Журнал «Современная Наука»

Russian (CIS)English (United Kingdom)
MOSCOW +7(495)-142-86-81

MODIFICATION OF THE CLASSICAL QUANTUM PROTOCOLBB84, INCREASING ITS CHARACTERISTICS

Kirill Lyashenko Aleksandrovich  (Sixth year student of the Faculty of the Don State Technical University)

Porksheyan Vitaly Markosovich  (Ph.D., Associate Professor, Dean of Computer Science and EngineeringFaculty ofthe Don State Technical University )

Cherkesova Larisa Vladimirovna  (DSc., Professor of the Don State Technical University)

Revyakina Elena Aleksandrovna  (Ph.D., Associate Professor of the Don State Technical University)

Yengibaryan Irina Alyeshaevna  (Ph.D., Associate Professor of the Don State Technical University)

Buryakova Olga Sergeevna  (Ph.D., Associate Professor of the Don State Technical University)

Reshetnikova Olga Alexandrovna  (First year student of Russian Customs Academy, Rostov branch)

The article draws the attention to the field of quantum cryptography, namely, to its specific section concerning the development of quantum cryptographic protocols, on the creation of which scientists from various countries have been working for almost forty years. Quantum cryptography is considered today as the technology capable to form the new unique appearance of telecommunication networks of the future. However, at the same time, no one with full confidence can to predict guaranteed what fully formed quantum Internet infrastructure will look like, and what outcome it may lead to. The article puts forward new hypothesis regarding the universal improvement of quantum protocols, using the example of modification of the classical quantum protocol BB84. The application of the idea put forward by the authors is based on the theory of artificial manufactured reconstruction of photons and their further use, which makes it possible to significantly reduce the possibility of potential threats, as well as to avoid situations associated with vulnerabilities of quantum algorithms. The proposed method is combined. By applying false photon states and creating many traps for intruders, it is possible to achieve such increasing in the resources spent on the attack that will make this attack, in the end, the useless occupation. Any hacker will be much less likely to guess the desired data transfer qubit and the quantum state of polarization. Simulated copies of photons, in addition to their main task, can become bait for any hacker, capable of driving him into the trap, thereby confirming his presence in the communication channel. At the same time, the process of breaking the communication channel will no longer be inevitable, which will avoid interrupting the functioning of the communication line.

Keywords:quantum protocols, quantum cryptography, modification of the BB84 quantum protocol, quantum key distribution, error threshold

 

Read the full article …



Citation link:
Kirill L. A., Porksheyan V. M., Cherkesova L. V., Revyakina E. A., Yengibaryan I. A., Buryakova O. S., Reshetnikova O. A. MODIFICATION OF THE CLASSICAL QUANTUM PROTOCOLBB84, INCREASING ITS CHARACTERISTICS // Современная наука: актуальные проблемы теории и практики. Серия: Естественные и Технические Науки. -2023. -№02. -С. 100-115 DOI 10.37882/2223–2966.2023.02.26
LEGAL INFORMATION:
Reproduction of materials is permitted only for non-commercial purposes with reference to the original publication. Protected by the laws of the Russian Federation. Any violations of the law are prosecuted.
© ООО "Научные технологии"