Cryptograpic Algorithm F
Cryptograpic Algorithm F
Here, pi is the classical probabilities associated with each 3) She sends the quantum state |ψi⟩ to Bob over a
pure states ψi. In the case of a completely mixed qubit state, quantum channel.
the density matrix is: 4) Bob chooses a random basis b′i for each received qubit
and performs measurement, obtaining result a′i.
5) Alice and Bob publicly disclose their basis strings b and
This describes maximum uncertainty — a common feature b′ over a classical authenticated channel, and discard all
in QRNG and QKD when viewed from the perspective of an bits where bi =
̸ b′i.
eavesdropper. Which will be discussed in the next section. 6) The remaining bits form the sifted key k, with high
probability k = k′ if there is no noise or eavesdropping.
III. QUANTUM KEY DISTRIBUTION (QKD)
B. Security Through Measurement Disturbance
Quantum Key Distribution (QKD) is a cryptographic
technique that enables two distant parties, Alice and Bob, to Suppose an eavesdropper Eve performs an intercept-
generate a shared secret key that is provably secure against resend attack. She measures each incoming qubit using a
random basis and resends her result to Bob. This introduces E. Practical Considerations and Enhancements
errors with a probability of 25%:
In real-world systems, photon loss, detector inefficiencies,
Let Perror be the probability that Bob receives a wrong bit and channel noise are non-negligible. Several enhanced
due to Eve: protocols have been proposed:
This maximally mixed state implies that Eve cannot extract |ψ⟩ = α|0⟩ + β |1⟩, where α,β ∈ C, |α|2 + |β|2 = 1
any meaningful information without introducing detectable
disturbance.
Here, |0⟩ and |1⟩ are the computational basis states. The Extractor : {0,1}n × {0,1}d → {0,1}m, m ≈ H∞(X)
coefficients α and β represent probability amplitudes; their
squared magnitudes give the probabilities of measuring the Here, d is a short truly random seed (which can be reused),
qubit in the respective states. and m is the output length.
A maximally uncertain state—i.e., one that yields a 50-50
outcome when measured in the computational basis—is the D. Applications in Post-Quantum Cryptography (PQC)
equal superposition state:
QRNG-generated keys can be integrated into Quantum Key
Distribution (QKD) protocols to improve key unpredictability.
(1) For instance, in BB84, the bases (rectilinear or diagonal) and
bit values can be chosen using QRNGs instead of PRNGs,
Measuring this state in the |0⟩,|1⟩ basis yields either 0 or 1
further reducing the attack surface for quantum adversaries.
with equal probability:
Moreover, QRNGs provide entropy sources for
postquantum encryption schemes like lattice-based, code-
based, and multivariate polynomial cryptosystems. These
This forms the foundation of quantum randomness. systems often require secure random sampling from high-
dimensional distributions, such as discrete Gaussians—where
B. Beam Splitter-Based QRNG
QRNGs provide a strong advantage in seeding security.
A practical implementation of QRNG involves a 50:50 beam
splitter and single-photon sources. A photon impinges on the E. Security Model: Information-Theoretic Randomness
beam splitter and is either transmitted or reflected with
equal probability, forming a binary random event: In the presence of an adversary Eve, the quantum
randomness source must satisfy composable security. That is,
• Reflected→ Encode as bit 0 • Transmitted → Encode as bit
the output R of the QRNG should be indistinguishable from
1 uniform even conditioned on Eve’s quantum side information
This setup can be formally modeled as a measurement in ρ E:
the computational basis after preparing a photon in the state
|ψ⟩ from Eq. (1). The outcome is irreducibly random due to
the Born rule, which governs measurement probabilities in
quantum mechanics. Where τR is the uniform distribution over R, and ϵ is the
Let M = {|0⟩⟨0|,|1⟩⟨1|} be the measurement operators. security parameter.
Then the expected entropy of the outcome is: V. INTEGRATION OF QKD AND QRNG FOR SECURE KEY GENERATION
In the proposed approach, we aim to integrate Quantum
Key Distribution (QKD) with Quantum Random Number
bit
Generation (QRNG) to securely generate cryptographic keys.
Thus, each measurement yields one bit of Shannon The system utilizes photons as the quantum particle for
entropy, i.e., maximal information-theoretic randomness. communication, which are transmitted through an existing
fiberoptic channel. This transforms the classical
C. Entropy Extraction and Min-Entropy communication channel into a quantum information channel,
leveraging the properties of quantum mechanics such as
In practice, real-world QRNGs suffer from imperfections
superposition and decoherence. The secure key for the QKD
such as detector bias, photon loss, and noise. To ensure high-
is then generated using random bits produced by the QRNG
quality randomness, one extracts entropy from the raw
process.
bitstream using randomness extractors. Let the min-entropy
of the source be: A. Quantum Information Transmission Through Fiber-Optic
Channels
In classical communication, information is transmitted
If H∞(X) < 1, a randomness extractor such as a Trevisan through a channel using classical bits, typically represented
extractor or universal hash function is used to distill nearly by 0s and 1s. In contrast, quantum communication uses
uniform bits from the biased or imperfect source. This quantum bits (qubits), represented by the quantum states of
process ensures that the final output is statistically close to particles like photons. The photon-based quantum state can
uniform, with distance ϵ in total variation distance. be in a superposition of the classical states |0⟩ and |1⟩, as
governed by the principles of quantum mechanics.
When a photon is sent through the fiber-optic channel, it In practical terms, any attempt by Eve to measure or
may be in one of the following states: intercept the photon introduces errors into the transmission,
and these errors are detectable by the legitimate parties
|ψ⟩ = α|0⟩ + β |1⟩, where |α|2 + |β|2 = 1 (Alice and Bob). This leads to the concept of the Quantum Bit
Error Rate (QBER), which is used to assess the presence of
where α and β are complex probability amplitudes, and |α|2 eavesdropping.
and |β|2 represent the probabilities of measuring the qubit in
the |0⟩ or |1⟩ state, respectively.
Nerror
The transmission of quantum information through a
QBER =
fiberoptic channel typically uses the polarization states of
photons or their path to encode the quantum information. Ntotal
For example, by using the polarization of a photon, we can where Nerror is the number of bits that differ between Alice’s
define two possible states for encoding information: and Bob’s key, and Ntotal is the total number of bits compared.
horizontal polarization |H⟩ (representing the classical bit 0)
and vertical polarization |V ⟩ (representing the classical bit 1).
In quantum mechanics, the quantum state of the photon C. Quantum Random Number Generation (QRNG) as the
transmitted through the channel could be represented as: Secure Key
For the secure key generation, we utilize Quantum Random
|ψ⟩ = α|H⟩ + β |V ⟩
Number Generation (QRNG), where the randomness is
When the photon reaches the receiver (Bob), the quantum derived from the intrinsic quantum properties of photons.
state is measured. If the photon’s polarization is |H⟩, the This randomness arises from the probabilistic nature of
measurement outcome corresponds to 0; if the polarization quantum measurements, which cannot be predicted or
is |V ⟩, the outcome corresponds to 1. Due to quantum reproduced by any classical system.
mechanics’ probabilistic nature, the outcome is not A common method for QRNG is to use a beam splitter,
deterministic, but rather probabilistic, as described by the which splits a single photon into two possible paths, with
Born rule. each path corresponding to a possible outcome (0 or 1). The
photon’s path is random, and the binary outcome can be
B. Superposition and Decoherence: Ensuring Security recorded as a random bit. This method produces truly
One of the key features that ensure security in QKD is the random bits, and since the process is governed by quantum
quantum principle of superposition. A photon can exist in a mechanics, it is impossible for an eavesdropper to predict the
superposition of polarization states |H⟩ and |V ⟩ until it is outcome without disturbing the system.
measured. This feature guarantees that any interception or The randomness can be mathematically represented as:
eavesdropping attempt by an adversary (Eve) will disturb the
quantum state and introduce detectable errors.
P(photon reflected) = (photon transmitted) =
The superposition principle can be mathematically
expressed as: This probabilistic behavior ensures that the generated bits
are truly random, unlike classical pseudorandom number
generators (PRNGs), which are based on deterministic
algorithms.
This is a balanced superposition state where the photon has D. Integration of QKD and QRNG for Secure Communication
equal probability to be measured in either the |H⟩ or |V ⟩ To securely generate a key using QKD, we leverage QRNG
state, corresponding to 0 and 1, respectively. to provide the random bits that serve as the raw key. After
However, due to decoherence, which is caused by the the quantum key exchange between Alice and Bob, they
interaction of the quantum state with the environment, the compare the error rate and use error correction methods to
information can become corrupted. Decoherence causes the reconcile discrepancies in their keys. The final secure key is
superposition state to collapse into one of the basis states (| derived after applying Privacy Amplification, ensuring that
H⟩ or |V ⟩), and this collapse is irreversible. If Eve intercepts even if Eve has partial information, she cannot learn the key.
the photon, she will disturb its superposition state, and the The integration of QRNG ensures that the raw key
measurement will collapse the state, introducing errors. This exchanged via QKD is cryptographically secure, as it is based
is known as the “no-cloning theorem” of quantum on truly random numbers. The key is immune to classical
mechanics, which guarantees that Eve cannot perfectly copy attacks, and since the randomness is rooted in quantum
the quantum state without disturbing it.
phenomena, it is resistant to future quantum-based attacks communication channel. This involves utilizing single-photon
as well. detectors and quantum-safe cryptographic algorithms to
In conclusion, by using QRNG to generate the raw key and build a functional quantum key exchange system. With such a
QKD to distribute it securely, we create a system where the system, we can advance towards the deployment of quantum
transmitted key is secure against both classical and quantum communication networks that are resistant to both classical
eavesdropping. This combination provides a robust and quantum-based attacks, ensuring that sensitive data
foundation for secure communication in the quantum remains protected even in the presence of powerful quantum
computing era. adversaries.
Additionally, we are working on the integration of
Quantum Error Correction (QEC) and the mitigation of
Final Key Length = K − leakEC decoherence effects. Decoherence, a phenomenon that
occurs when a quantum system interacts with its
where K is the corrected key length, leakEC is the estimated
environment, can cause the loss of quantum information and
leakage from error correction, and ϵ1 is the security
degrade the performance of quantum communication
parameter. This secure key can then be used for
systems. Quantum Error Correction aims to combat this by
cryptographic applications, including encryption,
encoding quantum information in such a way that errors can
authentication, and digital signatures, providing a quantum-
be detected and corrected without measuring the quantum
safe solution for future cryptographic protocols.
state directly. Reducing the number of qubits needed for
CONCLUSION error correction is an important area of research, as it can
lower the computational and resource demands of quantum
In this paper, we have explored the integration of Quantum
systems. By improving QEC protocols, we aim to make
Key Distribution (QKD) and Quantum Random Number
quantum communication more efficient and scalable, paving
Generation (QRNG) to enhance modern cryptographic
the way for large-scale deployment of quantum-safe
systems, providing a path to quantum-safe and quantum-
cryptographic systems.
resistant communication. We discussed how quantum
mechanics can be harnessed to create secure cryptographic In conclusion, the integration of QKD with QRNG offers a
protocols that are impervious to the growing threats posed promising approach to achieving quantum-safe
by quantum computers. The key focus of this work was on communication over existing infrastructure. The continued
the utilization of existing fiber-optic channels, transforming research into error correction and decoherence will further
them into quantum information channels through the enhance the reliability and scalability of quantum
transmission of quantum particles like photons. communication systems, ultimately enabling secure
cryptographic protocols that are resistant to both classical
The concept of QKD leverages the fundamental properties
and quantum attacks. This project represents a significant
of quantum mechanics, particularly superposition and
step toward realizing the full potential of quantum
entanglement, to ensure secure key distribution. By using
communication in the modern cryptographic landscape,
photons as the carriers of quantum information, we are able
providing a solid foundation for future advancements in
to detect any eavesdropping attempt due to the intrinsic
quantum cryptography.
disturbance caused by measurement, which makes the
classical ”man-inthe-middle” attack virtually impossible. As REFERENCES
any interception by an adversary (Eve) would lead to [1] Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh
detectable errors in the transmitted quantum states, the M. Salem, “Statistical Analysis for Random Bits Generation on Quantum
security of the communication is preserved. Key Distribution”, 3rd IEEE- Conference on Cyber Security, Cyber
Warfare, and Digital Forensic (CyberSec2014), ISBN: 978-1-4799-39053
In this context, QRNG plays a pivotal role in generating ©2014 IEEE, Faculty of Engineering - Lebanese University, April
truly random cryptographic keys based on quantum 2014,pp. 45-52.
processes that are fundamentally unpredictable. Unlike [2] S. Vittorio, “Quantum Cryptography: Privacy though Uncertainty,” CSA
Discovery Guides, 2002.
classical random number generators, QRNG leverages the [3] Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and AbdelBadeeh
probabilistic nature of quantum mechanics, ensuring that the M. Salem, “Advanced Encryption Standard Development Based
generated bits are not subject to deterministic algorithms or Quantum Key Distribution”, the 8th International Conference for
Internet Technology and Secured Transactions (ICITST-2013), UK,
biases. This randomness is crucial for creating secure Dec.,2013, pp.536-541.
cryptographic keys that cannot be predicted or reproduced, [4] Ali Ibnun Nurhadi, Nana Rachmana Syambas ”Quantum Key Distribution
offering an additional layer of security for quantum (QKD) Protocols: A Survey”, ISBN: 978-1-5386-6163-5 ©2018 IEEE
communication.
Looking towards the future, one of the primary goals of
this project is to practically demonstrate a quantum