Main Article Content

Sirshendu Sekhar Ghosh
Dilip Kumar Shaw


Cryptography is being introduced to secure data. Through Classical Cryptographic technique, we can encrypt our data and secure secret key also. But classical cryptography is based on mathematical techniques where reversing one-way function is possible with sufficient computing power and time. So, Quantum Cryptography is introduced to overcome those drawbacks of traditional classical cryptography. It is based on the values of quantum mechanics and photon. Scientists and researchers have brought up a new key distribution protocol based on Quantum Cryptography is called Quantum Key Distribution (QKD) Protocol. The first QKD protocol BB84 was introduced by Charles Bennett and Gilles Brassard in 1984. After that several QKD protocols have been created. In this paper we have improved BB84 Protocol by removing the drawbacks of the existing algorithm towards Eavesdropping which may not be detected or disclosing large portion of secret key. Steps of the existing BB84 algorithm along with the modified one is described in detail with example and pseudo code. Limitations of BB84 and comparative study of both the existing and the improved one based on their security has been made and described in this current work.


Download data is not yet available.

Article Details

Author Biography

KAUSIK SAHA, Department of Computer Applications, National Institute of Technology Jamshedpur, Jamshedpur-831014, Jharkhand, India.

I am a student of Master of Technology (M.Tech.) in Information Systems security Engineering of National Institute of Technology Jamshedpur, India.


W. Stallings, “Cryptography and Network Security: Principles and Practiceâ€, 6th ed., Pearson Education Inc., 2014, pp. 9-12.

Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Securityâ€, 3rd ed., Tata McGraw Hill Education(India) Pvt. Ltd., New Delhi, 2016.

N. Kaur, “Enhancement of Network Security Techniques using Quantum Cryptographyâ€, International Journal on Computer Science and Engineering (IJCSE), 2011.

Zhao Sheng-Mei, Li Fei, and Zheng Bao-yu, “A Proof of Security of Quantum Key Distribution in Probabilistic Clone Schemeâ€, Communication Technology Proceedings (ICCT), vol. 2, 2003, pp. 1507-09.

Miss. Payal P. Kilor, Mr. Pravin. D. Soni, “Quantum Cryptography: Realizing next generation information securityâ€, International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 2, February 2014.

C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossingâ€, Proceeding of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175-179.

Hitesh Singh, D.L. Gupta, A.K Singh, “Quantum Key Distribution Protocols: A Reviewâ€, IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, ver. XI (Mar-Apr. 2014), pp. 01-09.

C. H. Bennett, F. Bassett, G. Brassard, L. Salvia, and J. Smiling, “Experimental quantum cryptography,†J. Cryptal. vol. 5, no. 1, 1992, pp. 3–28.

Akash Shrivastava, Manvendra Singh, “A Security Enhancement Approach in Quantum Cryptographyâ€, IEEE 5thInternation Conference on Computers and devices for Communications(CODEC), 2012.