Cargando…

Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3

Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathemat...

Descripción completa

Detalles Bibliográficos
Autores principales: Adu-Kyere, Akwasi, Nigussie, Ethiopia, Isoaho, Jouni
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9413261/
https://www.ncbi.nlm.nih.gov/pubmed/36016045
http://dx.doi.org/10.3390/s22166284
_version_ 1784775699161153536
author Adu-Kyere, Akwasi
Nigussie, Ethiopia
Isoaho, Jouni
author_facet Adu-Kyere, Akwasi
Nigussie, Ethiopia
Isoaho, Jouni
author_sort Adu-Kyere, Akwasi
collection PubMed
description Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenberg’s uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent.
format Online
Article
Text
id pubmed-9413261
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-94132612022-08-27 Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3 Adu-Kyere, Akwasi Nigussie, Ethiopia Isoaho, Jouni Sensors (Basel) Article Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenberg’s uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent. MDPI 2022-08-21 /pmc/articles/PMC9413261/ /pubmed/36016045 http://dx.doi.org/10.3390/s22166284 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Adu-Kyere, Akwasi
Nigussie, Ethiopia
Isoaho, Jouni
Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
title Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
title_full Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
title_fullStr Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
title_full_unstemmed Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
title_short Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
title_sort quantum key distribution: modeling and simulation through bb84 protocol using python3
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9413261/
https://www.ncbi.nlm.nih.gov/pubmed/36016045
http://dx.doi.org/10.3390/s22166284
work_keys_str_mv AT adukyereakwasi quantumkeydistributionmodelingandsimulationthroughbb84protocolusingpython3
AT nigussieethiopia quantumkeydistributionmodelingandsimulationthroughbb84protocolusingpython3
AT isoahojouni quantumkeydistributionmodelingandsimulationthroughbb84protocolusingpython3