• Login
    View Item 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • View Item
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Analysis and evaluation of quantum key distribution protocols

    Rouhani, Reza

    Thumbnail
    Share
    View fulltext online
    MCom_2020_Reza Rouhani +.pdf (4.159Mb)
    Date
    2020
    Citation:
    Rouhani, R. (2020). Analysis and evaluation of quantum key distribution protocols. (Unpublished document submitted in partial fulfilment of the requirements for the degree of Master of Computing). Unitec Institute of Technology, Auckland, New Zealand. Retrieved from https://hdl.handle.net/10652/4970
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/4970
    Abstract
    Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize the laws of quantum to create a cryptographic share key to make the communication system secure. The unique feature of QKD assures eavesdropping detectable during quantum communications which is fascinating for a high-level secure environment.Most of the traditional cryptographic methods which we use currently are based on mathematical scheme or Computational complexity theory which are not completely safe. Using quantum cryptography has been achieved extensive steps in communication security establishment. As the information Unit has been changed from “bit” to Quantum bit (Qubit), a new element has been offered that can guarantee the shared information confidentiality between parties. The confidentiality of system is established via exchanging a secret key through a channel of quantum, the key which we use for encrypting the shared data. This structure has quantum integration which has been developed by physics law and techniques of cryptography. This thesis has proposed a modified version of QKD protocol, this new protocol will generate a cryptographic share key for a more efficient, lower cost and secure communication between two parties (sender and Receiver). This new protocol principal is similar to BBM92, but the source of photon moved to sender instead of third-party photon generator, following steps will be executed in this Experiment: • Observe different categories protocols of QKD in details • The Quantum Mechanics Visualisation Project (QuVis) is the simulation software that has been used for implementing the proposed protocol [BB84 with spin] among the other three (BBM92, B92 and BB84). • Probability ratio of error will be tested and compared for all protocols, for this experiment 100 to 5000 photons will be sent. By Analysing collected data in this experiment, it will be determined which one of this four protocols lead the detecting of eavesdropping. Simulation software accomplishes the value of error key probability which receiver can use and should not pass over the range limit of 0.25 & 0.5.
    Keywords:
    Protocols of QKD (Quantum Key Distribution), Quantum Key Distribution, quantum cryptography, distribution key, cybersecurity, QuVis, BB84, E91, B92, BBM92
    ANZSRC Field of Research:
    080402 Data Encryption, 020603 Quantum Information, Computation and Communication
    Degree:
    Master of Computing, Unitec Institute of Technology
    Supervisors:
    Sarrafpour, Bahman; Kolahi, Samad
    Copyright Holder:
    Author

    Copyright Notice:
    All rights reserved
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use. These documents or images may be used for research or private study purposes. Whether they can be used for any other purpose depends upon the Copyright Notice above. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Dissertations and Theses [90]

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga

    Usage

    Downloads, last 12 months
    145
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankContact us

    Help for authors  

    How to add research

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga