Visible to the public Quantum Cryptography on IBM QX

TitleQuantum Cryptography on IBM QX
Publication TypeConference Paper
Year of Publication2019
AuthorsAL-Mubayedh, Dhoha, AL-Khalis, Mashael, AL-Azman, Ghadeer, AL-Abdali, Manal, Al Fosail, Malak, Nagy, Naya
Conference Name2019 2nd International Conference on Computer Applications Information Security (ICCAIS)
ISBN Number978-1-7281-0108-8
KeywordsBB84, BB84 Protocol, BB84 theoretical expected results, classical computers, composability, compositionality, computational power, cryptographic protocols, cryptographic solutions, cryptography, distributed keys, electronic transactions, encoding functions, existing classical algorithms 100% breakable, IBM QX software, intended parties, Logic gates, mathematical complexity, practical implementation results, Predictive Metrics, Protocols, pubcrawl, quantum, quantum bit commitment, quantum computation, quantum computers, quantum computing, quantum computing security, quantum cryptography, Quantum Key Distribution, quantum key distribution protocol, quantum machines, quantum protocols, Qubit, Resiliency, Scalability, security shifts, statistical analysis, telecommunication security, theoretical cryptography
Abstract

Due to the importance of securing electronic transactions, many cryptographic protocols have been employed, that mainly depend on distributed keys between the intended parties. In classical computers, the security of these protocols depends on the mathematical complexity of the encoding functions and on the length of the key. However, the existing classical algorithms 100% breakable with enough computational power, which can be provided by quantum machines. Moving to quantum computation, the field of security shifts into a new area of cryptographic solutions which is now the field of quantum cryptography. The era of quantum computers is at its beginning. There are few practical implementations and evaluations of quantum protocols. Therefore, the paper defines a well-known quantum key distribution protocol which is BB84 then provides a practical implementation of it on IBM QX software. The practical implementations showed that there were differences between BB84 theoretical expected results and the practical implementation results. Due to this, the paper provides a statistical analysis of the experiments by comparing the standard deviation of the results. Using the BB84 protocol the existence of a third-party eavesdropper can be detected. Thus, calculations of the probability of detecting/not detecting a third-party eavesdropping have been provided. These values are again compared to the theoretical expectation. The calculations showed that with the greater number of qubits, the percentage of detecting eavesdropper will be higher.

URLhttps://ieeexplore.ieee.org/document/8769567
DOI10.1109/CAIS.2019.8769567
Citation Keyal-mubayedh_quantum_2019