QC 01
QC 01
1 Introduction
Data communication security is a complicated process that involves individuals, net-
works, and applications, all of which are interconnected by a variety of latest technolo-
gies. Information systems are therefore extremely susceptible to attacks and unauthorized
intrusions, whether the data is accidental or malicious. To secure information transmis-
sion over such networks, cryptography is a technique. Cryptography and security are
essential components of our daily network communications. In cryptography [1] data
are encrypted and decrypted using mathematical tools. It allows users to store sensitive
information or send it through unsecured networks (like the Internet) so that only the
intended recipient can understand it. Classical data encryption cannot provide complete
security for legal parties due to the weaknesses of existing networking techniques. Most
of the traditional cryptographic algorithms [2] depend upon mathematical models and
computational assumptions in the network communication environments. Due to this
reason, they are actually not safe and easily accessible by many attackers.
2 Comparative Analysis
In a modern communication environment, QKD is an emerging solution for safeguarding
sensitive data during transmission. In order to develop a secure connection for files
dependent on different simulator conditions, numerous scientists have concentrated on
the simulation of QKD. There are various categories for categorizing cryptographic
algorithms, and these categories will be based on the number of keys used for encryption
and decryption, as well as their application and use (Fig. 2).
simulation experiments. They also compared the proposed protocol with other existing
protocols and showed that it outperforms them in terms of key rate and transmission
distance.
Guan et al. [7] proposed a new Twin-Field Quantum Key Distribution (TF-QKD)
protocol with improved security and key rate. Their contribution is in proposing a new
protocol that can increase the key rate and security of the existing TF-QKD protocols. The
authors conducted a theoretical analysis of the protocol and demonstrated its feasibility
through simulation experiments. They also compared the proposed protocol with other
existing protocols and showed that it outperforms them in terms of key rate and security.
Specifically, the authors introduced a new procedure of error estimation and correction
to reduce the errors caused by the fluctuation of the phase modulator. Additionally, the
authors used a modified reconciliation algorithm to enhance the security of the protocol.
Bhattacharya et al. [8] provided a detailed theoretical analysis of their proposed
approach and show that it has several advantages over existing Measurement Device
Independent Quantum Key Distribution (MDI-QKD) protocols, such as higher key rates
and improved security against certain types of attacks. They also provide a numerical
simulation of their proposed protocol to demonstrate its practicality and feasibility.
Jouguet et al. [9] demonstrated the experimental implementation of continuous vari-
able QKD over long distances, which was achieved using a high-performance system for
error correction and privacy amplification. The authors contributed to the development
of QKD by addressing practical challenges in long-distance communication.
Sajeed et al. [10] proposed a new protocol for QKD called TF-QKD. The authors
introduced a new approach to generate secret keys using correlated fields, which pro-
vides enhanced security compared to existing protocols. Their work contributed to the
advancement of QKD by improving the efficiency and security of the protocol.
Tang et al. [11] introduced the concept of MDI-QKD, which allows for secure com-
munication without relying on the security of the measurement devices. The authors
demonstrated the experimental implementation of this protocol, which represents a
significant step forward in the development of quantum key distribution.
Sit et al. [12] proposed an MDI-QKD protocol that uses high-dimensional states,
which provides increased security compared to previous protocols. The authors demon-
strated the feasibility of this protocol experimentally, contributing to the development
of secure quantum communication protocols.
Huang and Wang [13] proposed a continuous-variable MDI-QKD protocol that
improves the security of existing protocols. The authors demonstrated the feasibil-
ity of their protocol experimentally, which represents a significant contribution to the
development of secure quantum communication protocols.
Sharma and Kumar [14] reviewed quantum computing and its various applications,
such as quantum public key cryptography, quantum key distribution, and quantum
authentication. This paper also demonstrated that QC is not only secure but also has
claimed to demonstrate the intention of traditional cryptography. The sender and receiver
can recognize eavesdropping and take necessary action due to the qualities it has obtained
from quantum physics. The second goal is that nobody can crack the quantum key.
Gheorghies et al. [15] examined three distinct types of protocols: classical, QKD, and
blockchain based protocols, with examples from each category. Also discussed were the
Comparative Analysis of Quantum Key Distribution Protocols 155
specifics and difficulties of each protocol, as well as potential solutions and the effects
of these protocols. This paper also proposed an outline of PKI solutions in the context
of quantum computing and blockchain.
Kour et al. [16] attempted to introduce QC, QKD protocols, and QC applications
in this study. It provided information on several QKD mechanisms. In order to attain
a higher level of security, these protocols can be used in conjunction with encryption
technology.
Al-Shabi [17] conducted a comparative analysis of the most significant algorithms in
terms of speed (implementation) and security (special keys). This paper covers a number
of significant algorithms used for the encryption and decryption of data across all fields.
The comparison of symmetric and asymmetric algorithms demonstrates that the former
is quicker than the latter. Advanced Encryption Standard (AES) is the most dependable
algorithm in terms of speed encryption, decoding, the length of the key, structure, and
usability, according to past studies and comparison results.
Panhwar et al. [18] presented the features of different symmetric and asymmetric
algorithms, including triple Data Encryption Standard (DES), AES, and DES, which are
addressed in this study [18] in relation to their application in mobile computing based
work solutions.
Bharathi et al. [19] compare and contrast the various block cipher algorithms like
DES, RC6, BLOWFISH, and UR5 while also conducting a literature review on each
method. Blowfish and UR5 have 8 rounds, and RC6 has 12 rounds. In the study,
performance metrics for the encryption process are analyzed in light of security concerns.
QKD is different from symmetric encryption, asymmetric encryption, and hash
encryption in several ways. Table 1 shows the comparison of QKD over different encryp-
tions in terms of security, key distribution, quantum resistance and use cases. There are
Several different algorithms [15] that have been proposed for use in QKD systems. Ben-
nett and Brassard proposed the initial QKD protocol in 1984, and the first successful
QKD deployment took place in 1989. Table 2 shows the comparison of different QKD
protocols [20] based on their authors, year, proposed work, advantages and disadvan-
tages. QKD is considered to be more advanced and secure than conventional encryption
techniques for several reasons:
• Security: QKD is based on the principles of quantum mechanics and is considered
to be one of the most secure forms of encryption. It is resistant to eavesdropping,
which is a major concern in conventional encryption techniques because any attempt
to eavesdrop on the key distribution process will be detected.
• Quantum-resistance: QKD is considered to be quantum-resistant, meaning that it
is secure against attacks by quantum computers, whereas conventional encryption
methods such as symmetric and asymmetric encryption, will be broken by the power
of Quantum computers.
• Key Distribution: In QKD, the key distribution process is secure and does not rely
on a secure initial channel, which is required in conventional encryption techniques.
This makes it more suitable for use in environments where a secure initial channel is
not available.
156 N. Agarwal and V. Verma
• No need for trust: In QKD the parties do not need to trust the communication channel
or the devices used in the key distribution process, as the security is based on the laws
of physics, which can be trusted.
• Versatility: QKD can be used in combination with other encryption methods to
enhance the security of the overall system. For example, a one-time pad encryp-
tion key generated by QKD can be used in a symmetric-key encryption algorithm
such as AES.
Table 1. Comparison of using QKD over Symmetric Encryption, Asymmetric Encryption and
Hash Encryption
In summary, QKD offers a higher level of security and key distribution flexibility
than conventional encryption methods, it’s resistant to quantum computer attacks and
does not rely on communication channels. It can also be used in combination with other
encryption methods for added security (Tables 3 and 4).
Comparative Analysis of Quantum Key Distribution Protocols 157
Table 4. (continued)
need for specialized hardware, software, and communication networks that can support
QKD.
Another challenge is the limited distance that photons can travel before they are
absorbed or scattered, which limits the maximum distance over which QKD can be
used. Finally, the initial application of QKD is also a challenge, as it requires a significant
amount of resources and expertise to implement. Despite these challenges, researchers
and industry professionals are working to overcome these limitations and make QKD
a viable and secure method of communication. Putting in place a QKD infrastructure
that works perfectly is challenging. Although it is theoretically completely secure, secu-
rity problems arise in real-world applications due to shortcomings in equipment like
single photon detectors. Security analysis should always be considered. Modern fibre
optic connections often have a maximum distance a photon can travel. Frequently, the
range exceeds 100 km. This spectrum for QKD implementation has been widened by
some groups and organizations. For instance, the University of Geneva and Corning Inc.
collaborated to build a device that, under perfect circumstances, can transport a photon
307 km. With the use of a patent-pending, out-of-band delivery mechanism dubbed Phio
Trusted Xchange, Quantum Xchange established Phio, a QKD network in the United
States that can transfer quantum keys over an ostensibly limitless distance.
Another difficulty with QKD is that it requires the establishment of a channel of
communication with traditional authentication. This indicates that a sufficient level of
security was already established because one of the involved users had already exchanged
a symmetric key. Without QKD, a system can already be designed to be adequately secure
by employing another high-level encryption standard. However, as the use of quantum
computers increases, the likelihood that an attacker may utilize quantum computing to
break present encryption techniques increases, making QKD increasingly significant.
4 Conclusion
This research paper has provided a thorough analysis of the different QKD protocols,
including their strengths and limitations. The reader can gain a comprehensive under-
standing of these protocols after reviewing this study. Four of the most commonly used
QKD protocols: BB84, BB92, E91, and SARG04 have been analyzed here. Each of
these protocols has its own strengths and limitations, while BB84 is the most widely
used and well-studied protocol. This work has examined their experimental feasibility,
and methodology and discussed the future directions and challenges for each of these
protocols. Despite their limitations, QKD is a promising technology that offers a high
level of security. Ongoing research aims to improve its performance, reduce costs, and
make it more accessible. With advancements in technology, QKD is expected to become
more widely adopted in the future. Companies are working on making QKD systems
more affordable and user-friendly, and scientists are developing new QKD protocols that
can operate over longer distances and support more users.
One important direction for future research is the integration of QKD with other
technologies such as the internet and cloud computing. As more and more data is stored
and transmitted over networks, the need for secure communication methods like QKD
becomes increasingly important. Another important area of research is the security proof
162 N. Agarwal and V. Verma
Acknowledgements. I would like to acknowledge the support from Vivekananda Global Univer-
sity, India. My special thanks are extended to all professors from Computer Science Department,
Vivekananda Global University, Jaipur, India.
References
1. Javed, M., Aziz, K.: A survey of quantum key distribution protocols. In: 7th International Con-
ference on Frontiers of Information Technology (FIT 2009), Abbottabad, 16–18 December
2009. ACM (2009)
2. Hamouda, A., B.E.H.H.: Comparative study of different cryptographic algorithms. J. Inf.
Secur. 11, 138–148 (2020)
3. C.S. et al.: A study and analysis on symmetric cryptography. In: International Confer-
ence on Science, Engineering and Management Research (ICSEMR), pp. 978-1-4799-7613-
3/14/$31.00. IEEE (2014)
4. Gnatyuk, S.O.: Comparative analysis of quantum key distribution systems. Sci. Based
Technol. 78–82 (2013)
5. Abushgra, A.: Variations of QKD protocols based on conventional system measurements: a
literature review. Cryptography 6(1), 1–25 (2022)
6. Wang, C., Huang, Y., Zhang, L., Yu, Z., Guo, J., Liu, Y.: A new coherent one-way QKD
protocol based on non-orthogonal states. IEEE Access 8, 143485–143496 (2020)
7. Guan, J., Zhang, L., Liu, Y., Guo, J.: A new twin-field quantum key distribution protocol with
improved security and key rate. Quantum Inf. Process. 19(3), 1–17 (2020)
8. Bhattacharya, A., Dhar, A., Das, D.: A new approach to measurement device-independent
quantum key distribution using structured coherent states. IEEE J. Quantum Electron. 57(3),
1–10 (2021)
9. Jouguet, P., Kunz-Jacques, S., Leverrier, A., Grangier, P., Diamanti, E.: Experimental demon-
stration of long-distance continuous-variable quantum key distribution. Nat. Photonics 7(6),
378–381 (2013)
10. Sajeed, S., Kumar, R., Prakash, G.: Twin-field quantum key distribution. Phys. Rev. 92(5),
052315 (2015)
11. Tang, D., Qi, B., Lo, H.-K.: Experimental measurement device independent quantum key
distribution. Phys. Rev. X 6(1), 011024 (2016)
12. Sit, A., Fung, C.F., Lo, H.-K.: Measurement device independent quantum key distribution
with high-dimensional states. IEEE J. Sel. Top. Quantum Electron. 23(5), 1–10 (2017)
13. Huang, D., et al.: Continuous-variable measurement device-independent quantum key
distribution. Phys. Rev. 98(3), 032315 (2018)
14. Sharma, A. and Kumar, A.: A survey on quantum key distribution. In 2nd International
Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), (2019)
15. Gheorghies, M.L., Simion, E.: A comparative study of cryptographic key distribution
protocols. IACR Crypt. ePrint Arch. 2021, 31 (2021)
16. Kour, J., Koul, S., Zahid, P.: A survey on quantum key distribution protocols. Int. J. Comput.
Sci. Appl. 7(3) (2017)
17. Al-Shabi, M.A.: A survey on symmetric and asymmetric cryptography algorithms in
information security. Int. J. Sci. Res. Publ. 9(3) (2019)
Comparative Analysis of Quantum Key Distribution Protocols 163
18. Panhwaret, A., Al Saca, Z.: A study of symmetric and asymmetric cryptographic algorithms.
IJCSNS Int. J. Comput. Sci. Netw. Secur. 19(1), 1–8 (2019)
19. Bharathi, E., Marimuthu, A., Kavitha, A.: Performance analysis of symmetric encryption
techniques. Int. J. Comput. Netw. Secur. 5(1), 1–4 (2013)
20. Nurhadi, A., Syambas, N.: Quantum key distribution (QKD) protocols: a survey. In: 4th
International Conference on Wireless and Telematics (ICWT), pp. 1–5. IEEE (2018)
21. Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication.
Phys. Rev. Lett. 91, 057901 (2003)
22. Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against
photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92,
057901 (2004)
23. Braunstein, S.L., van Loock, P.: Quantum information with continuous variables. Rev. Mod.
Phys. 77(2), 513–577 (2005)
24. Garcia-Patron, R., Cerf, N.J.: Unconditional optimality of Gaussian attacks against
continuous-variable quantum key distribution. Phys. Rev. Lett. 97, 190503 (2006)
25. Inoue, K., Iwai, Y.: Differential quadrature phase shift quantum key distribution. Phys. Rev.
A 79, 022319 (2009)
26. Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution.
Phys. Rev. Lett. 108, 130503 (2012)