Enter your keyword

2-s2.0-85058276772

[vc_empty_space][vc_empty_space]

An Evaluation of Quantum Key Distribution in QuVis Simulation Software

Nuhamara B.R.H.a, Syambas N.R.a

a Bandung Institute of Technology, School of Electrical Engineering and Informatics, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2018 IEEE.The security of information in Internet-based communication is essential. The existence of tappers to make information can be known by unauthorized parties, and it will give a fake information from the previous one. As technology develops, secure communication protocols become an important part. Quantum Key Distribution is a nowadays technology as a part of security improvement to overcome key distribution issues in against attackers. Quantum Key Distribution (QKD) uses a quantum property in exchanging information called photons, as carriers of information in security systems. QKD is inseparable from protocols BB84 and B92, therefore the purposes of this paper are to test QuVis based on future work of previous research, analyze the probability error comparison of BB84 protocol, B92 protocol and simulator software review. The results of this research show that B92 protocol gives more advantage in detecting eavesdropping in lower rates than BB84 protocol and the software simulation is succeed by showing the value of probability key that can be used by Bob which does not cross the limit (0.5 and 0.25).[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]BB84,Internet-based communication,Probability errors,QuVis,Security improvement,Simulation software,Simulator software,Software simulation[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]B92,BB84,QuVis[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICWT.2018.8527790[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]