The proposed article is devoted to the analysis of quantum key distribution protocols based on the Heisenberg uncertainty. The peculiarity of this topic lies in the fact that modern methods of key distribution, which use classical calculations at their core, have significant drawbacks, in contrast to quantum key distribution. This problem concerns all types of algorithms and systems for encrypting secret information, both symmetric encryption with a private key and asymmetric encryption with a public key. An example is that in a communication channel protected by quantum key distributions, it is possible to detect an interceptor between two legal network entities using the principles laid down in quantum physics at the beginning of the last century. Principles and theorems such as the Heisenberg principle, quantum entanglement, superposition, quantum teleportation, and the no-cloning theorem. The field of study of this topic is a promising and rapidly developing area in the field of information security and information protection. There are already created commercial products with the implementation of some of the quantum key distribution protocols. Many of the created products are used in various spheres of human activity. The relevance of applying quantum key distribution protocols under ideal conditions without taking into account errors in the form of quantum noise is analyzed. The implementation of two quantum key distribution protocols based on the Heisenberg uncertainty principle is demonstrated, as well as the results of the appearance of keys and the probability of occurrence of each of them. The purpose of the article is aimed at analyzing and researching quantum key distribution protocols based on Heisenberg uncertainty. The article discusses the advantages and disadvantages of the BB84, B92 quantum key distribution protocols.
Read full abstract