Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3

dc.contributor.authorAdu-Kyere Akwasi
dc.contributor.authorNigussie Ethiopia
dc.contributor.authorIsoaho Jouni
dc.contributor.organizationfi=kyberturvallisuusteknologia|en=Cyber Security Engineering|
dc.contributor.organizationfi=tietotekniikan laitos|en=Department of Computing|
dc.contributor.organization-code1.2.246.10.2458963.20.28753843706
dc.contributor.organization-code1.2.246.10.2458963.20.85312822902
dc.converis.publication-id176413593
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/176413593
dc.date.accessioned2022-10-28T13:51:29Z
dc.date.available2022-10-28T13:51:29Z
dc.description.abstract<p>Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenberg’s uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent.<br></p>
dc.identifier.jour-issn1424-8220
dc.identifier.olddbid184779
dc.identifier.oldhandle10024/167873
dc.identifier.urihttps://www.utupub.fi/handle/11111/40323
dc.identifier.urlhttps://www.mdpi.com/1424-8220/22/16/6284
dc.identifier.urnURN:NBN:fi-fe2022102463134
dc.language.isoen
dc.okm.affiliatedauthorAdu-Kyere, Akwasi
dc.okm.affiliatedauthorNigussie, Ethiopia
dc.okm.affiliatedauthorIsoaho, Jouni
dc.okm.discipline213 Electronic, automation and communications engineering, electronicsen_GB
dc.okm.discipline213 Sähkö-, automaatio- ja tietoliikennetekniikka, elektroniikkafi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisherMDPI
dc.publisher.countrySwitzerlanden_GB
dc.publisher.countrySveitsifi_FI
dc.publisher.country-codeCH
dc.relation.articlenumber6284
dc.relation.doi10.3390/s22166284
dc.relation.ispartofjournalSensors
dc.relation.issue16
dc.relation.volume22
dc.source.identifierhttps://www.utupub.fi/handle/10024/167873
dc.titleQuantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
dc.year.issued2022

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
sensors-22-06284.pdf
Size:
2.51 MB
Format:
Adobe Portable Document Format