2 research outputs found
Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
This paper compares the popular quantum key distribution (QKD) protocol BB84
with the more recent Kak's three-stage protocol and the latter is shown to be
more secure. A theoretical representation of an authentication-aided version of
Kak's three-stage protocol is provided that makes it possible to deal with the
man-in-the-middle attack.Comment: 9 pages, 4 figure
Analysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength
This paper analyzes the performance of Kak's quantum cryptography protocol
when intensity monitoring is used to detect the presence of Eve during
transmission. Some difficulties related to interception to obtain useful data
from the transmission are discussed. The analysis shows the resilience of the
protocol towards the man-in-the-middle attack.Comment: 6 page