###
Analysis of Various Attacks over *BB**84* *Quantum* *Key* *Distribution* *Protocol*

"... Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key distrib ..."

Abstract
- Add to MetaCart

*Quantum*

*Key*

*Distribution*(QKD) networks are the best application of

*quantum*cryptography in which we use the principles of

*quantum*mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over

*BB*

*84*

*quantum*

*key*

###
A Method of Constructing CSS Codes with LDPC Codes for the *BB**84* *Quantum* *Key* *Distribution* *Protocol*

, 2007

"... Abstract—In this paper, we propose how to construct a pair of linear codes simply for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification. Since ..."

Abstract
- Add to MetaCart

Abstract—In this paper, we propose how to construct a pair of linear codes simply for the

*BB**84**quantum**key**distribution**protocol*. This*protocol*allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification###
Constructing CSS Codes with LDPC Codes for the *BB**84* *Quantum* *Key* *Distribution* *Protocol*

, 2007

"... Abstract—In this paper, we propose how to simply construct a pair of linear codes for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification. Since ..."

Abstract
- Add to MetaCart

Abstract—In this paper, we propose how to simply construct a pair of linear codes for the

*BB**84**quantum**key**distribution**protocol*. This*protocol*allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification###
Effects of preparation and measurement misalignments on the security of the *BB**84* *quantum* *key* *distribution* *protocol*

, 2013

"... The ideal Bennett-Brassard 1984 (BB84) quantum key distribution protocol is based on the preparation and measurement of qubits in two alternative bases differing by an angle of pi/2. Any real implementation of the protocol, though, will inevitably introduce misalignments in the preparation of the st ..."

Abstract
- Add to MetaCart

The ideal Bennett-Brassard 1984 (

*BB**84*)*quantum**key**distribution**protocol*is based on the preparation and measurement of qubits in two alternative bases differing by an angle of pi/2. Any real implementation of the*protocol*, though, will inevitably introduce misalignments in the preparation###
Optimal Experimental Scheme for Practical *BB**84* *Quantum* *Key* *Distribution* *Protocol* with Weak Coherent Sources, Noisy and Lossy Channel

, 2005

"... It is the first scheme which allows the detection apparatus to achieve the photon number of arriving signals. Moreover, quantum bit error rates (QBERs) of multiphoton pulses can also be achieved precisely. Thus, our method is sensitive to the photon number splitting and resending (PNSR) attack, i.e. ..."

Abstract
- Add to MetaCart

pulses detection apparatus, a quasi-single-photon

*protocol*is presented to improve the security of the communication and the rate of the final*key*. We analyze that our scheme is optimal under today’s technology.*Quantum**key**distribution*(QKD) is a physically secure method, by which private*key*can###
*QUANTUM* THREE-PASS *PROTOCOL*: *KEY* *DISTRIBUTION* USING *QUANTUM* SUPERPOSITION STATES

"... This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a photon in superposition state for single-bit data transmission instead of a classical electrical/optical signal. The security ..."

Abstract
- Add to MetaCart

This letter proposes a novel

*key**distribution**protocol*with no*key*exchange in advance, which is secure as the*BB**84**quantum**key**distribution**protocol*. Our*protocol*utilizes a photon in superposition state for single-bit data transmission instead of a classical electrical/optical signal###
Unconditional Security of Practical *Quantum* *Key* *Distribution*

, 2004

"... We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is ..."

Abstract
- Add to MetaCart

We present an extension of the first proof for the unconditional security of the

*BB**84**quantum**key**distribution**protocol*which was given by Mayers. We remove the constraint that a perfect*BB**84**quantum*source is required and the proof given here covers a range of practical*quantum*sources. Nothing###
*Key* Rate Available from Mismatched Mesurements in the *BB**84* *Protocol* and the Uncertainty Principle

, 2008

"... We consider the mismatched measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. We give a lower bound on the amount of a secret key that can be extracted from the mismatched measurements. Our lower bound shows that we can extrac ..."

Abstract
- Add to MetaCart

We consider the mismatched measurements in the

*BB**84**quantum**key**distribution**protocol*, in which measuring bases are different from transmitting bases. We give a lower bound on the amount of a secret*key*that can be extracted from the mismatched measurements. Our lower bound shows that we can###
Reliability of Calderbank-Shor-Steane Codes and Security of *Quantum* *Key* *Distribution*

, 2003

"... After Mayers (1996, 2001) gave a proof of the security of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol, Shor and Preskill (2000) made a remarkable observation that a Calderbank-Shor-Steane (CSS) code had been implicitly used in the BB84 protocol and its security could be proven ..."

Abstract
- Add to MetaCart

After Mayers (1996, 2001) gave a proof of the security of the Bennett-Brassard 1984 (

*BB**84*)*quantum**key**distribution**protocol*, Shor and Preskill (2000) made a remarkable observation that a Calderbank-Shor-Steane (CSS) code had been implicitly used in the*BB**84**protocol*and its security could###
Eavesdropping or Disrupting a Communication — On the Weakness of *Quantum* Communications

"... What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators can not detect the eavesdropping. The general choice is to disrupt the communication at low cost, say, measuring the transferred quantum signa ..."

Abstract
- Add to MetaCart

signals in the well-known

*BB**84**quantum**key**distribution**protocol*. The bad choice is to disrupt it at even high cost, such as severing copper or fiber, if it is necessary. In this note we remark that a*quantum*communication is very vulnerable to low cost attacks. The plan to build a large*quantum*photonic