Experimental realization of three quantum key distribution protocols

  • PDF / 1,511,433 Bytes
  • 15 Pages / 439.37 x 666.142 pts Page_size
  • 63 Downloads / 187 Views

DOWNLOAD

REPORT


Experimental realization of three quantum key distribution protocols Aakash Warke1

· Bikash K. Behera2 · Prasanta K. Panigrahi3

Received: 29 May 2020 / Accepted: 26 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Classical computers allow security of cryptographic protocols based on the mathematical complexity of encoding functions and the shared key. This implies that high computational power can have a positive outcome in breaking cryptographic protocols that employ classical computers. Quantum machines claim to possess such power. Two parties interested in communicating with each other take up the process of measuring entangled states in order to construct a secret key which is safeguarded against an eavesdropper capable of performing quantum operations. At first, experimental verification of the BB84 protocol using three bases has been performed in this paper, out of which sub-cases have been considered based on whether or not Eve has attempted an attack. The following part includes experimental realization of the B92 protocol which was introduced by Charles Bennett in the year 1992. Possibility of an Eve’s attack is considered and implemented. Succeeding part relies on experimental implementation of the protocol that was introduced by Acin, Massar and Pironio in the year 2006 (New J Phys 8:126, 2006). All the implementations have been done using the IBM Quantum Experience platform. Keywords Quantum cryptography · IBM quantum experience · Quantum information theory

B

Aakash Warke [email protected] Bikash K. Behera [email protected] Prasanta K. Panigrahi [email protected]

1

Department of Physics, Bennett University, Greater Noida 201310, India

2

Bikash’s Quantum (OPC) Pvt. Ltd., Balindi, Mohanpur, Nadia, West Bengal 741246, India

3

Department of Physical Sciences, Indian Institute of Science Education and Research Kolkata, Mohanpur, West Bengal 741246, India 0123456789().: V,-vol

123

407

Page 2 of 15

A. Warke et al.

1 Introduction Quantum cryptography holds a powerful tag in promising top-notch security with the ideology that allows back-end operations to take place based upon the laws of physics [1]. Development of this area over time has embarked positively upon various domains with specialization in security or communication. The idea of quantum cryptography was initiated around 27 years ago where-in the first quantum key distribution protocol was invented with the intention of developing a secure construction of a secret key in-spite of the presence of a third hacking adversary, i.e. Eve, withholding maximum access to technology. This is usually done to make sure that the constructed protocol’s security is not compromised [2]. This came through to be the new emergence in quantum information theory, and the development has kept increasing ever since. This first protocol was known to be the BB84 protocol [3,4] introduced by Bennett and Brassard in the year 1984. In the later years, Ekert formulated a protocol designed in a way that