Quantum Key Distribution: Simulation and Characterizations

All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a s...

Full description

Saved in:
Bibliographic Details
Published in:Procedia computer science Vol. 65; pp. 701 - 710
Main Authors: Jasim, Omer K., Abbas, Safia, El-Horbaty, El-Sayed M., Salem, Abdel-Badeeh M.
Format: Journal Article
Language:English
Published: Elsevier B.V 2015
Subjects:
ISSN:1877-0509, 1877-0509
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a secure key agreement by using quantum mechanical systems. QKD becomes a significant trend of new cryptographic revolution. This paper explains how cryptography exploits the quantum mechanics in order to achieve an encryption/decryption process. Additionally, this paper provides a standard simulation for QKD-BB84 protocol and describes improvement key generation and key distribution mechanisms. Then, validation, results and efficiency of BB84 protocol are presented using different security configurations. Finally, our results indicated that the QKD is susceptible to corporate with different security applications and achieve the key availability for such applications. However, it suffers from the higher rate of authentication cost.
AbstractList All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a secure key agreement by using quantum mechanical systems. QKD becomes a significant trend of new cryptographic revolution. This paper explains how cryptography exploits the quantum mechanics in order to achieve an encryption/decryption process. Additionally, this paper provides a standard simulation for QKD-BB84 protocol and describes improvement key generation and key distribution mechanisms. Then, validation, results and efficiency of BB84 protocol are presented using different security configurations. Finally, our results indicated that the QKD is susceptible to corporate with different security applications and achieve the key availability for such applications. However, it suffers from the higher rate of authentication cost.
Author El-Horbaty, El-Sayed M.
Jasim, Omer K.
Salem, Abdel-Badeeh M.
Abbas, Safia
Author_xml – sequence: 1
  givenname: Omer K.
  surname: Jasim
  fullname: Jasim, Omer K.
  email: omer.k.jasim@ieee.org
  organization: Ph.D. student, Al-Ma’arif University College, Anabr, +964, Iraq
– sequence: 2
  givenname: Safia
  surname: Abbas
  fullname: Abbas, Safia
  organization: Faculty of Computer and Information Sciences, Ain Shams University
– sequence: 3
  givenname: El-Sayed M.
  surname: El-Horbaty
  fullname: El-Horbaty, El-Sayed M.
  organization: Faculty of Computer and Information Sciences, Ain Shams University
– sequence: 4
  givenname: Abdel-Badeeh M.
  surname: Salem
  fullname: Salem, Abdel-Badeeh M.
  organization: Faculty of Computer and Information Sciences, Ain Shams University
BookMark eNqFkM9KAzEQh4NUsNY-gZd9gV0nze4mKXiQ-hcLIvYessksprS7JckK9endbj2IB53Lbxj4hpnvnIyatkFCLilkFGh5tc52vjUhmwEtMpAZ0PyEjKngPIUC5OhHf0amIayhLyaEpHxM5q-dbmK3TZ5xn9y6EL2ruujaZp68uW230Yc-0Y1NFu_aaxPRu89hGC7Iaa03AaffOSGr-7vV4jFdvjw8LW6WqWG5iKnOsYKScppLrpkxua1mUAlbgOXIiz5BgKylsLVkUpaSFsg0rXEGBZbAJoQd1xrfhuCxVjvvttrvFQV1EKDWahCgDgIUSNUL6Cn5izIuDndHr93mH_b6yGL_1YdDr4Jx2Bi0zqOJyrbuT_4LuJx6OQ
CitedBy_id crossref_primary_10_1016_j_cosrev_2025_100752
crossref_primary_10_1007_s11128_016_1474_x
crossref_primary_10_1088_1742_6596_2335_1_012056
crossref_primary_10_1038_srep28767
crossref_primary_10_1007_s11701_025_02333_1
crossref_primary_10_1103_PhysRevApplied_14_024036
crossref_primary_10_1016_j_procs_2024_01_163
crossref_primary_10_3390_s22166284
crossref_primary_10_1186_s40854_025_00751_6
crossref_primary_10_1007_s10773_016_2986_y
Cites_doi 10.1109/GLOCOM.2012.6503238
10.1109/ICIINFS.2011.6038114
10.1109/CyberSec.2014.6913970
ContentType Journal Article
Copyright 2015 The Authors
Copyright_xml – notice: 2015 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.procs.2015.09.014
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1877-0509
EndPage 710
ExternalDocumentID 10_1016_j_procs_2015_09_014
S1877050915028446
GroupedDBID --K
0R~
0SF
1B1
457
5VS
6I.
71M
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAQFI
AAXUO
ABMAC
ACGFS
ADBBV
ADEZE
AEXQZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
E3Z
EBS
EJD
EP3
FDB
FNPLU
HZ~
IXB
KQ8
M41
M~E
NCXOZ
O-L
O9-
OK1
P2P
RIG
ROL
SES
SSZ
9DU
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEUPX
AFPUW
AIGII
AKBMS
AKRWK
AKYEP
CITATION
~HD
ID FETCH-LOGICAL-c348t-a4eb06171497a3cc4db20b8d50d7e75d500809f98df93996915e3a1fe205e603
ISICitedReferencesCount 12
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000373831000078&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1877-0509
IngestDate Sat Nov 29 07:47:18 EST 2025
Tue Nov 18 22:09:42 EST 2025
Wed May 17 01:33:30 EDT 2023
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords encryption/decryption algorithms
BB84
QKD
qubit
Key distribution
secure communication
Language English
License http://creativecommons.org/licenses/by-nc-nd/4.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c348t-a4eb06171497a3cc4db20b8d50d7e75d500809f98df93996915e3a1fe205e603
OpenAccessLink https://dx.doi.org/10.1016/j.procs.2015.09.014
PageCount 10
ParticipantIDs crossref_primary_10_1016_j_procs_2015_09_014
crossref_citationtrail_10_1016_j_procs_2015_09_014
elsevier_sciencedirect_doi_10_1016_j_procs_2015_09_014
PublicationCentury 2000
PublicationDate 2015
2015-00-00
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – year: 2015
  text: 2015
PublicationDecade 2010
PublicationTitle Procedia computer science
PublicationYear 2015
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Matthew P., Caleb H., Lamas L., Christian K., Daylight operation of a free space, entanglement-based quantum key distribution system, Centre for Quantum Technologies, National University of Singapore, 2008.
Marcin Niemiec and Andrzej R. Pach, The measure of security in quantum cryptography, IEEE Global Communications Conference (GLOBECOM), 967-972,2012.
Mohsen Sharifi1 (bib0030) 2007; 7
Sufyan T. Faraj Al-Janabi, Omar Kareem Jasim,” Reducing the Authentication Cost in QuantumCryptography”,http://www.cms.livjm.ac.uk/pgnet2011/Proceedings/Papers/m1569449 157-al-janabi.
http ://www.queenslandrail.com.au/NetworkServices/DownloadsandRailSystemMaps/Freight/Pages/WestMoretonSystem.aspx.
Omer Abd Al Kareem Jasim, Anas Ayad Abdulrazzaq, The Goals of Parity Bits in Quantum Key Distribution System, International Journal of Computer Applications (0975-8887) Volume 56– No.18, 2012.
Rishi Dutt Sharma, Asok De, A New Secure Model for Quantum KeyDistribution Protocol, 6th International Conference on Industrial and Information Systems, ICIIS 2011, Aug. 16-19, 2011, Sri Lanka.
Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Statistical Analysis for Random Bits Generation on Quantum Key Distribution”, 3rd IEEE- Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), ISBN: 978-1-4799-3905-3 ©2014 IEEE, Faculty of Engineering - Lebanese University, April 2014,pp. 45-52.
Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Advanced Encryption Standard Development Based Quantum Key Distribution”, the 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, Dec.,2013, pp.536-541.
AmrinBanu M. Shaikh, Parth D. Shah, BB84 and Identity Based Encryption (IBE) Based A Novel Symmetric Key Distribution Algorithm, Fifth International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom, 2013.
Hui Qiao, Xiao-yu Chen, Simulation of BB84 Quantum Key Distribution in depolarizing channel, Proceedings of 14th Youth Conference on Communication, 2009.
G. (bib0015) 2014; 5
10.1016/j.procs.2015.09.014_bib0035
10.1016/j.procs.2015.09.014_bib0045
10.1016/j.procs.2015.09.014_bib0055
10.1016/j.procs.2015.09.014_bib0010
10.1016/j.procs.2015.09.014_bib0020
10.1016/j.procs.2015.09.014_bib0040
10.1016/j.procs.2015.09.014_bib0050
10.1016/j.procs.2015.09.014_bib0060
Mohsen Sharifi1 (10.1016/j.procs.2015.09.014_bib0030) 2007; 7
G. (10.1016/j.procs.2015.09.014_bib0015) 2014; 5
10.1016/j.procs.2015.09.014_bib0005
10.1016/j.procs.2015.09.014_bib0025
References_xml – volume: 5
  year: 2014
  ident: bib0015
  article-title: An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model
  publication-title: Nature Communications Journal
– reference: Hui Qiao, Xiao-yu Chen, Simulation of BB84 Quantum Key Distribution in depolarizing channel, Proceedings of 14th Youth Conference on Communication, 2009.
– reference: Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Advanced Encryption Standard Development Based Quantum Key Distribution”, the 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, Dec.,2013, pp.536-541.
– reference: Rishi Dutt Sharma, Asok De, A New Secure Model for Quantum KeyDistribution Protocol, 6th International Conference on Industrial and Information Systems, ICIIS 2011, Aug. 16-19, 2011, Sri Lanka.
– reference: Omer Abd Al Kareem Jasim, Anas Ayad Abdulrazzaq, The Goals of Parity Bits in Quantum Key Distribution System, International Journal of Computer Applications (0975-8887) Volume 56– No.18, 2012.
– reference: Marcin Niemiec and Andrzej R. Pach, The measure of security in quantum cryptography, IEEE Global Communications Conference (GLOBECOM), 967-972,2012.
– reference: Matthew P., Caleb H., Lamas L., Christian K., Daylight operation of a free space, entanglement-based quantum key distribution system, Centre for Quantum Technologies, National University of Singapore, 2008.
– reference: Sufyan T. Faraj Al-Janabi, Omar Kareem Jasim,” Reducing the Authentication Cost in QuantumCryptography”,http://www.cms.livjm.ac.uk/pgnet2011/Proceedings/Papers/m1569449 157-al-janabi.
– reference: http ://www.queenslandrail.com.au/NetworkServices/DownloadsandRailSystemMaps/Freight/Pages/WestMoretonSystem.aspx.
– volume: 7
  year: 2007
  ident: bib0030
  article-title: and Hooshang Azizi, A Simulative Comparison of BB84 Protocol with its Improved Version
  publication-title: JCS&T
– reference: Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Statistical Analysis for Random Bits Generation on Quantum Key Distribution”, 3rd IEEE- Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), ISBN: 978-1-4799-3905-3 ©2014 IEEE, Faculty of Engineering - Lebanese University, April 2014,pp. 45-52.
– reference: AmrinBanu M. Shaikh, Parth D. Shah, BB84 and Identity Based Encryption (IBE) Based A Novel Symmetric Key Distribution Algorithm, Fifth International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom, 2013.
– ident: 10.1016/j.procs.2015.09.014_bib0035
– ident: 10.1016/j.procs.2015.09.014_bib0060
– ident: 10.1016/j.procs.2015.09.014_bib0010
– ident: 10.1016/j.procs.2015.09.014_bib0055
  doi: 10.1109/GLOCOM.2012.6503238
– ident: 10.1016/j.procs.2015.09.014_bib0045
– volume: 7
  issue: 3
  year: 2007
  ident: 10.1016/j.procs.2015.09.014_bib0030
  article-title: and Hooshang Azizi, A Simulative Comparison of BB84 Protocol with its Improved Version
  publication-title: JCS&T
– ident: 10.1016/j.procs.2015.09.014_bib0050
  doi: 10.1109/ICIINFS.2011.6038114
– volume: 5
  issue: 3418
  year: 2014
  ident: 10.1016/j.procs.2015.09.014_bib0015
  article-title: An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model
  publication-title: Nature Communications Journal
– ident: 10.1016/j.procs.2015.09.014_bib0020
– ident: 10.1016/j.procs.2015.09.014_bib0005
  doi: 10.1109/CyberSec.2014.6913970
– ident: 10.1016/j.procs.2015.09.014_bib0025
– ident: 10.1016/j.procs.2015.09.014_bib0040
SSID ssj0000388917
Score 2.119853
Snippet All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 701
SubjectTerms BB84
encryption/decryption algorithms
Key distribution
QKD
qubit
secure communication
Title Quantum Key Distribution: Simulation and Characterizations
URI https://dx.doi.org/10.1016/j.procs.2015.09.014
Volume 65
WOSCitedRecordID wos000373831000078&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1877-0509
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000388917
  issn: 1877-0509
  databaseCode: M~E
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwELYq4LAXnrvirRy4gVGa2LHNjaeQEC-1B26R4zjaojag0iJ2D3vc3834kbRQVMGBS9o4tdtmxvPKzDcI7RCVMCKJxjnLIkxApWLepBKzmFi8pySMC9tsgl1d8bs7cdNo_K9qYZ67rCz5y4t4_FZSwxgQ25TOfoHc9aIwAO-B6HAEssPxU4S_HcLNGvZ2L2C3nxhYXN_Ryvj-rU7Pt-uyDw2Oa7Tmv2OBO2-q2hIC4B6bdW4aP-x6bVkn3cgn14r5ugcXL_ZHT5IyVyXWkkWnlvqnXXz-0M-ka0IAZy35B4zdy3paC1SVXe4wy3UXH8lc69_VdR-XcDWZXohyxrDBlXE65oMxL3kTOiY6mQ9qOC3MXLLrhIB3sYZ7o16UQVtvUgtT6wpR38Jpv1NzdfJhldd2n9pFUrNIGoo0NP3QZyMGLpZJAf03itUZxBxhmzfXf6MCsLKpghM_5mMjZ8xwaS-iee9xBIeOU5ZQQ5fLaKHq5hF44b6CDjzjBMA4wTjjHAQjtgmAbYIJtvmJ2men7eNz7DtrYBUTPsCwOTNju4J7zGSsFMmzKMx4TsOcaUbhFRwJUQieFwIs2EQ0qY5ls9BRSDVs319opnwo9SoKQk6opJzL2KSoKp4JUhCpkyIHx52pYg1F1Z1IlUedN81PuukUMqyhvXrSowNdmf7xpLrFqd8Jzh5MgWumTVz_2vdsoB_mzAXgNtHMoD_UW2hOPQ86T_1tyzKv8YqM5g
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Quantum+Key+Distribution%3A+Simulation+and+Characterizations&rft.jtitle=Procedia+computer+science&rft.au=Jasim%2C+Omer+K.&rft.au=Abbas%2C+Safia&rft.au=El-Horbaty%2C+El-Sayed+M.&rft.au=Salem%2C+Abdel-Badeeh+M.&rft.date=2015&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=65&rft.spage=701&rft.epage=710&rft_id=info:doi/10.1016%2Fj.procs.2015.09.014&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2015_09_014
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon