{"title":"模拟班纳特和布拉萨84协议与夏娃的攻击","authors":"N. H. M. Halip, M. Mokhtar, A. Buhari","doi":"10.1109/ICP.2014.7002301","DOIUrl":null,"url":null,"abstract":"A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. The simulation is divided into two categories which are without security attacks scenario and with several attacks scenario that consists of Intercept and Resend and sent new qubits. The simulation results meet the theory of BB84. This project is able to provide better understanding about the quantum key distribution process especially in BB84 protocol.","PeriodicalId":282572,"journal":{"name":"2014 IEEE 5th International Conference on Photonics (ICP)","volume":"364 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Simulation of Bennet and Brassard 84 protocol with Eve's attacks\",\"authors\":\"N. H. M. Halip, M. Mokhtar, A. Buhari\",\"doi\":\"10.1109/ICP.2014.7002301\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. The simulation is divided into two categories which are without security attacks scenario and with several attacks scenario that consists of Intercept and Resend and sent new qubits. The simulation results meet the theory of BB84. This project is able to provide better understanding about the quantum key distribution process especially in BB84 protocol.\",\"PeriodicalId\":282572,\"journal\":{\"name\":\"2014 IEEE 5th International Conference on Photonics (ICP)\",\"volume\":\"364 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 5th International Conference on Photonics (ICP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICP.2014.7002301\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 5th International Conference on Photonics (ICP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICP.2014.7002301","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Simulation of Bennet and Brassard 84 protocol with Eve's attacks
A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. The simulation is divided into two categories which are without security attacks scenario and with several attacks scenario that consists of Intercept and Resend and sent new qubits. The simulation results meet the theory of BB84. This project is able to provide better understanding about the quantum key distribution process especially in BB84 protocol.