BB84 protocol in Quantum Key Distribution

Charles Bennett and Gilles Brassard came up with the BB84 protocol in 1984. It is one of the most important quantum key distribution (QKD) protocols. By sending quantum information stored in photons, it is a prepare-and-measure procedure that Alice and Bob can use to create a shared secret key. The safety of BB84 depends on basic ideas in quantum physics, especially the no-cloning theorem and the fact that measuring something changes a quantum state.

How Does the BB84 Protocol Work?

Step 1: Prepare and send photons (Alice):

Alice wants to send Bob a series of bits that will finally come together to make their shared secret key. She randomly selects one of two non-orthogonal bases to encode each bit she intends to send. In BB84, the two bases that are used most often are

  • Rectilinear basis (+): Consists of horizontal (↔, representing a bit value of 0) and vertical (↕, representing a bit value of 1) polarization states. These are often denoted as |0⟩ and |1⟩, respectively.
  • Diagonal basis (×): Consists of +45° (↗, representing a bit value of 0) and -45° (↖, representing a bit value of 1) polarization states.
  • She also randomly selects a 0 or a 1 to encode each bit.
  • So, Alice picks two random numbers for each bit: (1) the base (+ or ×) and (2) the bit value (0 or 1). Once she has a single photon with the right polarization, she sends it to Bob through a quantum path, which could be an optical wire or empty space.

Step 2: Measurement and reception of photons (Bob):

  • Bob picks one of the same two bases (+ or ×) at random for each photon he receives in order to measure its polarization. He doesn’t know which base Alice used to get the photon ready.
  • Bob writes down the result of the test and the method he used for each photon he got.

Step 3: Basis Reconciliation (Classical Communication):

  • Alice and Bob talk over a public classical route, like the internet or a phone line, after Alice has sent a long enough string of photons.
  • For each photon sent and received, Bob says what base he used to figure out the value. At this point, though, he doesn’t say what the test result was (the bit number he got).
  • She then tells Bob, for each photon, whether he picked the right base (the one she used to make it) or the wrong one.

Step 4: Key Sifting:

Alice and Bob throw away all the photons for which Bob picked a different measurement base than the one Alice used to get ready. If they both used the same basis, the results of their measurements should be exactly linked. For example, if Alice sent a photon with horizontal polarization and Bob measured in the rectilinear basis, he should see horizontal polarization. The bits that are left make up a sorted key, which could be a shared secret.

Step 5: Error Checking and Eavesdropping Detection:

  • As a way to see if Eve is listening in, Alice and Bob pick a random group of the sorted key bits and compare their values over the public classical channel.
  • All of these bits should match if there was no listening going on and the broadcast was perfect. But because the quantum channel isn’t perfect and people might try to listen in, there might be some differences (errors), which are measured by the Quantum Bit Error Rate (QBER).
  • Eve would have to guess what Alice used as a base if she had tried to catch the photons and measure their polarization. The uncertainty principle says that her test would change the state of the photon if she is wrong about what it is. There is a chance that Bob will get the wrong answer when he measures this upset photon again in the right base. This will cause mistakes in the shared key.
  • When Alice and Bob look at the QBER, they can guess if someone was listening in and how much information she might have gotten. This means that they can be pretty sure that the key is safe if the mistake rate is below a certain level. They throw away the key and start over if the mistake rate is too high.

Step 6: Privacy Amplification (Optional but Common):

It’s possible that Eve could have learned a little something even if the QBER is below the cutoff. Privacy amplification is a common post-processing method that Alice and Bob can use on their sorted key to get a shorter, completely secret key that Eve doesn’t know much about. To do this, a highly universal hash function must be applied to the sorted key.

Step 7: Set up the secret key:

After these steps, Alice and Bob will have a shared secret key that no one else, not even Eve, should know. Classical symmetric encryption methods, like the one-time pad (OTP), can then be used to encrypt texts with this key. If you use an OTP with a secret key that is truly random and the same length as the message, it should be impossible to crack.

What is the Security of BB84 Protocol?

  • The BB84 protocol is safe because if Eve tries to get information about the sent qubits, she will always cause a disturbance that Alice and Bob can see because of the higher error rate. Eve has to choose between information and disturbance: the more information she tries to get, the more likely it is that she will make errors that can be seen.
  • BB84 is a quantum key sharing scheme, which is something you should keep in mind. The goal of this process is to create a secret key that can be used with standard encryption methods to send data safely. There is no data transfer built into the BB84 algorithm itself.
  • Changes and changes have been suggested for the BB84 protocol to make it work better and be more resistant to noise and channel losses. Although the basic protocol assumes perfect conditions, photon sources, detectors, and the communication route must all be fixed in order for it to work in real life. Even with these problems, BB84 is still an important part of quantum cryptography and a key step toward safe communication in the quantum future.

Read More about What is Quantum Key Distribution (QKD)? How It Works

Read More about What is quantum cryptography? How It Works

What is Quantum Computing in Brief Explanation

Quantum Computing: Quantum computing is an innovative computing model that...

Quantum Computing History in Brief

The search of the limits of classical computing and...

What is a Qubit in Quantum Computing

A quantum bit, also known as a qubit, serves...

What is Quantum Mechanics in simple words?

Quantum mechanics is a fundamental theory in physics that...

What is Reversible Computing in Quantum Computing

In quantum computing, there is a famous "law," which...

Classical vs. Quantum Computation Models

Classical vs. Quantum Computing 1. Information Representation and Processing Classical Computing:...

Physical Implementations of Qubits in Quantum Computing

Physical implementations of qubits: There are 5 Types of Qubit...

What is Quantum Register in Quantum Computing?

A quantum register is a collection of qubits, analogous...

Quantum Entanglement: A Detailed Explanation

What is Quantum Entanglement? When two or more quantum particles...

What Is Cloud Computing? Benefits Of Cloud Computing

Applications can be accessed online as utilities with cloud...

Cloud Computing Planning Phases And Architecture

Cloud Computing Planning Phase You must think about your company...

Advantages Of Platform as a Service And Types of PaaS

What is Platform as a Service? A cloud computing architecture...

Advantages Of Infrastructure as a Service In Cloud Computing

What Is IaaS? Infrastructures as a Service is sometimes referred...

What Are The Advantages Of Software as a Service SaaS

What is Software as a Service? SaaS is cloud-hosted application...

What Is Identity as a Service(IDaaS)? Examples, How It Works

What Is Identity as a Service? Like SaaS, IDaaS is...

Define What Is Network as a Service In Cloud Computing?

What is Network as a Service? A cloud-based concept called...

Desktop as a Service in Cloud Computing: Benefits, Use Cases

What is Desktop as a Service? Desktop as a Service...

Advantages Of IDaaS Identity as a Service In Cloud Computing

Advantages of IDaaS Reduced costs Identity as a Service(IDaaS) eliminates the...

NaaS Network as a Service Architecture, Benefits And Pricing

Network as a Service architecture NaaS Network as a Service...

What is Human Learning and Its Types

Human Learning Introduction The process by which people pick up,...

What is Machine Learning? And It’s Basic Introduction

What is Machine Learning? AI's Machine Learning (ML) specialization lets...

A Comprehensive Guide to Machine Learning Types

Machine Learning Systems are able to learn from experience and...

What is Supervised Learning?And it’s types

What is Supervised Learning in Machine Learning? Machine Learning relies...

What is Unsupervised Learning?And it’s Application

Unsupervised Learning is a machine learning technique that uses...

What is Reinforcement Learning?And it’s Applications

What is Reinforcement Learning? A feedback-based machine learning technique called Reinforcement...

The Complete Life Cycle of Machine Learning

How does a machine learning system work? The...

A Beginner’s Guide to Semi-Supervised Learning Techniques

Introduction to Semi-Supervised Learning Semi-supervised learning is a machine learning...

Key Mathematics Concepts for Machine Learning Success

What is the magic formula for machine learning? Currently, machine...

Understanding Overfitting in Machine Learning

Overfitting in Machine Learning In the actual world, there will...

What is Data Science and It’s Components

What is Data Science Data science solves difficult issues and...

Basic Data Science and It’s Overview, Fundamentals, Ideas

Basic Data Science Fundamental Data Science: Data science's opportunities and...

A Comprehensive Guide to Data Science Types

Data science Data science's rise to prominence, decision-making processes are...

“Unlocking the Power of Data Science Algorithms”

Understanding Core Data Science Algorithms: Data science uses statistical methodologies,...

Data Visualization: Tools, Techniques,&Best Practices

Data Science Data Visualization Data scientists, analysts, and decision-makers need...

Univariate Visualization: A Guide to Analyzing Data

Data Science Univariate Visualization Data analysis is crucial to data...

Multivariate Visualization: A Crucial Data Science Tool

Multivariate Visualization in Data Science: Analyzing Complex Data Data science...

Machine Learning Algorithms for Data Science Problems

Data Science Problem Solving with Machine Learning Algorithms Data science...

Improving Data Science Models with k-Nearest Neighbors

Knowing How to Interpret k-Nearest Neighbors in Data Science Machine...

The Role of Univariate Exploration in Data Science

Data Science Univariate Exploration Univariate exploration begins dataset analysis and...

Popular Categories