BB84
The OG quantum cryptographic protocol
Last updated
The OG quantum cryptographic protocol
Last updated
is a quantum key distribution (QKD) protocol developed by Charles Bennett and Gilles Brassard in 1984.
BB84 relies on two pillars of quantum physics
- the - it is impossible to copy an arbitrary quantum state without knowing what it is, and
- the - measuring a quantum state in a superposition irreversibly collapses it into 1 of the possible eigenstates.
Alice and Bob are physically separate and want to exchange messages securely. One way is to generate and use that to encrypt messages. Keys that are reused can be guessed by eavesdroppers so are used to securely generate and distribute new secret keys.
Alice and Bob can communicate via a .
Alice can also prepare qubits in any state and send them to Bob using a unidirectional .
Alice generates two random binary strings a and b of length n. String a encodes the state String b encodes the basis
She then prepares n qubits according to the following prescription:
Alice sends her qubits to Bob.
Bob then generates a random binary string c of length n which encodes the measurement basis..
Bob measures the qubit in the basis if and in the basis if and stores the result in a string m.
Alice and Bob then announce the strings b and c.
The bits of m where b and c match are now known to both Alice and Bob.
Alice's message a : 10111100 # randomly generated Alice's basis b : 01000101 # randomly generated Bob's basis c : 01111111 # randomly generated
Alice sends Bob the qubits.
Bob's measurement result m : 10XXX1X0, where X is indicates the the bit could be either 1 or 0.
When b and c are revealed, both Bob and Alice can deduce that the matching bits form the secret key : 1010.
BB84 is secure against intercept-and-resend attacks.
The worst case is when Eve correctly guesses the basis of the bits where Alice and Bob's bases match. The probability of that happening scales as where n is the number of qubits. Therefore the more qubits, the lower the chance of Eve eavesdropping and getting away with it.
In the real world, loss and noise complicates the protocol since It becomes harder to tell if a mismatch is due to Eve or random noise.
Suppose an eavesdropper Eve intercepts all of Alice's qubits and measures them in a randomly guessed basis. Then Eve prepares set of qubits and sends it to Bob. Eve cannot clone the exact state Alice prepared () nor leave it unchanged after measurement (). So if Eve takes any action, Alice and Bob will not measure the same key k. So the first message Alice sends is encrypted with k, Bob will not be able to decrypt the message, thus detecting Eve's presence.