4-8 July 2016
Kramer Law building
Africa/Johannesburg timezone
<a href="http://events.saip.org.za/internalPage.py?pageId=10&confId=86">The Proceedings of SAIP2016</a> published on 24 December 2017

Development of Quantum Key Distribution System

6 Jul 2016, 16:10
1h 50m
Kramer Law building

Kramer Law building

UCT Middle Campus Cape Town
Board: F.262
Poster Presentation Track F - Applied Physics Poster Session (2)

Speaker

Ms Marie Louise Umuhire (University of KwaZulu-Natal - Westville Campus, Durban, South Africa)

Would you like to <br> submit a short paper <br> for the Conference <br> Proceedings (Yes / No)?

Yes

Apply to be<br> considered for a student <br> &nbsp; award (Yes / No)?

Yes

Main supervisor (name and email)<br>and his / her institution

Prof. Francesco Petruccionne,petruccione@ukzn.ac.za,University of KwaZulu-Natal,westville Campus,Durban,South Africa

Level for award<br>&nbsp;(Hons, MSc, <br> &nbsp; PhD, N/A)?

MSc

Abstract content <br> &nbsp; (Max 300 words)<br><a href="http://events.saip.org.za/getFile.py/access?resId=0&materialId=0&confId=34" target="_blank">Formatting &<br>Special chars</a>

Quantum Key Distribution (QKD) is a process of producing and distributing the key information between groups of people or between two parties[1]. It is one of most advanced quantum information technology which uses quantum mechanics to guarantee the security of the communication. The implementation of QKD is realized by using an appropriate protocol. The sender (Alice) and the receiver (Bob) are connected by two channels. One is a quantum channel which is used for quantum transmission. In the case of sending photons this channel is generally either an optical fibre or free space. The second one is a classic channel which is used for the post – processing of the measurement bits, discarding all improper measured bits. The post – processing is performed to correct the errors obtained in shared key and erase all the information that an eavesdropper usually referred to as Eve could have obtained[2].
There exist many different protocols for providing a secure key i.e. BB84 protocol which is the first and most known protocol, the B92 protocol, the E91 protocol and many more[2]. In this work, all these protocols are defined and their differences will be discussed focusing on an extensive study of the BB84 protocol. An experiment set up is constructed to reproduce this protocol using a single photon source and free space as a quantum channel. A shared key is obtained and a quantum bit error rate (QBER) is calculated to give an idea how efficient the system is. Error detection and correction is achieved using cascade protocol and privacy amplification methods are discussed.
The conclusion is made according to the results obtaining during the QKD process.

References
1. Wiesner, S., Conjugate Coding. 1983. 15(1): p. 10.
2. Nicolas Gisin, et al., Quantum cryptography. Reviews of Morden Physics, 2002. 72(1): p. 51.

Please indicate whether<br>this abstract may be<br>published online<br>(Yes / No)

No

Primary author

Ms Marie Louise Umuhire (University of KwaZulu-Natal - Westville Campus, Durban, South Africa)

Co-authors

Prof. Francesco Petruccione (University of KwaZulu-Natal,westville Campus,Durban,South Africa) Dr Yaseera Ismail (University of Kwazulu Natal, Westville Campus, Durban, South Africa)

Presentation Materials

There are no materials yet.