing the need for IV. WHAT IS A BB84 PROTOCOL?
physical fiber-optic cables. The BB84 protocol, introduced by Charles H. Bennett and
• Fiber-Optic Channel: Fiber-optic channels use optical fibers Gilles Brassard in 1984, is a groundbreaking method for
to transmit quantum information encoded in photons over quantum key distribution. It uses quantum mechanics principles
long distances with minimal loss. These channels are the to secure communication between two parties, known as Alice
backbone of urban and long-haul quantum communication and Bob. The protocol’s security relies on the unique properties
networks due to their high reliability, low attenuation rates, of qubits, which can be in multiple states at once until
and immunity to electromagnetic interference. Fiber-optic measured. Any interception attempt by an eavesdropper causes
channels support high-bandwidth data transmission, noticeable disturbances, allowing Alice and Bob to detect and
essential for secure communication in sectors such as address potential security threats.
finance, government, and healthcare. QKD systems over
fiber-optic channels ensure a secure exchange of
A. Process of BB84 Protocol
cryptographic keys for encrypting sensitive data and
communications. Advances in fiber-optic technology • Preparation and Transmission: Alice prepares a sequence of
continue to enhance the performance and scalability of qubits in one of four possible states: horizontal (|0⟩),
quantum communication networks, enabling secure vertical (|1⟩), diagonal (|+⟩), or anti-diagonal (|−⟩). These
quantum information processing and distribution globally. states correspond to the binary values 0 and 1, with
• Quantum Satellite Channel: Quantum Satellite channels use
quantum satellites orbiting Earth to relay quantum
information between ground stations across continents or
globally. These channels enable secure quantum
communication over large distances, surpassing terrestrial
infrastructure limitations. Quantum satellites act as
intermediaries for exchanging cryptographic keys and
Fig. 1. Quantum Key Distribution Using BB84. Source : From Google Images
quantum states between remote locations, facilitating
secure communications for applications such as
international diplomacy, defense, and financial
transactions. The development of quantum satellite
networks represents a significant advancement in global
quantum communication, offering secure and reliable
connectivity across geopolitical boundaries. Quantum
satellite channels use advanced technologies to mitigate
atmospheric disturbances and ensure the integrity and
confidentiality of quantum information exchanged
between ground stations, advancing the field of quantum
cryptography and secure communication technologies.
Fig. 2. Bases Matching And Bit Generation In BB844. Source : From Google
C. Applications of Quantum Key Distribution Images

Quantum Key Distribution (QKD) is highly valuable in modern


cryptography and secure communication due to its various
practical applications:
each value represented in two different bases (rectilinear
• Secure Communication: QKD ensures any eavesdropping and diagonal). Alice transmits the qubits to Bob through a
attempt will disturb the quantum state, alerting the quantum channel.
communicating parties to an intruder’s presence. • Measurement: Bob receives the qubits and randomly
• Data Privacy: QKD securely distributes encryption keys, selects a measurement basis (rectilinear or diagonal) for
ensuring the confidentiality and integrity of sensitive each qubit. He measures the qubits and records the results
information. along with the chosen basis.
• Financial Transactions: QKD secures financial transactions, • Basis Reconciliation: After the transmission, Alice and Bob
safeguarding them from potential threats posed by future publicly share their chosen bases over a classical channel
quantum computers. without revealing the actual measurement results. They
• Government and Defense: QKD is used in government and retain only the measurement outcomes for which they
defense sectors to protect classified information and used the same basis, discarding the others. This process is
communications from sophisticated adversaries.
known as basis reconciliation.
3

• Key Sifting: The remaining bits form a raw key. To detect estimation. After transmitting and receiving the photons,
any eavesdropping, Alice and Bob compare a subset of Alice and Bob publicly reveal their basis choices and
their raw key bits. If the error rate exceeds a predefined compare a subset of their measurement results over a
threshold, they abort the protocol, as it indicates potential public channel to estimate the error rate. If the error rate is
eavesdropping. Otherwise, they proceed to the next step. • too high, it suggests eavesdropping or significant noise and
Error Correction and Privacy Amplification: Alice and Bob the key is discarded. If the error rate is acceptable, the
apply error correction techniques to correct any remaining bits undergo error correction to ensure Alice’s
discrepancies in their raw key. They also perform privacy and Bob’s keys match, and privacy amplification to distill a
amplification to reduce any partial information that Eve shorter, more secure key. This process makes the final key
might have obtained, resulting in a shorter but more secure resilient against any partial information an eavesdropper
final key. might have gained. The error detection mechanism ensures
the integrity of the key distribution and the final key’s
The BB84 protocol offers robust security based on the security.
fundamental principles of quantum mechanics. It has been The provided image illustrates the encoding process of the
experimentally demonstrated in various settings, including fiber- BB84 protocol. It shows how Alice uses two strings a and b to
optic and free-space optical systems. The protocol’s security decide the basis and the bit value for each photon. For instance,
relies on the fact that any attempt to eavesdrop on the in the first column, a =0 and b =1 indicate using the X basis to
quantum channel introduces detectable disturbances, ensuring encode the bit as |+⟩. Bob, upon receiving the photon, also
the integrity and confidentiality of the generated key. randomly chooses a basis for measurement. After the
B. Key Features of BB84 Protocol transmission, they publicly share their basis choices and keep
• Quantum Superposition: The BB84 protocol uses quantum only the bits where the bases match, discarding the rest. This
superposition to encode information in the polarization process is repeated for each bit, ensuring a secure key is derived
states of photons. This means a photon can exist in from the correctly measured bits. The table in the
multiple states at once, like horizontal/vertical or
diagonal/anti-diagonal. For BB84, these states are
represented as |0⟩ and |1⟩ for the rectilinear basis, and |+⟩
and |−⟩ for the diagonal basis. Each state corresponds to a
bit value (0 or 1), and encoding bits this way ensures that
any attempt to measure or intercept them will disturb their
state. This disturbance occurs because of the nocloning
theorem and the Heisenberg uncertainty principle in
quantum mechanics. If an eavesdropper (Eve) tries to
measure the photons’ polarization, she will change the
Fig. 3. Illustration of the BB84 Protocol Encoding Process. This table shows how
state of the photons, introducing detectable errors. This Alice uses two strings a and b to decide the basis and the bit value for each
property of quantum superposition provides the BB84 photon. For example, in the first column, a = 0 and b = 1 indicate using the X
basis to encode the bit as |+⟩. Bob, upon receiving the photon, also randomly
protocol with its security, as any eavesdropping attempt
chooses a basis for measurement. After the transmission, they publicly share
will be evident to Alice and Bob. their basis choices and keep only the bits where the bases match, discarding the
• Random Basis Choice: In the BB84 protocol, both Alice and rest. Source: Quantum Leap YouTube channel.
Bob randomly choose their encoding and measurement
bases from two options: rectilinear (Z) and diagonal (X). For
each bit of the key, Alice randomly selects one of the bases image serves as a clear representation of the BB84 protocol’s
to prepare the photon, and Bob randomly selects one to encoding and decoding process, highlighting the importance of
measure the incoming photon. After transmission, Alice basis choice and the resultant quantum states used for secure
and Bob publicly announce their basis choices for each bit key distribution.
over a classical channel and discard bits where their
choices don’t match, as these are more likely to have been
measured incorrectly. The bits where their bases match C. Applications of BB84 Protocol
form the raw key. This randomness in basis choice makes The BB84 protocol is essential in various fields where secure
eavesdropping difficult, as Eve would have to guess the communication is critical:
correct basis for each photon, introducing detectable
errors. • Telecommunications: Used to create secure communication
• Error Detection: Error detection in the BB84 protocol is channels, ensuring that information remains confidential
achieved through basis reconciliation and error rate and authenticated.
4

• Banking and Finance: Protects financial transactions and whether OTPs match, indicating additional cryptographic
communications between institutions, preventing data steps.
breaches and unauthorized access. 2) Measurements by Alice and Bob:
• Government and Military: Employed by government
• Normal BB84: Shows measurement outcomes (0 or 1) for
agencies and military organizations to safeguard classified
each qubit. Alice’s and Bob’s measurements may correlate
information and sensitive communications.
based on matching bases.
• Healthcare: Ensures the privacy and integrity of medical
• BB84 with Two Shared Keys and OTP Authentication:
data and patient information transmitted over networks,
Includes measurement outcomes influenced by OTP
adhering to stringent privacy regulations.
decryption. Outcomes might differ if OTPs do not match,
• Critical Infrastructure: Secures communications within
indicating potential eavesdropping.
sectors like energy, transportation, and utilities, defending
against cyber threats and ensuring operational resilience. 3) Shared Keys:
• Normal BB84: Displays the bits of the shared key where
bases match (if any). Indicates bits agreed upon by both
V. NORMAL BB84 Alice and Bob.
• BB84 with Two Shared Keys and OTP Authentication: Shows
A. Eavesdropping Probability
shared keys influenced by OTPs and their verification.
• Detection Mechanism: This implementation primarily Additional steps might influence the pattern and length of
focuses on establishing a shared key based on matching shared keys due to OTP inclusion.
measurement bases between Alice and Bob.
• Vulnerabilities: Without additional steps like OTP VIII. COMPARISON INSIGHTS
generation and verification, there’s no built-in mechanism
A. Eavesdropping Probability in Normal BB84 Protocol
to detect eavesdropping.
• Probability: The eavesdropping probability is potentially The probability of no eavesdropping in the normal BB84
higher compared to protocols with additional security protocol is given by:
checks because it relies solely on the correctness of
quantum measurements.
Pno eavesdropping
VI. BB84 WITH TWO SHARED KEYS AND OTP AUTHENTICATION
where n is the number of bases Bob has guessed correctly
A. Eavesdropping Probability
and has matched with the bases of Alice. Here, n can be any
• Detection Mechanism: Introduces OTP generation,
encryption, decryption, and verification steps to detect
potential eavesdropping.
• Enhanced Security: By verifying the equality of the OTPs
before constructing the final shared key, it enhances
security by detecting deviations caused by eavesdropping.
• Probability: The eavesdropping probability is lower
compared to Normal BB84 due to the added cryptographic
checks. Any interference by an eavesdropper would likely
result in a mismatch during OTP verification, triggering the
detection of eavesdropping.
Fig. 4. Normal BB84 Protocol Output Graph

VII. RESULT
A. Output Graph Comparison
1) Bases Used by Alice and Bob:
• Normal BB84: Typically shows a random distribution of
bases (Z and X) used by Alice and Bob. Both Alice’s and
Bob’s bases might show similar distributions due to random
choice.
• BB84 with Two Shared Keys and OTP Authentication:
Similar to Normal BB84, but with an additional step where
OTPs might influence the choice of measurement bases. Fig. 5. BB84 with Two Shared Keys and OTP Authentication Output Graph
Alice and Bob may display different patterns depending on
5

number between 0 and the number of qubits, As n increases,


the probability of eavesdropping tends to increase as well. For
specific values of n:
• If n =1, the probability is 0.25.
• If n =2, the probability is 0.4375.
• If n =10, the probability is 0.9436864853.

B. Eavesdropping Probability in Enhanced BB84 Protocol


The probability of no eavesdropping in the enhanced BB84
protocol with two shared keys and OTP authentication is given
by:

Pno eavesdropping
This indicates a significantly lower probability of
eavesdropping compared to the normal BB84 protocol.

C. Normal BB84 Vs BB84 with Two Shared Keys and OTP


Authentication
• Normal BB84: Graphs typically show straightforward
distributions of bases and measurements, with a focus on
establishing a shared key. The security relies solely on
quantum mechanics without additional cryptographic
verification, potentially leading to higher eavesdropping
probability.
• BB84 with Two Shared Keys and OTP Authentication:
Output graphs reflect the added complexity of
cryptographic steps, such as OTP verification, enhancing
the detection of eavesdropping. This results in a lower
probability of eavesdropping, as evidenced by the
significant difference in eavesdropping probabilities
compared to the normal BB84 protocol.

IX. CONCLUSION
In conclusion, the comparative study of the normal BB84
protocol and its enhanced variant with two shared keys and OTP
authentication reveals crucial insights into their security
efficacy. While the normal BB84 protocol offers a foundational
approach to quantum key distribution, it is susceptible to higher
eavesdropping probabilities due to its reliance solely on
quantum mechanics. Conversely, the enhanced BB84 protocol,
with its additional cryptographic measures, significantly reduces
the risk of eavesdropping, as demonstrated by the
eavesdropping probability analysis. This highlights the
importance of integrating supplementary cryptographic
techniques into QKD protocols to bolster network security
against quantum computing threats. Thus, the enhanced BB84
protocol stands out as a more robust solution for secure key
distribution in the quantum era.

You might also like