Näytä suppeat kuvailutiedot

Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3

Isoaho Jouni; Adu-Kyere Akwasi; Nigussie Ethiopia

dc.contributor.authorIsoaho Jouni
dc.contributor.authorAdu-Kyere Akwasi
dc.contributor.authorNigussie Ethiopia
dc.date.accessioned2022-10-28T13:51:29Z
dc.date.available2022-10-28T13:51:29Z
dc.identifier.urihttps://www.utupub.fi/handle/10024/167873
dc.description.abstract<p>Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenberg’s uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent.<br></p>
dc.language.isoen
dc.publisherMDPI
dc.titleQuantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
dc.identifier.urlhttps://www.mdpi.com/1424-8220/22/16/6284
dc.identifier.urnURN:NBN:fi-fe2022102463134
dc.relation.volume22
dc.contributor.organizationfi=tietotekniikan laitoksen yhteiset|en=Tietotekniikan laitoksen yhteiset|
dc.contributor.organizationfi=tietoliikenne ja kyberturvallisuus|en=Tietoliikenne ja kyberturvallisuus|
dc.contributor.organization-code2610300
dc.contributor.organization-code2610304
dc.converis.publication-id176413593
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/176413593
dc.identifier.jour-issn1424-8220
dc.okm.affiliatedauthorNigussie, Ethiopia
dc.okm.affiliatedauthorIsoaho, Jouni
dc.okm.affiliatedauthorAdu-Kyere, Akwasi
dc.okm.discipline213 Sähkö-, automaatio- ja tietoliikennetekniikka, elektroniikkafi_FI
dc.okm.discipline213 Electronic, automation and communications engineering, electronicsen_GB
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeJournal article
dc.publisher.countrySwitzerlanden_GB
dc.publisher.countrySveitsifi_FI
dc.publisher.country-codeCH
dc.relation.articlenumber6284
dc.relation.doi10.3390/s22166284
dc.relation.ispartofjournalSensors
dc.relation.issue16
dc.year.issued2022


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot