Advanced Secure Communication: Exploring Quantum Key Distribution, the BB84 Method
Badukuri Hemalatha1, Badukuri Premalatha2, Buduri. Reddaiah3

1Badukuri Hemalatha, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.

2Badukuri Premalatha, Department of Computer Science, PVKN Government College, Chittoor, India.

3Buduri. Reddaiah, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.

Manuscript received on 27 March 2024 | Revised Manuscript received on 05 April 2024 | Manuscript Accepted on 15 April 2024 | Manuscript published on 30 April 2024 | PP: 29-33 | Volume-13 Issue-4, April 2024 | Retrieval Number: 100.1/ijeat.D443413040424 | DOI: 10.35940/ijeat.D4434.13040424

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: One promising way to use quantum information to secure everyday communication is through the distribution of quantum keys. By exchanging a secret key, the Quantum Key Distribution (QKD) approach allows two parties to communicate securely.BB84 protocol is among the most well-known QKD protocols. In this protocol, qubits are exchanged via a quantum channel between the sender and the receiver. This enables them to produce a shared key that is impenetrable to eavesdroppers and illustrate the fundamental ideas of QKD using current simulations and implementations. The results of this study demonstrate that the BB84 protocol is a highly secure QKD technique that has been investigated in great detail and used in a variety of contexts. Additionally, over the enhancements made to the BB84 protocol such as the use of advanced error correction techniques and decoy states to increase its security and usability is discussed. With an emphasis on the BB84 protocol in secure communication technologies, this study offers an extensive analysis of QKD systems overall.

Keywords: Quantum Cryptography, Quantum Key Distribution, BB84, RSA, Eavesdropping.
Scope of the Article: Nanoelectronics and Quantum Computing