CFP last date
20 January 2025
Reseach Article

Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol

by Rahul Aggarwal, Heeren Sharma, Deepak Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 8
Year of Publication: 2011
Authors: Rahul Aggarwal, Heeren Sharma, Deepak Gupta
10.5120/2454-3313

Rahul Aggarwal, Heeren Sharma, Deepak Gupta . Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol. International Journal of Computer Applications. 20, 8 ( April 2011), 28-31. DOI=10.5120/2454-3313

@article{ 10.5120/2454-3313,
author = { Rahul Aggarwal, Heeren Sharma, Deepak Gupta },
title = { Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 8 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number8/2454-3313/ },
doi = { 10.5120/2454-3313 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:16.773292+05:30
%A Rahul Aggarwal
%A Heeren Sharma
%A Deepak Gupta
%T Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 8
%P 28-31
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key distribution protocol and the analysis of these attacks.

References
  1. Bennett, C. H. and Brassard G. 1984. Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 175-179.
  2. Ekert, Artur K. 1991. Quantum cryptography based on Bell’s theorem, Physical Review Letters, Vol. 67, No. 6, 661-663.
  3. Bennett, C. H. 1992. Quantum cryptography using any two non-orthogonal states, Physical Review Letters 68 (21), 3121-3124.
  4. Alleaume, R., et al. 2007. SECOQC White Paper on Quantum Key Distribution and Cryptography. Arxiv preprint quant-ph/0701168.
  5. Poppe, A., M. Peev, and Maurhart O. 2008. Outline of the SECOQC quantum-key-distribution network in Vienna. International Journal of Quantum Information, 6(2), 209-218.
  6. Bennett, Ch. H. et al. 1992. Experimental Quantum Cryptography, J. Cryptology, 3-28.
  7. Lȕtkenhaus, N. 1996. Security against eavesdropping attacks in quantum cryptography, Phys. Rev. A 54(1), 97-111.
  8. Kollmitzer C., Pivk M. (Eds.) 2010. Applied Quantum Cryptography, Lect. Notes Phys. 797, Springer, Berlin Heidelberg.
  9. Gisin, N., Ribordy, G., Tittle, W., Zbinden, H. 2002. Quantum cryptography, Rev. Mod. Phys. 74(1), 145.
  10. Vakahitov, A., Makarov, V., Hjelme, D.R. 2001. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography, J. Mod. Opt., 48(13), 2023-2038.
  11. Makarov, V., Hjelme, D.R. 2005. Faked states attack on quantum cryptosystems, Journal of Modern Optics, 52(5), 691-705.
  12. Muhammad, N.A., Zukarnain, Z.A. 2009. Implementation of BB84 Quantum Key Distribution Protocol’s with Attacks, European Journal of Scientific Research, 32(4), 460-466.
Index Terms

Computer Science
Information Sciences

Keywords

Quantum cryptography QKD BB84 Intercept/Resend