Show simple record

dc.contributor.authorRouhani, Reza
dc.date.accessioned2020-09-09T22:25:55Z
dc.date.available2020-09-09T22:25:55Z
dc.date.issued2020
dc.identifier.urihttps://hdl.handle.net/10652/4970
dc.description.abstractQuantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize the laws of quantum to create a cryptographic share key to make the communication system secure. The unique feature of QKD assures eavesdropping detectable during quantum communications which is fascinating for a high-level secure environment.Most of the traditional cryptographic methods which we use currently are based on mathematical scheme or Computational complexity theory which are not completely safe. Using quantum cryptography has been achieved extensive steps in communication security establishment. As the information Unit has been changed from “bit” to Quantum bit (Qubit), a new element has been offered that can guarantee the shared information confidentiality between parties. The confidentiality of system is established via exchanging a secret key through a channel of quantum, the key which we use for encrypting the shared data. This structure has quantum integration which has been developed by physics law and techniques of cryptography. This thesis has proposed a modified version of QKD protocol, this new protocol will generate a cryptographic share key for a more efficient, lower cost and secure communication between two parties (sender and Receiver). This new protocol principal is similar to BBM92, but the source of photon moved to sender instead of third-party photon generator, following steps will be executed in this Experiment: • Observe different categories protocols of QKD in details • The Quantum Mechanics Visualisation Project (QuVis) is the simulation software that has been used for implementing the proposed protocol [BB84 with spin] among the other three (BBM92, B92 and BB84). • Probability ratio of error will be tested and compared for all protocols, for this experiment 100 to 5000 photons will be sent. By Analysing collected data in this experiment, it will be determined which one of this four protocols lead the detecting of eavesdropping. Simulation software accomplishes the value of error key probability which receiver can use and should not pass over the range limit of 0.25 & 0.5.en_NZ
dc.language.isoenen_NZ
dc.rightsAll rights reserveden_NZ
dc.subjectProtocols of QKD (Quantum Key Distribution)en_NZ
dc.subjectQuantum Key Distributionen_NZ
dc.subjectquantum cryptographyen_NZ
dc.subjectdistribution keyen_NZ
dc.subjectcybersecurityen_NZ
dc.subjectQuVisen_NZ
dc.subjectBB84en_NZ
dc.subjectE91en_NZ
dc.subjectB92en_NZ
dc.subjectBBM92en_NZ
dc.titleAnalysis and evaluation of quantum key distribution protocolsen_NZ
dc.typeMasters Thesisen_NZ
dc.rights.holderAuthoren_NZ
thesis.degree.nameMaster of Computingen_NZ
thesis.degree.levelMastersen_NZ
thesis.degree.grantorUnitec Institute of Technologyen_NZ
dc.subject.marsden080402 Data Encryptionen_NZ
dc.subject.marsden020603 Quantum Information, Computation and Communicationen_NZ
dc.identifier.bibliographicCitationRouhani, R. (2020). Analysis and evaluation of quantum key distribution protocols. (Unpublished document submitted in partial fulfilment of the requirements for the degree of Master of Computing). Unitec Institute of Technology, Auckland, New Zealand. Retrieved from https://hdl.handle.net/10652/4970en
unitec.pages64en_NZ
dc.contributor.affiliationUnitec Institute of Technologyen_NZ
unitec.publication.placeAuckland, New Zealanden_NZ
unitec.advisor.principalSarrafpour, Bahman
unitec.advisor.associatedKolahi, Samaden_NZ
unitec.institution.studyareaComputing
dc.identifier.wikidataQ112953652


Files in this item

Thumbnail

This item appears in

Show simple record