Simulation of Bennet and Brassard 84 protocol with Eve's attacks
A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. The simulation is divided into two categories which are without security attacks scenario and with several attacks scenario that consists of Intercept and Resend and sent new qubits. The simulation results meet...
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2014
|
Online Access: | http://psasir.upm.edu.my/id/eprint/55951/1/Simulation%20of%20Bennet%20and%20Brassard%2084%20protocol%20with%20Eve%27s%20attacks.pdf |
_version_ | 1825931319844012032 |
---|---|
author | Mohamed Halip, Nor Hafizah Mokhtar, M. Buhari, A. |
author_facet | Mohamed Halip, Nor Hafizah Mokhtar, M. Buhari, A. |
author_sort | Mohamed Halip, Nor Hafizah |
collection | UPM |
description | A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. The simulation is divided into two categories which are without security attacks scenario and with several attacks scenario that consists of Intercept and Resend and sent new qubits. The simulation results meet the theory of BB84. This project is able to provide better understanding about the quantum key distribution process especially in BB84 protocol. |
first_indexed | 2024-03-06T09:24:57Z |
format | Conference or Workshop Item |
id | upm.eprints-55951 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-03-06T09:24:57Z |
publishDate | 2014 |
publisher | IEEE |
record_format | dspace |
spelling | upm.eprints-559512017-06-30T09:56:47Z http://psasir.upm.edu.my/id/eprint/55951/ Simulation of Bennet and Brassard 84 protocol with Eve's attacks Mohamed Halip, Nor Hafizah Mokhtar, M. Buhari, A. A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. The simulation is divided into two categories which are without security attacks scenario and with several attacks scenario that consists of Intercept and Resend and sent new qubits. The simulation results meet the theory of BB84. This project is able to provide better understanding about the quantum key distribution process especially in BB84 protocol. IEEE 2014 Conference or Workshop Item PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/55951/1/Simulation%20of%20Bennet%20and%20Brassard%2084%20protocol%20with%20Eve%27s%20attacks.pdf Mohamed Halip, Nor Hafizah and Mokhtar, M. and Buhari, A. (2014) Simulation of Bennet and Brassard 84 protocol with Eve's attacks. In: 5th International Conference on Photonics (ICP 2014), 2-4 Sept. 2014, Palace of the Golden Horses, Kuala Lumpur, Malaysia. (pp. 29-31). 10.1109/ICP.2014.7002301 |
spellingShingle | Mohamed Halip, Nor Hafizah Mokhtar, M. Buhari, A. Simulation of Bennet and Brassard 84 protocol with Eve's attacks |
title | Simulation of Bennet and Brassard 84 protocol with Eve's attacks |
title_full | Simulation of Bennet and Brassard 84 protocol with Eve's attacks |
title_fullStr | Simulation of Bennet and Brassard 84 protocol with Eve's attacks |
title_full_unstemmed | Simulation of Bennet and Brassard 84 protocol with Eve's attacks |
title_short | Simulation of Bennet and Brassard 84 protocol with Eve's attacks |
title_sort | simulation of bennet and brassard 84 protocol with eve s attacks |
url | http://psasir.upm.edu.my/id/eprint/55951/1/Simulation%20of%20Bennet%20and%20Brassard%2084%20protocol%20with%20Eve%27s%20attacks.pdf |
work_keys_str_mv | AT mohamedhalipnorhafizah simulationofbennetandbrassard84protocolwithevesattacks AT mokhtarm simulationofbennetandbrassard84protocolwithevesattacks AT buharia simulationofbennetandbrassard84protocolwithevesattacks |