Skip to content

A simulation of the BB84 protocol in a Jupyter Notebook using the code from https://qiskit.org/textbook/ch-algorithms/quantum-key-distribution.html. Protocol steps until key sifting have been implemented. Error correction & parameter estimation were not executed.

Notifications You must be signed in to change notification settings

strangequarkkk/BB84-Protocol-for-QKD

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

Quantum Key Distribution using the BB84 Protocol in Python

Python libraries used: Numpy, Matplotlib, Qiskit.

In this piece of work:

  1. Studied the BB84 protocol using the code from https://qiskit.org/textbook/ch-algorithms/quantum-key-distribution.html. Both the cases, with interception from an eavesdropper, and without interception from the eavesdropper, were explored. The code in the notebook ceases after 'key sifting' has been performed. Code for parameter estimation and error correction was not executed in this notebook. The code for parameter estimation is still present although it has been commented out. This notebook can be used hand in hand with the original BB84 paper(https://arxiv.org/abs/2003.06557) to attain a basic undertstanding of the protocol.

  2. A very handy plot relating the probability of detecting the eavesdropper and the number of bits drawn from the sifted keys was also plotted.

The relevant Jupyter Notebook containing the code and the aforementioned plot have been attached.

If you need any more information/explanation related to the code, don't hesitate to contact me.

About

A simulation of the BB84 protocol in a Jupyter Notebook using the code from https://qiskit.org/textbook/ch-algorithms/quantum-key-distribution.html. Protocol steps until key sifting have been implemented. Error correction & parameter estimation were not executed.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published