Quantum Cryptography on IBM QX
Title | Quantum Cryptography on IBM QX |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | AL-Mubayedh, Dhoha, AL-Khalis, Mashael, AL-Azman, Ghadeer, AL-Abdali, Manal, Al Fosail, Malak, Nagy, Naya |
Conference Name | 2019 2nd International Conference on Computer Applications Information Security (ICCAIS) |
ISBN Number | 978-1-7281-0108-8 |
Keywords | BB84, BB84 Protocol, BB84 theoretical expected results, classical computers, composability, compositionality, computational power, cryptographic protocols, cryptographic solutions, cryptography, distributed keys, electronic transactions, encoding functions, existing classical algorithms 100% breakable, IBM QX software, intended parties, Logic gates, mathematical complexity, practical implementation results, Predictive Metrics, Protocols, pubcrawl, quantum, quantum bit commitment, quantum computation, quantum computers, quantum computing, quantum computing security, quantum cryptography, Quantum Key Distribution, quantum key distribution protocol, quantum machines, quantum protocols, Qubit, Resiliency, Scalability, security shifts, statistical analysis, telecommunication security, theoretical cryptography |
Abstract | Due to the importance of securing electronic transactions, many cryptographic protocols have been employed, that mainly depend on distributed keys between the intended parties. In classical computers, the security of these protocols depends on the mathematical complexity of the encoding functions and on the length of the key. However, the existing classical algorithms 100% breakable with enough computational power, which can be provided by quantum machines. Moving to quantum computation, the field of security shifts into a new area of cryptographic solutions which is now the field of quantum cryptography. The era of quantum computers is at its beginning. There are few practical implementations and evaluations of quantum protocols. Therefore, the paper defines a well-known quantum key distribution protocol which is BB84 then provides a practical implementation of it on IBM QX software. The practical implementations showed that there were differences between BB84 theoretical expected results and the practical implementation results. Due to this, the paper provides a statistical analysis of the experiments by comparing the standard deviation of the results. Using the BB84 protocol the existence of a third-party eavesdropper can be detected. Thus, calculations of the probability of detecting/not detecting a third-party eavesdropping have been provided. These values are again compared to the theoretical expectation. The calculations showed that with the greater number of qubits, the percentage of detecting eavesdropper will be higher. |
URL | https://ieeexplore.ieee.org/document/8769567 |
DOI | 10.1109/CAIS.2019.8769567 |
Citation Key | al-mubayedh_quantum_2019 |
- quantum key distribution protocol
- pubcrawl
- quantum
- quantum bit commitment
- quantum computation
- quantum computers
- quantum computing security
- quantum computing
- quantum cryptography
- Quantum Key Distribution
- Protocols
- quantum machines
- quantum protocols
- Qubit
- Resiliency
- Scalability
- security shifts
- statistical analysis
- telecommunication security
- theoretical cryptography
- distributed keys
- BB84 protocol
- BB84 theoretical expected results
- classical computers
- composability
- Compositionality
- computational power
- Cryptographic Protocols
- cryptographic solutions
- Cryptography
- BB84
- electronic transactions
- encoding functions
- existing classical algorithms 100% breakable
- IBM QX software
- intended parties
- Logic gates
- mathematical complexity
- practical implementation results
- Predictive Metrics