Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol

  • Aggarwal R
  • Sharma H
  • Gupta D
N/ACitations
Citations of this article
28Readers
Mendeley users who have this article in their library.

Abstract

Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles of quantum mechanics with classical cryptographic techniques to provide the unconditional security. This paper discusses the various attack strategies over BB84 quantum key distribution protocol and the analysis of these attacks.

Cite

CITATION STYLE

APA

Aggarwal, R., Sharma, H., & Gupta, D. (2011). Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol. International Journal of Computer Applications, 20(8), 28–31. https://doi.org/10.5120/2454-3313

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free