SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 5, October 2018, pp. 2988~2993
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i5.pp2988-2993  2988
Journal homepage: http://iaescore.com/journals/index.php/IJECE
BB84 with Both Several Cloning and Intercept-resend Attacks
Mustapha Dehmani, El Mehdi Salmani, Hamid Ez-Zahraouy, Abdelilah Benyoussef
Laboratoire de Matière Condensée et Sciences Interdisciplinaires, Faculté des Sciences,
Université Mohammed V-Agdal, Morocco
Article Info ABSTRACT
Article history:
Received Dec 11, 2017
Revised Apr 25, 2018
Accepted Jul 9, 2018
The goal of the protocol QKD BB84 is to allow a transmitter and a receiver
which uses a quantum channel to exchange their keys and to detect the
presence of eavesdropping attacks. In the present research, we investigate the
effect of several eavesdroppers with both intercept-resend and cloning
attacks. We will propose the different possible cases of the positioning of the
eavesdroppers and their strategies of attacks; also we will calculate the
mutual information for each case. The explicit expressions of the mutual
information and quantum error clearly show that the security of the
exchanged information depends on the numbers of the eavesdroppers and
their attacks parameters on the quantum channel.
Keyword:
Cloning attacks
Eavesdroppers
Intercept-resend attacks
Quantum cryptography
Quantum error Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Mustapha Dehmani,
Laboratoire de Matière Condensée et Sciences Interdisciplinaires,
Faculté des Sciences, Université Mohammed V-Agdal, Rabat, Morocco.
Email: dehmani01@yahoo.fr
1. INTRODUCTION
The theory of information introduced by Claude Shannon in the forties [1],[2] is strongly exploited
in quantum information specially the cryptography. The field of quantum information is always very young
and it develops with great speed by comparing with the other axes of research theoretical and experimental.
This is possible as a result of the experiments of quantum optics: Schrödinger's cats can be created and
observed [3],[4],[5]. These developments certainly seemed impossible before the founders of quantum
mechanics. Many scientific deceplins use quantum fundamentals to develop its techniques and algorithms
[6]. There is also a design tool for quantum computers, since the invention of quantum error corrector codes
[7]. This gives us more hope since much is to be done in this vast field of quantum information theory.
Indeed the quantumcryptography has become a necessity with this development and BB84 is the first
protocol to have been imagined and implemented [8]. The information is coded on the polarization of single
photons, choosing two non-independent polarization basesto ensure safety.This protocol has undergone
several variants [9],[10], and has been implemented many times.Furthermore, the quantum key-policy attribute-
based encryption scheme was devellioped by using the qutrits [11].
BB84 protocol was implemented fairly quickly, first in the form of a demonstration of principle then
more operational devices [12],[13]. Quantum key distribution, often simply called quantum cryptography, is
currently the only domain of quantum information where commercial systems are available.The development
of cryptographic systems in the presence of noise has also stimulated research into classical information
processing algorithms useful in quantum cryptography, such as reconciliation and privacy enhancement
algorithms [14],[15],[16].
Other key distribution protocols have been proposed, either with qubits [12], or more recently with
continuous variables. Other cryptographic applications have been studied, such as secret sharing or the
Byzantine chord problem. The more specific exploitation of quantum entanglement has also led to dense
coding [17], quantum teleportation [18] and other applications, also recently a new stady of Quantum
Int J Elec& Comp Eng ISSN: 2088-8708 
BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani)
2989
password sharing scheme using trusted servers is published [19]. In a previous work, we have presented the
quantum key distribution with several intercept and resend attacks [20] and with several cloning attacks [21],
and we have investigated the cases of quantum key distribution with several attacks via a depolarizing
channel [22] [23] and partially non-orthogonal basis states [24]. Our aim in this paper is to study the effect of
two groups of eavesdropping strategy; intercept-resend and cloning attacks on the behaviour of the mutual
information between honest parties and the quantum error rate within the BB84 protocol. The paper is
organized as follows. The protocol is detailed in section 2. Section 3 is devoted to the results and discussion,
while section 4 is reserved for the conclusion.
2. RESEARCH METHOD
The quantum key distribution (QKD) can use several photon properties for the purpose of encoding
information such as polarization, phase, quantum correlations or wavelength. The only requirement on
quantum states is that they belong to mutually non-orthogonal Hilbert space basis. We use the polarization
coding and we consider two bases: the first called rectilinear is represented by the Horizontal and Vertical
polarization H , V and the second is called diagonal and is generated by 45° of polarization A and 135°
D
( )VHA +=
2
2 and ( )VHD −=
2
2
These four states satisfy the following relations:
0== DAVH
1==== DDAAVVHH
2
12222
==== DVAVDHAH
All measurements made in the diagonal (rectilinear) base for photons prepared in the rectilinear
(diagonal) base will give random results with equal probabilities. On the other hand, measurements made in a
base identical to that of preparation of the states will produce deterministic results. At first, both parties who
wish to communicate, traditionally called Alice and Bob agree that, for example, ( H , A ) represent the "0"
value of the bit, and ( V , D ) have "1". Alice, the sender generates a sequence of random bits that she
wants to transmit randomly; independently for each bit she chooses its coding base, rectilinear or diagonal.
Subsequently, Bob receives these photons and uses a filter to read them. Nevertheless, some photons
will be useless; it is the photons that have been polarized in a different base. These photons must not be taken
into account in the key. To do this, a channel, which can be public, is used between Alice and Bob to
determine which photons are useless. In our work we shoes to study when N+S eavesdroppers
iE (i = 1,…..,N+S), were placed between Alice and Bob. These eaves droppers form two groups, each
groupwill adopt a strategy of attacks; cloning or intercept-resend attacks, according to the model represented
in Figure 1 and Figure 2.
AliceQuantum Channel Bob
E1 E2 EkEk+1 EN EN+1 EN+kEN+k+1 EN+S-1 EN+S
The N eaves dropper swith cloning attacks The S eaves dropper swith intercept-resend attacks
Figure 1. Model of N cloning attacks followed by S intercept-resend attacks
According to Figure 1, Alice send a photon polarized which represents randomly 1 or 0, with equal
probability 1/2, to Bob. Between two groups of eavesdroppers is placer on the quantum channel, the first one
use cloning attack. Each eavesdropper ),...,1( NiEi = clone with an operator U defined as:
 ISSN: 2088-8708
Int J Elec& Comp Eng, Vol. 8, No. 5, October 2018 : 2988 - 2993
2990
0000( ) ii EAEAU = and ii EAEAU 11)01( =
iE will use U in the base y which will be defined as follows:
[ ]2/,010)sin(01)cos()01(
00)00(
πθθθ ∈+=
=
iyEyAiyEyAiyEyA
yEyAyEyA
iii
ii
U
U
iθ is the cloning angle, and it defined the force of attacks.
Alice Quantum ChannelBob
E1 E2 EkEk+1 EN EN+1 EN+kEN+k+1 EN+S-1 EN+S
The N eaves dropper swith intercept-resend attacks The S eaves dropper swith cloning attacks
Figure 2. Model of N intercept-resend attacks followed by S cloning attacks
The second group use intercept-resend attacks. Each eaves dropper ),...,1( SNNiEi ++=
intercepts, with probability iω , the photon emitted by the eaves dropper 1−iE , measures its polarization state
and resends it, in its measured polarization state, to the eavesdropper 1+iE . However, in the second figure
(Figure 2) the roles of the groups of eaves droppers are reversed, ie Alice send a polarised photon and each
eavesdropper ),...,1( NiEi = from the first group intercepts the photon with probability iω and each
eavesdropper ),...,1( SNNiEi ++= from the second group use the cloning operator U defined above.
3. RESULTS AND ANALYSIS
In this section we calculate the quantum error errQ and the mutual information between Alice and
Bob and between Alice and the mth eavesdroppers defined as follow:
))0/1(()0/1())0/0(()0/0(1),( 22 ABABABAB PLogPPLogPBAI ++=
))0/1(()0/1())0/0(()0/0(1),( 22 mmmm AEAEAEAEm PLogPPLogPEAI ++=
With )0/0(1)0/1( ABAB PP −= and )0/0(1)0/1( mm AEAE PP −=
)/( AxyP is the conditional probability that Bob or mE receive a photon polarized horizontally
(vertically) y = 0,1 with respect that Alice send a photon polarized horizontally (vertically) XA = 0,1. All this
conditional probabilities depend on the models attacks described in the previous section; In fact, we will
study the quantum key distribution and the two cases will be distinguished if the group of cloning attacks is
placed first or last. The lost information between Alice and Bob corresponds to the maximum information
copied by the entire eavesdroppers:
[ ]),(),(
,1
i
mi
EAIMaxEAI
=
=
The error probability errP is given by:
∑ ≠
≠
=
=
+
−=
BA
j
i
j
i
xx
BAABBAABerr xxPxxPP
,
0
0
0
0
1
),(),(
ω
θ
ω
θ
Int J Elec& Comp Eng ISSN: 2088-8708 
BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani)
2991
The quantum error errQ is the value of the error probability errP for which ),(),( EAIBAI = . However, for
errerr QP < , ),(),( BAIEAI < , while for errerr QP > , ),(),( BAIEAI >
3.1. Quantum Key Distribution in the Presence of N Cloning Attacks Followed by S Intercept-Resend
Attacks
Based on Figure 1, the quantum error errQ and the mutual information ),( BAI between Alice and
Bob arecalculated according to conditional probability:
2/)cos(1)1(
2
12
)1/1()0/0(
1,1,..., 1 10
1
1








+








−
+
== ∏∑ ∏ ∏∑ == = +==
+−
− N
iSii
k
j
S
kl
ii
S
k
kS
kS
ABAB i
k
lj
PP θωω
If all eavesdroppers collaborate between them and use the same cloning angle θ and identical attack
probabilitiesω , )0/0(ABP will be:
( ))(cos1)
2
1(1
4
1
)1/1()0/0( θ
ω NS
ABAB PP +





−+==
Since both types of attacks act on the quantum states viheculated on the channel, the conditional
probabilities between Alice and Bob are different compared to those published in the case of several attacks
of intercept and resend only [20] or cloning only [21]. However, the mutual information ),( mEAI between
Alice and each eavesdropper mE is calculated according to conditional probability )0/0(mAEP . In fact, this
probability changes according to the position of the eavesdropper:
If Nm ≤ :
2/)sin()cos(1)1/1()0/0(
1
1








+== ∏
−
=
m
m
i
iAEAE mm
PP θθ And
( ))sin()cos(1
2
1
)1/1()0/0( 1
θθ −
+== m
AEAE mm
PP if all eaves droppers mE (with Nm < ) have the
same cloning angleθ .
These results fit perfectly with those found in the case of several cloning attacks [21] Else if Nm > : In this
case the two types of attacks will occur, and this will clearly appear in the formulas of conditional
probabilities between Alice and every eveas dropper.
2/)cos(
22
11)1/1()0/0(
1
1
1






















−+== ∏∏ =
−
=
n
i
m
m
i
i
AEAE imm
PP θ
ωω
Also, 2/)(cos
22
11)1/1()0/0(
1






















−+==
−
θ
ωω N
m
AEAE mm
PP if all eaves droppers choose identical attack
parametersθ and ω .
3.2. Quantum Key Distribution in the Presence of N Intercept-Resend Attacks Followed by S Cloning
Attacks
In this case and according to the model of Figure 2, )0/0(ABP is written in the form:
2/)cos(1)1(
2
12
)1/1()0/0(
1,1,..., 1 10
1
1








+








−
+
== ∏∑ ∏ ∏∑ == = +==
+−
− S
iNii
k
j
N
kl
ii
N
k
kN
kN
ABAB i
k
lj
PP θωω
 ISSN: 2088-8708
Int J Elec& Comp Eng, Vol. 8, No. 5, October 2018 : 2988 - 2993
2992
And if Ni ≤∀ ωω =i and θθ =j SjN ≤<∀ , ( ))(cos1)
2
1(1
4
1
)0/0( θ
ω SN
ABP +





−+=
The position of each eaves dropper mE with its strategy of attack is a decisive element for the
calculation of the conditional probabilities )0/0(mAEP and subsequently the mutual information ),( mEAI .
If Nm ≤ : All eaves droppers use intercept-resend attacks and the conditional probabilities will be identical
to those published in a previous work [20]
∑ ∏ ∏∑ −= = +=
−
=
+−
−
−
+
+
−
==
1,1,..., 1 1
1
0
1
1
)1(
2
12
2
1
)1/1()0/0(
mii
k
j
m
kl
ii
m
k
km
km
m
AEAE
k
ljmm
PP ωω
ω
Also 





−+== −1
)
2
1(
2
1
2
1
)1/1()0/0( m
AEAE mm
PP
ωω
if ωω =i Ni ≤∀
However if Nm > : The state arriving at the eaves dropper mE underwent before N intercept-resend
attacks and all mE ( with Nm > ) choose to use the cloning attacks.
2/)sin()cos()1(
2
12
1)1/1()0/0(
1
1,1,..., 1 10
1
1
















−
+
+== ∏∑ ∏ ∏∑
−
== = +==
+−
−
mi
k
ljmm
m
iNii
k
j
N
kl
ii
N
k
kN
kN
AEAE PP θθωω
Indeed in this last case if all ),...,1( NiEi = have an identical attack probability ωω =i and all
),...,1( SNNjE j ++= have an identical cloning angle θθ =j , the conditional probability )0/0(mAEP will
be: ( ))sin()cos(1)
2
1(1
2
1
)1/1()0/0( 1
θθ
ω −
+





−+== mN
AEAE mm
PP
4. CONCLUSION
We have studied the quantum key distribution of BB84 protocol in the presence of several
eavesdroppers with two different attack strategies cloning and intercept-resend attacks based on the
calculations of the quantum error errQ and the mutual information ),( BAI between Alice and Bob and
),( mEAI between Alice and each eavesdropper mE and We have detailed all the cases according to the
eavesdropping position with the attacks type used. It is clear that the attacksparameters iω and jθ , the
number of theeavesdroppers, and their positioning on the quantum channelact strongly on the information
security of the quantum key distribution
REFERENCES
[1] C. Shannon. "A Mathematical Theory of Communication", Bell System Technical Journal, 1948,vol. 27, pp. 623-
656,
[2] C. Shannon, "Communication in the Presence of Noise", Proc. IRE, 1949, vol. 37, pp. 10-21.
[3] A. Ourjoumtsev, H. Jeong, R. Tualle-Brouri, and P. Grangier, “Generation of optical Schrödinger cats from photon
number states”, Nature, 2007, vol. 448, pp. 784-786.
[4] A. Ourjoumtsev, R. Tualle-Brouri, J. Laurat, and P. Grangier, “Generating Optical Schrödinger kittens for quantum
information processing”, Science, vol. 312, pp. 83-86, 2006.
[5] S. Gleyzes, S. Kuhr, C. Guerlin, J. Bernu, S. Deléglise, U.B. Hoff, M. Brune, J.M.Raimond, and S. Haroche,”
Quantum jumps of light recording the birth and death of a photon in a cavit”, Nature, vol. 446, pp. 297-300, 2007.
[6] S. Wu, “A Quantum Chaos Clonal Multiobjective Evolutionary Method Reasearch”, Indonesian Journal of
Electrical Engineering and Computer Science, Vol. 3, No. 1, pp. 226-234, 2016.
[7] A.R. Calderbank and P.W. Shor, “Good quantum error-correcting codes exist”, Physical Review A, vol. 54, pp.
1098-1105, 1996.
Int J Elec& Comp Eng ISSN: 2088-8708 
BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani)
2993
[8] C. Bennett et G. Brassard. “Quantum Cryptography : Public Key Distribution and Coin Tossing”, IEEE Conf. on
Computers, Systems and Signal Processing, Bangalore, India p. 175 1984.
[9] C.H. Bennett. “Quantum cryptography using any two nonorthogonal states”, Phys. Rev. Lett, vol. 68, pp. 3121-
3124, 1992.
[10] D. Bruss, “Optimal Eavesdropping in Quantum Cryptography with Six States”, Phys. Rev. Lett, Vol. 81, No. 14,
pp. 3018–3021, 1998.
[11] G. Mogos “Quantum Key-Policy Attribute-Based Encryption”, Indonesian Journal of Electrical Engineering and
Computer Science, Vol. 7, No. 2, pp. 542 -550, 2017
[12] N. Gisin, G. Ribordy,W. Tittel, and H. Zbinden, “Quantum cryptography”, Review of Modern Physics, vol. 74, no.
1, pp. 145-195, 2002.
[13] P. Grangier, J. Rarity, and A. Karlsson, “Quantum interference and cryptographic keys: novel physics and
advancing technologies (QUICK)”, The European Physical Journal D, vol. 18, no. 2, pp. 139-139, 2002.
[14] U.M. Maurer, “Secret key agreement by public discussion from common information”, IEEE Transactions on
Information Theory, vol. 39, pp. 733–742, 1993
[15] G. Brassard and L. Salvail, “Secret-key reconciliation by public discussion”, In Advances in cryptology–
Eurocrypt’93, number 765 in Lecture Notes in Computer Science, pages 410–423, 1993.
[16] C. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, “Generalized privacy amplification”, IEEE Transactions
on Information Theory, vol. 41, no. 6, pp. 1915– 1935, 1995.
[17] C. Bennett and S. Wiesner, “Communication via one- and two-particle operators on Einstein-Podolsky-Rosen
states”, Physical Review Letters, vol. 69 pp. 2881– 2884, 1992.
[18] C. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W.K. Wootters, “Teleporting an unknown quantum
state via dual classical and Einstein-Podolsky-Rosen channels”, Physical Review Letters, vol. 70, pp. 1895–1899,
1993.
[19] G. Mogos, “Quantum password sharing scheme using trusted servers”, International Journal of Information &
Network Security (IJINS) Vol. 2, No. 3, pp. 203-206, 2013.
[20] H. Ez-Zahraouy and A. Benyoussef, “Quantum key distribution with several intercepts and resend attacks”, Int. J.
Mod. Phys. B, vol. 23, pp. 4755-4765, 2009.
[21] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef, “Quantum Cryptography with Several Cloning Attacks”, Journal
of Computer Science, vol. 6, pp. 684-688, 2010.
[22] M. Dehmani, H. Ez-Zahraouy , M. Errahmani and A. Benyoussef, “Quantum Key Distribution with Several
Cloning Attacks via a Depolarizing Channel”, Phys. Scr, vol. 86, 2012.
[23] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef “Quantum key distribution with several cloning attacks via a
depolarizing channel”, Journal of Russian Laser Research, vol. 36 No. 3, pp. 228-236, 2015.
[24] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef, “Quantum key distribution with several intercepts and resend
attacks with partially non-orthogonal basis states”. Optik - International Journal for Light and Electron Optics,
vol. 125, pp. 624-627, 2014.

More Related Content

What's hot

A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...ijcsit
 
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMLITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMIJNSA Journal
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12IJASCSE
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Austin Benson
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysisrik0
 
Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Alexander Decker
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...ijfcstjournal
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationMohammed Ashour
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesComputer Science Journals
 
A survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic EncryptionA survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic Encryptioniosrjce
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sIDES Editor
 
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
RSA Key Extraction via Low-Bandwidth Acoustic CryptanalysisRSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
RSA Key Extraction via Low-Bandwidth Acoustic CryptanalysisDusan Klinec
 

What's hot (20)

A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...
 
vector QUANTIZATION
vector QUANTIZATIONvector QUANTIZATION
vector QUANTIZATION
 
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMLITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
NCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based EncryptionNCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based Encryption
 
Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...Speech recognition using vector quantization through modified k means lbg alg...
Speech recognition using vector quantization through modified k means lbg alg...
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
4241
42414241
4241
 
Backpropagation for Deep Learning
Backpropagation for Deep LearningBackpropagation for Deep Learning
Backpropagation for Deep Learning
 
Vector quantization
Vector quantizationVector quantization
Vector quantization
 
Backpropagation for Neural Networks
Backpropagation for Neural NetworksBackpropagation for Neural Networks
Backpropagation for Neural Networks
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
A survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic EncryptionA survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic Encryption
 
Lecture4 xing
Lecture4 xingLecture4 xing
Lecture4 xing
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
K505028085
K505028085K505028085
K505028085
 
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
RSA Key Extraction via Low-Bandwidth Acoustic CryptanalysisRSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
 

Similar to BB84 Quantum Cryptography Protocol with Multiple Attacks

Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolPerformance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolIJAEMSJORNAL
 
THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...
THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...
THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...IJNSA Journal
 
B03250609
B03250609B03250609
B03250609theijes
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpointijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanicalijcisjournal
 
Edge detection algorithm based on quantum superposition principle and photons...
Edge detection algorithm based on quantum superposition principle and photons...Edge detection algorithm based on quantum superposition principle and photons...
Edge detection algorithm based on quantum superposition principle and photons...IJECEIAES
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolIRJET Journal
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 IJCNCJournal
 
A flexible method to create wave file features
A flexible method to create wave file features A flexible method to create wave file features
A flexible method to create wave file features IJECEIAES
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdfRichard Gill
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key DistributionXequeMateShannon
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptographyShahzad Ahmad
 
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo MethodIRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo MethodIRJET Journal
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...IOSR Journals
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONIJNSA Journal
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESIJNSA Journal
 

Similar to BB84 Quantum Cryptography Protocol with Multiple Attacks (20)

Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolPerformance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
 
2. 22796.pdf
2. 22796.pdf2. 22796.pdf
2. 22796.pdf
 
THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...
THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...
THE COORDINATE RATIOS AS A TOOL TO ANALYZE THE INTRUSION BASED ON BUŽEK-HILLE...
 
B03250609
B03250609B03250609
B03250609
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
Edge detection algorithm based on quantum superposition principle and photons...
Edge detection algorithm based on quantum superposition principle and photons...Edge detection algorithm based on quantum superposition principle and photons...
Edge detection algorithm based on quantum superposition principle and photons...
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
 
A flexible method to create wave file features
A flexible method to create wave file features A flexible method to create wave file features
A flexible method to create wave file features
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key Distribution
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
 
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo MethodIRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
IRJET- Synchronization Scheme of MIMO-OFDM using Monte Carlo Method
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

BB84 Quantum Cryptography Protocol with Multiple Attacks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 5, October 2018, pp. 2988~2993 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i5.pp2988-2993  2988 Journal homepage: http://iaescore.com/journals/index.php/IJECE BB84 with Both Several Cloning and Intercept-resend Attacks Mustapha Dehmani, El Mehdi Salmani, Hamid Ez-Zahraouy, Abdelilah Benyoussef Laboratoire de Matière Condensée et Sciences Interdisciplinaires, Faculté des Sciences, Université Mohammed V-Agdal, Morocco Article Info ABSTRACT Article history: Received Dec 11, 2017 Revised Apr 25, 2018 Accepted Jul 9, 2018 The goal of the protocol QKD BB84 is to allow a transmitter and a receiver which uses a quantum channel to exchange their keys and to detect the presence of eavesdropping attacks. In the present research, we investigate the effect of several eavesdroppers with both intercept-resend and cloning attacks. We will propose the different possible cases of the positioning of the eavesdroppers and their strategies of attacks; also we will calculate the mutual information for each case. The explicit expressions of the mutual information and quantum error clearly show that the security of the exchanged information depends on the numbers of the eavesdroppers and their attacks parameters on the quantum channel. Keyword: Cloning attacks Eavesdroppers Intercept-resend attacks Quantum cryptography Quantum error Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Mustapha Dehmani, Laboratoire de Matière Condensée et Sciences Interdisciplinaires, Faculté des Sciences, Université Mohammed V-Agdal, Rabat, Morocco. Email: dehmani01@yahoo.fr 1. INTRODUCTION The theory of information introduced by Claude Shannon in the forties [1],[2] is strongly exploited in quantum information specially the cryptography. The field of quantum information is always very young and it develops with great speed by comparing with the other axes of research theoretical and experimental. This is possible as a result of the experiments of quantum optics: Schrödinger's cats can be created and observed [3],[4],[5]. These developments certainly seemed impossible before the founders of quantum mechanics. Many scientific deceplins use quantum fundamentals to develop its techniques and algorithms [6]. There is also a design tool for quantum computers, since the invention of quantum error corrector codes [7]. This gives us more hope since much is to be done in this vast field of quantum information theory. Indeed the quantumcryptography has become a necessity with this development and BB84 is the first protocol to have been imagined and implemented [8]. The information is coded on the polarization of single photons, choosing two non-independent polarization basesto ensure safety.This protocol has undergone several variants [9],[10], and has been implemented many times.Furthermore, the quantum key-policy attribute- based encryption scheme was devellioped by using the qutrits [11]. BB84 protocol was implemented fairly quickly, first in the form of a demonstration of principle then more operational devices [12],[13]. Quantum key distribution, often simply called quantum cryptography, is currently the only domain of quantum information where commercial systems are available.The development of cryptographic systems in the presence of noise has also stimulated research into classical information processing algorithms useful in quantum cryptography, such as reconciliation and privacy enhancement algorithms [14],[15],[16]. Other key distribution protocols have been proposed, either with qubits [12], or more recently with continuous variables. Other cryptographic applications have been studied, such as secret sharing or the Byzantine chord problem. The more specific exploitation of quantum entanglement has also led to dense coding [17], quantum teleportation [18] and other applications, also recently a new stady of Quantum
  • 2. Int J Elec& Comp Eng ISSN: 2088-8708  BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani) 2989 password sharing scheme using trusted servers is published [19]. In a previous work, we have presented the quantum key distribution with several intercept and resend attacks [20] and with several cloning attacks [21], and we have investigated the cases of quantum key distribution with several attacks via a depolarizing channel [22] [23] and partially non-orthogonal basis states [24]. Our aim in this paper is to study the effect of two groups of eavesdropping strategy; intercept-resend and cloning attacks on the behaviour of the mutual information between honest parties and the quantum error rate within the BB84 protocol. The paper is organized as follows. The protocol is detailed in section 2. Section 3 is devoted to the results and discussion, while section 4 is reserved for the conclusion. 2. RESEARCH METHOD The quantum key distribution (QKD) can use several photon properties for the purpose of encoding information such as polarization, phase, quantum correlations or wavelength. The only requirement on quantum states is that they belong to mutually non-orthogonal Hilbert space basis. We use the polarization coding and we consider two bases: the first called rectilinear is represented by the Horizontal and Vertical polarization H , V and the second is called diagonal and is generated by 45° of polarization A and 135° D ( )VHA += 2 2 and ( )VHD −= 2 2 These four states satisfy the following relations: 0== DAVH 1==== DDAAVVHH 2 12222 ==== DVAVDHAH All measurements made in the diagonal (rectilinear) base for photons prepared in the rectilinear (diagonal) base will give random results with equal probabilities. On the other hand, measurements made in a base identical to that of preparation of the states will produce deterministic results. At first, both parties who wish to communicate, traditionally called Alice and Bob agree that, for example, ( H , A ) represent the "0" value of the bit, and ( V , D ) have "1". Alice, the sender generates a sequence of random bits that she wants to transmit randomly; independently for each bit she chooses its coding base, rectilinear or diagonal. Subsequently, Bob receives these photons and uses a filter to read them. Nevertheless, some photons will be useless; it is the photons that have been polarized in a different base. These photons must not be taken into account in the key. To do this, a channel, which can be public, is used between Alice and Bob to determine which photons are useless. In our work we shoes to study when N+S eavesdroppers iE (i = 1,…..,N+S), were placed between Alice and Bob. These eaves droppers form two groups, each groupwill adopt a strategy of attacks; cloning or intercept-resend attacks, according to the model represented in Figure 1 and Figure 2. AliceQuantum Channel Bob E1 E2 EkEk+1 EN EN+1 EN+kEN+k+1 EN+S-1 EN+S The N eaves dropper swith cloning attacks The S eaves dropper swith intercept-resend attacks Figure 1. Model of N cloning attacks followed by S intercept-resend attacks According to Figure 1, Alice send a photon polarized which represents randomly 1 or 0, with equal probability 1/2, to Bob. Between two groups of eavesdroppers is placer on the quantum channel, the first one use cloning attack. Each eavesdropper ),...,1( NiEi = clone with an operator U defined as:
  • 3.  ISSN: 2088-8708 Int J Elec& Comp Eng, Vol. 8, No. 5, October 2018 : 2988 - 2993 2990 0000( ) ii EAEAU = and ii EAEAU 11)01( = iE will use U in the base y which will be defined as follows: [ ]2/,010)sin(01)cos()01( 00)00( πθθθ ∈+= = iyEyAiyEyAiyEyA yEyAyEyA iii ii U U iθ is the cloning angle, and it defined the force of attacks. Alice Quantum ChannelBob E1 E2 EkEk+1 EN EN+1 EN+kEN+k+1 EN+S-1 EN+S The N eaves dropper swith intercept-resend attacks The S eaves dropper swith cloning attacks Figure 2. Model of N intercept-resend attacks followed by S cloning attacks The second group use intercept-resend attacks. Each eaves dropper ),...,1( SNNiEi ++= intercepts, with probability iω , the photon emitted by the eaves dropper 1−iE , measures its polarization state and resends it, in its measured polarization state, to the eavesdropper 1+iE . However, in the second figure (Figure 2) the roles of the groups of eaves droppers are reversed, ie Alice send a polarised photon and each eavesdropper ),...,1( NiEi = from the first group intercepts the photon with probability iω and each eavesdropper ),...,1( SNNiEi ++= from the second group use the cloning operator U defined above. 3. RESULTS AND ANALYSIS In this section we calculate the quantum error errQ and the mutual information between Alice and Bob and between Alice and the mth eavesdroppers defined as follow: ))0/1(()0/1())0/0(()0/0(1),( 22 ABABABAB PLogPPLogPBAI ++= ))0/1(()0/1())0/0(()0/0(1),( 22 mmmm AEAEAEAEm PLogPPLogPEAI ++= With )0/0(1)0/1( ABAB PP −= and )0/0(1)0/1( mm AEAE PP −= )/( AxyP is the conditional probability that Bob or mE receive a photon polarized horizontally (vertically) y = 0,1 with respect that Alice send a photon polarized horizontally (vertically) XA = 0,1. All this conditional probabilities depend on the models attacks described in the previous section; In fact, we will study the quantum key distribution and the two cases will be distinguished if the group of cloning attacks is placed first or last. The lost information between Alice and Bob corresponds to the maximum information copied by the entire eavesdroppers: [ ]),(),( ,1 i mi EAIMaxEAI = = The error probability errP is given by: ∑ ≠ ≠ = = + −= BA j i j i xx BAABBAABerr xxPxxPP , 0 0 0 0 1 ),(),( ω θ ω θ
  • 4. Int J Elec& Comp Eng ISSN: 2088-8708  BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani) 2991 The quantum error errQ is the value of the error probability errP for which ),(),( EAIBAI = . However, for errerr QP < , ),(),( BAIEAI < , while for errerr QP > , ),(),( BAIEAI > 3.1. Quantum Key Distribution in the Presence of N Cloning Attacks Followed by S Intercept-Resend Attacks Based on Figure 1, the quantum error errQ and the mutual information ),( BAI between Alice and Bob arecalculated according to conditional probability: 2/)cos(1)1( 2 12 )1/1()0/0( 1,1,..., 1 10 1 1         +         − + == ∏∑ ∏ ∏∑ == = +== +− − N iSii k j S kl ii S k kS kS ABAB i k lj PP θωω If all eavesdroppers collaborate between them and use the same cloning angle θ and identical attack probabilitiesω , )0/0(ABP will be: ( ))(cos1) 2 1(1 4 1 )1/1()0/0( θ ω NS ABAB PP +      −+== Since both types of attacks act on the quantum states viheculated on the channel, the conditional probabilities between Alice and Bob are different compared to those published in the case of several attacks of intercept and resend only [20] or cloning only [21]. However, the mutual information ),( mEAI between Alice and each eavesdropper mE is calculated according to conditional probability )0/0(mAEP . In fact, this probability changes according to the position of the eavesdropper: If Nm ≤ : 2/)sin()cos(1)1/1()0/0( 1 1         +== ∏ − = m m i iAEAE mm PP θθ And ( ))sin()cos(1 2 1 )1/1()0/0( 1 θθ − +== m AEAE mm PP if all eaves droppers mE (with Nm < ) have the same cloning angleθ . These results fit perfectly with those found in the case of several cloning attacks [21] Else if Nm > : In this case the two types of attacks will occur, and this will clearly appear in the formulas of conditional probabilities between Alice and every eveas dropper. 2/)cos( 22 11)1/1()0/0( 1 1 1                       −+== ∏∏ = − = n i m m i i AEAE imm PP θ ωω Also, 2/)(cos 22 11)1/1()0/0( 1                       −+== − θ ωω N m AEAE mm PP if all eaves droppers choose identical attack parametersθ and ω . 3.2. Quantum Key Distribution in the Presence of N Intercept-Resend Attacks Followed by S Cloning Attacks In this case and according to the model of Figure 2, )0/0(ABP is written in the form: 2/)cos(1)1( 2 12 )1/1()0/0( 1,1,..., 1 10 1 1         +         − + == ∏∑ ∏ ∏∑ == = +== +− − S iNii k j N kl ii N k kN kN ABAB i k lj PP θωω
  • 5.  ISSN: 2088-8708 Int J Elec& Comp Eng, Vol. 8, No. 5, October 2018 : 2988 - 2993 2992 And if Ni ≤∀ ωω =i and θθ =j SjN ≤<∀ , ( ))(cos1) 2 1(1 4 1 )0/0( θ ω SN ABP +      −+= The position of each eaves dropper mE with its strategy of attack is a decisive element for the calculation of the conditional probabilities )0/0(mAEP and subsequently the mutual information ),( mEAI . If Nm ≤ : All eaves droppers use intercept-resend attacks and the conditional probabilities will be identical to those published in a previous work [20] ∑ ∏ ∏∑ −= = += − = +− − − + + − == 1,1,..., 1 1 1 0 1 1 )1( 2 12 2 1 )1/1()0/0( mii k j m kl ii m k km km m AEAE k ljmm PP ωω ω Also       −+== −1 ) 2 1( 2 1 2 1 )1/1()0/0( m AEAE mm PP ωω if ωω =i Ni ≤∀ However if Nm > : The state arriving at the eaves dropper mE underwent before N intercept-resend attacks and all mE ( with Nm > ) choose to use the cloning attacks. 2/)sin()cos()1( 2 12 1)1/1()0/0( 1 1,1,..., 1 10 1 1                 − + +== ∏∑ ∏ ∏∑ − == = +== +− − mi k ljmm m iNii k j N kl ii N k kN kN AEAE PP θθωω Indeed in this last case if all ),...,1( NiEi = have an identical attack probability ωω =i and all ),...,1( SNNjE j ++= have an identical cloning angle θθ =j , the conditional probability )0/0(mAEP will be: ( ))sin()cos(1) 2 1(1 2 1 )1/1()0/0( 1 θθ ω − +      −+== mN AEAE mm PP 4. CONCLUSION We have studied the quantum key distribution of BB84 protocol in the presence of several eavesdroppers with two different attack strategies cloning and intercept-resend attacks based on the calculations of the quantum error errQ and the mutual information ),( BAI between Alice and Bob and ),( mEAI between Alice and each eavesdropper mE and We have detailed all the cases according to the eavesdropping position with the attacks type used. It is clear that the attacksparameters iω and jθ , the number of theeavesdroppers, and their positioning on the quantum channelact strongly on the information security of the quantum key distribution REFERENCES [1] C. Shannon. "A Mathematical Theory of Communication", Bell System Technical Journal, 1948,vol. 27, pp. 623- 656, [2] C. Shannon, "Communication in the Presence of Noise", Proc. IRE, 1949, vol. 37, pp. 10-21. [3] A. Ourjoumtsev, H. Jeong, R. Tualle-Brouri, and P. Grangier, “Generation of optical Schrödinger cats from photon number states”, Nature, 2007, vol. 448, pp. 784-786. [4] A. Ourjoumtsev, R. Tualle-Brouri, J. Laurat, and P. Grangier, “Generating Optical Schrödinger kittens for quantum information processing”, Science, vol. 312, pp. 83-86, 2006. [5] S. Gleyzes, S. Kuhr, C. Guerlin, J. Bernu, S. Deléglise, U.B. Hoff, M. Brune, J.M.Raimond, and S. Haroche,” Quantum jumps of light recording the birth and death of a photon in a cavit”, Nature, vol. 446, pp. 297-300, 2007. [6] S. Wu, “A Quantum Chaos Clonal Multiobjective Evolutionary Method Reasearch”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 3, No. 1, pp. 226-234, 2016. [7] A.R. Calderbank and P.W. Shor, “Good quantum error-correcting codes exist”, Physical Review A, vol. 54, pp. 1098-1105, 1996.
  • 6. Int J Elec& Comp Eng ISSN: 2088-8708  BB84 with Both Several Cloning and Intercept-Resend Attacks (Mustapha Dehmani) 2993 [8] C. Bennett et G. Brassard. “Quantum Cryptography : Public Key Distribution and Coin Tossing”, IEEE Conf. on Computers, Systems and Signal Processing, Bangalore, India p. 175 1984. [9] C.H. Bennett. “Quantum cryptography using any two nonorthogonal states”, Phys. Rev. Lett, vol. 68, pp. 3121- 3124, 1992. [10] D. Bruss, “Optimal Eavesdropping in Quantum Cryptography with Six States”, Phys. Rev. Lett, Vol. 81, No. 14, pp. 3018–3021, 1998. [11] G. Mogos “Quantum Key-Policy Attribute-Based Encryption”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 7, No. 2, pp. 542 -550, 2017 [12] N. Gisin, G. Ribordy,W. Tittel, and H. Zbinden, “Quantum cryptography”, Review of Modern Physics, vol. 74, no. 1, pp. 145-195, 2002. [13] P. Grangier, J. Rarity, and A. Karlsson, “Quantum interference and cryptographic keys: novel physics and advancing technologies (QUICK)”, The European Physical Journal D, vol. 18, no. 2, pp. 139-139, 2002. [14] U.M. Maurer, “Secret key agreement by public discussion from common information”, IEEE Transactions on Information Theory, vol. 39, pp. 733–742, 1993 [15] G. Brassard and L. Salvail, “Secret-key reconciliation by public discussion”, In Advances in cryptology– Eurocrypt’93, number 765 in Lecture Notes in Computer Science, pages 410–423, 1993. [16] C. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, “Generalized privacy amplification”, IEEE Transactions on Information Theory, vol. 41, no. 6, pp. 1915– 1935, 1995. [17] C. Bennett and S. Wiesner, “Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states”, Physical Review Letters, vol. 69 pp. 2881– 2884, 1992. [18] C. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W.K. Wootters, “Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels”, Physical Review Letters, vol. 70, pp. 1895–1899, 1993. [19] G. Mogos, “Quantum password sharing scheme using trusted servers”, International Journal of Information & Network Security (IJINS) Vol. 2, No. 3, pp. 203-206, 2013. [20] H. Ez-Zahraouy and A. Benyoussef, “Quantum key distribution with several intercepts and resend attacks”, Int. J. Mod. Phys. B, vol. 23, pp. 4755-4765, 2009. [21] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef, “Quantum Cryptography with Several Cloning Attacks”, Journal of Computer Science, vol. 6, pp. 684-688, 2010. [22] M. Dehmani, H. Ez-Zahraouy , M. Errahmani and A. Benyoussef, “Quantum Key Distribution with Several Cloning Attacks via a Depolarizing Channel”, Phys. Scr, vol. 86, 2012. [23] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef “Quantum key distribution with several cloning attacks via a depolarizing channel”, Journal of Russian Laser Research, vol. 36 No. 3, pp. 228-236, 2015. [24] M. Dehmani, H. Ez-Zahraouy and A. Benyoussef, “Quantum key distribution with several intercepts and resend attacks with partially non-orthogonal basis states”. Optik - International Journal for Light and Electron Optics, vol. 125, pp. 624-627, 2014.