Abstract

Cryptography is an unexpected revolution in information security in the recent decades, where remarkable improvements have been created to provide confidentiality and integrity. Quantum cryptography is one such improvement that has grown rapidly since the first announced protocol. Quantum cryptography contains substantial elements that must be addressed to ensure secure communication between legitimate parties. Quantum key distribution (QKD), a technique for creating a secret key, is one of the most interesting areas in quantum cryptography. This paper reviews some well-known quantum key distribution techniques that have been demonstrated in the past three decades. Furthermore, this paper discusses the process of creating a secret key using quantum mechanics and cryptography methods. Moreover, it explains the relationships between many basic aspects of QKD protocols and suggests some improvements in the cryptosystem. An accurate quantitative comparison between the QKD protocols is presented, especially the runtime execution for each QKD protocol. In addition, the paper will demonstrate a general model of each considered QKD protocol based on security principles.

Highlights

  • For several years, cryptographers have experimented with encryption/decryption techniques to create effective and robust methods to secure communications between two or more legitimate entities

  • This paper presents a set of Quantum key distribution (QKD) protocols over a period of time, as QKD is a new generation of cryptography in the information theory world

  • The explanation of ambiguous ideas was clearly discovered in this study to show the mechanism of each QKD protocol

Read more

Summary

Introduction

Cryptographers have experimented with encryption/decryption techniques to create effective and robust methods to secure communications between two or more legitimate entities. Cryptography 2022, 6, 12 are processed using a quantum system [6] This quantum system operates based on the principles of physics and generates a secret key that is shared between communicating parties. Quantum computers are light years away from today’s technology, current cryptologists are exploring the impacts of this future technology, especially by breaking the current cryptosystem, which is based on prime factors of large numbers, such as ECC and RSA. These impacts are a threat to cryptography elements such as confidentiality, data integrity, and authentication (digital signature). Many interesting QKD protocols have been announced in the quantum cryptography world, these QKD protocols determine the most applicable and well-known protocols

Literature Review
Classical Cryptography
The BBB84 Protocol
3: When the n-qubits string
4: Both and Alice
Alice by andEve bobto
5: Afterkeys matching the
Alice compare and
The SARG04 Protocol
The B92 Protocol
Two bases used
1: The length
2: Both randomly choose communicators
Alice compare and half
Shared keyssecret
The S13 Protocol
The Differential-Phase-Shift Protocol
The QKD Protocols Features Based on Quantum Computing
States
Runtime Analysis of QKD Protocols
Runtime
13. Runtime inEPR the after
Initiate n Qubits
Comparison between QKD Protocols
Conclusions
Findings
12. Available online
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call