2 research outputs found

    Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol

    Full text link
    This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak's three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak's three-stage protocol is provided that makes it possible to deal with the man-in-the-middle attack.Comment: 9 pages, 4 figure

    Analysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength

    Full text link
    This paper analyzes the performance of Kak's quantum cryptography protocol when intensity monitoring is used to detect the presence of Eve during transmission. Some difficulties related to interception to obtain useful data from the transmission are discussed. The analysis shows the resilience of the protocol towards the man-in-the-middle attack.Comment: 6 page
    corecore