Quantum Key Distribution: Simulation and Characterizations
All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a s...
Uloženo v:
| Vydáno v: | Procedia computer science Ročník 65; s. 701 - 710 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
2015
|
| Témata: | |
| ISSN: | 1877-0509, 1877-0509 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a secure key agreement by using quantum mechanical systems. QKD becomes a significant trend of new cryptographic revolution. This paper explains how cryptography exploits the quantum mechanics in order to achieve an encryption/decryption process. Additionally, this paper provides a standard simulation for QKD-BB84 protocol and describes improvement key generation and key distribution mechanisms. Then, validation, results and efficiency of BB84 protocol are presented using different security configurations. Finally, our results indicated that the QKD is susceptible to corporate with different security applications and achieve the key availability for such applications. However, it suffers from the higher rate of authentication cost. |
|---|---|
| AbstractList | All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks). Therefore, nowadays Quantum Key Distribution (QKD) promises a secure key agreement by using quantum mechanical systems. QKD becomes a significant trend of new cryptographic revolution. This paper explains how cryptography exploits the quantum mechanics in order to achieve an encryption/decryption process. Additionally, this paper provides a standard simulation for QKD-BB84 protocol and describes improvement key generation and key distribution mechanisms. Then, validation, results and efficiency of BB84 protocol are presented using different security configurations. Finally, our results indicated that the QKD is susceptible to corporate with different security applications and achieve the key availability for such applications. However, it suffers from the higher rate of authentication cost. |
| Author | El-Horbaty, El-Sayed M. Jasim, Omer K. Salem, Abdel-Badeeh M. Abbas, Safia |
| Author_xml | – sequence: 1 givenname: Omer K. surname: Jasim fullname: Jasim, Omer K. email: omer.k.jasim@ieee.org organization: Ph.D. student, Al-Ma’arif University College, Anabr, +964, Iraq – sequence: 2 givenname: Safia surname: Abbas fullname: Abbas, Safia organization: Faculty of Computer and Information Sciences, Ain Shams University – sequence: 3 givenname: El-Sayed M. surname: El-Horbaty fullname: El-Horbaty, El-Sayed M. organization: Faculty of Computer and Information Sciences, Ain Shams University – sequence: 4 givenname: Abdel-Badeeh M. surname: Salem fullname: Salem, Abdel-Badeeh M. organization: Faculty of Computer and Information Sciences, Ain Shams University |
| BookMark | eNqFkM9KAzEQh4NUsNY-gZd9gV0nze4mKXiQ-hcLIvYessksprS7JckK9endbj2IB53Lbxj4hpnvnIyatkFCLilkFGh5tc52vjUhmwEtMpAZ0PyEjKngPIUC5OhHf0amIayhLyaEpHxM5q-dbmK3TZ5xn9y6EL2ruujaZp68uW230Yc-0Y1NFu_aaxPRu89hGC7Iaa03AaffOSGr-7vV4jFdvjw8LW6WqWG5iKnOsYKScppLrpkxua1mUAlbgOXIiz5BgKylsLVkUpaSFsg0rXEGBZbAJoQd1xrfhuCxVjvvttrvFQV1EKDWahCgDgIUSNUL6Cn5izIuDndHr93mH_b6yGL_1YdDr4Jx2Bi0zqOJyrbuT_4LuJx6OQ |
| CitedBy_id | crossref_primary_10_1016_j_cosrev_2025_100752 crossref_primary_10_1007_s11128_016_1474_x crossref_primary_10_1088_1742_6596_2335_1_012056 crossref_primary_10_1038_srep28767 crossref_primary_10_1007_s11701_025_02333_1 crossref_primary_10_1103_PhysRevApplied_14_024036 crossref_primary_10_1016_j_procs_2024_01_163 crossref_primary_10_3390_s22166284 crossref_primary_10_1186_s40854_025_00751_6 crossref_primary_10_1007_s10773_016_2986_y |
| Cites_doi | 10.1109/GLOCOM.2012.6503238 10.1109/ICIINFS.2011.6038114 10.1109/CyberSec.2014.6913970 |
| ContentType | Journal Article |
| Copyright | 2015 The Authors |
| Copyright_xml | – notice: 2015 The Authors |
| DBID | 6I. AAFTH AAYXX CITATION |
| DOI | 10.1016/j.procs.2015.09.014 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1877-0509 |
| EndPage | 710 |
| ExternalDocumentID | 10_1016_j_procs_2015_09_014 S1877050915028446 |
| GroupedDBID | --K 0R~ 0SF 1B1 457 5VS 6I. 71M AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAQFI AAXUO ABMAC ACGFS ADBBV ADEZE AEXQZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ E3Z EBS EJD EP3 FDB FNPLU HZ~ IXB KQ8 M41 M~E NCXOZ O-L O9- OK1 P2P RIG ROL SES SSZ 9DU AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO ADVLN AEUPX AFPUW AIGII AKBMS AKRWK AKYEP CITATION ~HD |
| ID | FETCH-LOGICAL-c348t-a4eb06171497a3cc4db20b8d50d7e75d500809f98df93996915e3a1fe205e603 |
| ISICitedReferencesCount | 12 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000373831000078&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1877-0509 |
| IngestDate | Sat Nov 29 07:47:18 EST 2025 Tue Nov 18 22:09:42 EST 2025 Wed May 17 01:33:30 EDT 2023 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | encryption/decryption algorithms BB84 QKD qubit Key distribution secure communication |
| Language | English |
| License | http://creativecommons.org/licenses/by-nc-nd/4.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c348t-a4eb06171497a3cc4db20b8d50d7e75d500809f98df93996915e3a1fe205e603 |
| OpenAccessLink | https://dx.doi.org/10.1016/j.procs.2015.09.014 |
| PageCount | 10 |
| ParticipantIDs | crossref_primary_10_1016_j_procs_2015_09_014 crossref_citationtrail_10_1016_j_procs_2015_09_014 elsevier_sciencedirect_doi_10_1016_j_procs_2015_09_014 |
| PublicationCentury | 2000 |
| PublicationDate | 2015 2015-00-00 |
| PublicationDateYYYYMMDD | 2015-01-01 |
| PublicationDate_xml | – year: 2015 text: 2015 |
| PublicationDecade | 2010 |
| PublicationTitle | Procedia computer science |
| PublicationYear | 2015 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Matthew P., Caleb H., Lamas L., Christian K., Daylight operation of a free space, entanglement-based quantum key distribution system, Centre for Quantum Technologies, National University of Singapore, 2008. Marcin Niemiec and Andrzej R. Pach, The measure of security in quantum cryptography, IEEE Global Communications Conference (GLOBECOM), 967-972,2012. Mohsen Sharifi1 (bib0030) 2007; 7 Sufyan T. Faraj Al-Janabi, Omar Kareem Jasim,” Reducing the Authentication Cost in QuantumCryptography”,http://www.cms.livjm.ac.uk/pgnet2011/Proceedings/Papers/m1569449 157-al-janabi. http ://www.queenslandrail.com.au/NetworkServices/DownloadsandRailSystemMaps/Freight/Pages/WestMoretonSystem.aspx. Omer Abd Al Kareem Jasim, Anas Ayad Abdulrazzaq, The Goals of Parity Bits in Quantum Key Distribution System, International Journal of Computer Applications (0975-8887) Volume 56– No.18, 2012. Rishi Dutt Sharma, Asok De, A New Secure Model for Quantum KeyDistribution Protocol, 6th International Conference on Industrial and Information Systems, ICIIS 2011, Aug. 16-19, 2011, Sri Lanka. Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Statistical Analysis for Random Bits Generation on Quantum Key Distribution”, 3rd IEEE- Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), ISBN: 978-1-4799-3905-3 ©2014 IEEE, Faculty of Engineering - Lebanese University, April 2014,pp. 45-52. Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Advanced Encryption Standard Development Based Quantum Key Distribution”, the 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, Dec.,2013, pp.536-541. AmrinBanu M. Shaikh, Parth D. Shah, BB84 and Identity Based Encryption (IBE) Based A Novel Symmetric Key Distribution Algorithm, Fifth International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom, 2013. Hui Qiao, Xiao-yu Chen, Simulation of BB84 Quantum Key Distribution in depolarizing channel, Proceedings of 14th Youth Conference on Communication, 2009. G. (bib0015) 2014; 5 10.1016/j.procs.2015.09.014_bib0035 10.1016/j.procs.2015.09.014_bib0045 10.1016/j.procs.2015.09.014_bib0055 10.1016/j.procs.2015.09.014_bib0010 10.1016/j.procs.2015.09.014_bib0020 10.1016/j.procs.2015.09.014_bib0040 10.1016/j.procs.2015.09.014_bib0050 10.1016/j.procs.2015.09.014_bib0060 Mohsen Sharifi1 (10.1016/j.procs.2015.09.014_bib0030) 2007; 7 G. (10.1016/j.procs.2015.09.014_bib0015) 2014; 5 10.1016/j.procs.2015.09.014_bib0005 10.1016/j.procs.2015.09.014_bib0025 |
| References_xml | – volume: 5 year: 2014 ident: bib0015 article-title: An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model publication-title: Nature Communications Journal – reference: Hui Qiao, Xiao-yu Chen, Simulation of BB84 Quantum Key Distribution in depolarizing channel, Proceedings of 14th Youth Conference on Communication, 2009. – reference: Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Advanced Encryption Standard Development Based Quantum Key Distribution”, the 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), UK, Dec.,2013, pp.536-541. – reference: Rishi Dutt Sharma, Asok De, A New Secure Model for Quantum KeyDistribution Protocol, 6th International Conference on Industrial and Information Systems, ICIIS 2011, Aug. 16-19, 2011, Sri Lanka. – reference: Omer Abd Al Kareem Jasim, Anas Ayad Abdulrazzaq, The Goals of Parity Bits in Quantum Key Distribution System, International Journal of Computer Applications (0975-8887) Volume 56– No.18, 2012. – reference: Marcin Niemiec and Andrzej R. Pach, The measure of security in quantum cryptography, IEEE Global Communications Conference (GLOBECOM), 967-972,2012. – reference: Matthew P., Caleb H., Lamas L., Christian K., Daylight operation of a free space, entanglement-based quantum key distribution system, Centre for Quantum Technologies, National University of Singapore, 2008. – reference: Sufyan T. Faraj Al-Janabi, Omar Kareem Jasim,” Reducing the Authentication Cost in QuantumCryptography”,http://www.cms.livjm.ac.uk/pgnet2011/Proceedings/Papers/m1569449 157-al-janabi. – reference: http ://www.queenslandrail.com.au/NetworkServices/DownloadsandRailSystemMaps/Freight/Pages/WestMoretonSystem.aspx. – volume: 7 year: 2007 ident: bib0030 article-title: and Hooshang Azizi, A Simulative Comparison of BB84 Protocol with its Improved Version publication-title: JCS&T – reference: Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty and Abdel-Badeeh M. Salem, “Statistical Analysis for Random Bits Generation on Quantum Key Distribution”, 3rd IEEE- Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), ISBN: 978-1-4799-3905-3 ©2014 IEEE, Faculty of Engineering - Lebanese University, April 2014,pp. 45-52. – reference: AmrinBanu M. Shaikh, Parth D. Shah, BB84 and Identity Based Encryption (IBE) Based A Novel Symmetric Key Distribution Algorithm, Fifth International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom, 2013. – ident: 10.1016/j.procs.2015.09.014_bib0035 – ident: 10.1016/j.procs.2015.09.014_bib0060 – ident: 10.1016/j.procs.2015.09.014_bib0010 – ident: 10.1016/j.procs.2015.09.014_bib0055 doi: 10.1109/GLOCOM.2012.6503238 – ident: 10.1016/j.procs.2015.09.014_bib0045 – volume: 7 issue: 3 year: 2007 ident: 10.1016/j.procs.2015.09.014_bib0030 article-title: and Hooshang Azizi, A Simulative Comparison of BB84 Protocol with its Improved Version publication-title: JCS&T – ident: 10.1016/j.procs.2015.09.014_bib0050 doi: 10.1109/ICIINFS.2011.6038114 – volume: 5 issue: 3418 year: 2014 ident: 10.1016/j.procs.2015.09.014_bib0015 article-title: An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model publication-title: Nature Communications Journal – ident: 10.1016/j.procs.2015.09.014_bib0020 – ident: 10.1016/j.procs.2015.09.014_bib0005 doi: 10.1109/CyberSec.2014.6913970 – ident: 10.1016/j.procs.2015.09.014_bib0025 – ident: 10.1016/j.procs.2015.09.014_bib0040 |
| SSID | ssj0000388917 |
| Score | 2.119853 |
| Snippet | All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 701 |
| SubjectTerms | BB84 encryption/decryption algorithms Key distribution QKD qubit secure communication |
| Title | Quantum Key Distribution: Simulation and Characterizations |
| URI | https://dx.doi.org/10.1016/j.procs.2015.09.014 |
| Volume | 65 |
| WOSCitedRecordID | wos000373831000078&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1877-0509 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000388917 issn: 1877-0509 databaseCode: M~E dateStart: 20100101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR25TsMw1KqAgYUbcSsDGxjlrGO2UkBI3GqF2CLbcURRG1BpETAw8t08H0kLRRUMLEnj1K-N3_O78g6EtnmcgiIRZBhkb4jDKOA4Zr7EgZAuJ2APCJ1bdXNGLi7i21t6Val8FLkwz22S5_HLC338V1TDGCBbpc7-Ad0lUBiAz4B0OALa4fgrxF_3YbH6nZ1T2O2Hqiyu7WilbP9Gq2PbdemXBvWyWvPbkOPOqqo6hQCoR0edq8YPO1ZalkE37Mm0Yr7swM3TvcGbJG6yxBosa5Vc_6iNTx66nJkmBHDVYK-g7J6X0xogqjS4Gk9lGx-wVMq74r71S5icTMtEY0KwqitjZMwPY5bzVqMh1kmsU8NIYWKCXUcYvPE13CvxIlS1dS_SZWpNIurXctrfxFwZfFjEtd0nGkiigCQuTVzVD33SJ2BiqRDQ94GvTlXMobp5c_kYRQErHSo48md-VnKGFJfmHJqxFodTM5QyjyoyX0CzRTcPxzL3RbRvCccBwnGGCWffGZCNA2TjjJDNEmoeHzXrJ9h21sAiCOMeZqHkSncF85iwQIgw5b4L2zZyUyJJBGcwJGhG4zSjoMFWqRfJgHmZ9N1IVt1gGU3kD7lcQQ5AYRHNuPQzElLf56Dv8owIIj0POHq8ivxiJRJhq86r5iftZAwaVtFuOenRFF0Z__VqscSJ3QlGH0yAasZNXPvb76yjaXVlHHAbaKLX7ctNNCWee62n7pYmmU-1tY1x |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Quantum+Key+Distribution%3A+Simulation+and+Characterizations&rft.jtitle=Procedia+computer+science&rft.au=Jasim%2C+Omer+K.&rft.au=Abbas%2C+Safia&rft.au=El-Horbaty%2C+El-Sayed+M.&rft.au=Salem%2C+Abdel-Badeeh+M.&rft.date=2015&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=65&rft.spage=701&rft.epage=710&rft_id=info:doi/10.1016%2Fj.procs.2015.09.014&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2015_09_014 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon |