Prakash Dhakal, Babu R. Dawadi, Nanda Bikram Adhikari
{"title":"Performance Analysis of Different Quantum Key Distribution Protocols for Optimised Security and Efficiency","authors":"Prakash Dhakal, Babu R. Dawadi, Nanda Bikram Adhikari","doi":"10.1049/qtc2.70015","DOIUrl":null,"url":null,"abstract":"<p>Quantum key distribution (QKD) protocols are techniques that use the laws of quantum physics to safely distribute cryptographic keys. QKD protocols are able to identify attempts at eavesdropping during the distribution of keys, possibly providing a better level of security than traditional encryption. We present a comparative evaluation of the three QKD protocols, namely, BB84, E91 and an enhanced BB84 (EBB84) with the goal of identifying the best balance between security and efficiency for practical quantum communication systems. Motivated by the growing need for quantum-resistant cryptography, extensive simulations in the Qiskit framework under both ideal and plausible noisy conditions is conducted, including depolarising, thermal relaxation, Pauli, amplitude damping and phase damping noise models. For each protocol, key lengths are varied from 200 to 3000 bits and, where relevant, simulated intercept–resend attacks to assess resilience against eavesdropping. The key performance metrics, QBER for BB84/EBB84 and the CHSH inequality parameter for E91 are computed over 50 iterations per scenario to ensure statistical robustness. The analysis reveals distinct trade-offs: EBB84 achieves superior early eavesdropper detection at short key lengths, whereas differences between BB84 and EBB84 diminishes as key lengths increases; E91 maintains strong entanglement-based security but is more sensitive to certain noise types. Regression analysis confirms that depolarising and amplitude damping noise most strongly influence QBER and CHSH degradation, whereas key length has a secondary effect. These findings mark the importance of adaptive key management and noise mitigation strategies and offer guidelines for integrating QKD into emerging network architectures such as SDN, 5G, and 6G.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"6 1","pages":""},"PeriodicalIF":2.8000,"publicationDate":"2025-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.70015","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Quantum Communication","FirstCategoryId":"1085","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/qtc2.70015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"QUANTUM SCIENCE & TECHNOLOGY","Score":null,"Total":0}
引用次数: 0
Abstract
Quantum key distribution (QKD) protocols are techniques that use the laws of quantum physics to safely distribute cryptographic keys. QKD protocols are able to identify attempts at eavesdropping during the distribution of keys, possibly providing a better level of security than traditional encryption. We present a comparative evaluation of the three QKD protocols, namely, BB84, E91 and an enhanced BB84 (EBB84) with the goal of identifying the best balance between security and efficiency for practical quantum communication systems. Motivated by the growing need for quantum-resistant cryptography, extensive simulations in the Qiskit framework under both ideal and plausible noisy conditions is conducted, including depolarising, thermal relaxation, Pauli, amplitude damping and phase damping noise models. For each protocol, key lengths are varied from 200 to 3000 bits and, where relevant, simulated intercept–resend attacks to assess resilience against eavesdropping. The key performance metrics, QBER for BB84/EBB84 and the CHSH inequality parameter for E91 are computed over 50 iterations per scenario to ensure statistical robustness. The analysis reveals distinct trade-offs: EBB84 achieves superior early eavesdropper detection at short key lengths, whereas differences between BB84 and EBB84 diminishes as key lengths increases; E91 maintains strong entanglement-based security but is more sensitive to certain noise types. Regression analysis confirms that depolarising and amplitude damping noise most strongly influence QBER and CHSH degradation, whereas key length has a secondary effect. These findings mark the importance of adaptive key management and noise mitigation strategies and offer guidelines for integrating QKD into emerging network architectures such as SDN, 5G, and 6G.