You are on page 1of 3

Proc. of 2014 IEEE 5th International Conference on Photonics (ICP), Kuala Lumpur, 2-4 Sept.

2014

Simulation of Bennet and Brassard 84 Protocol with


Eve’s Attacks
N. Hafizah Mohamed Halip, M. Mokhtar A. Buhari
Dept. of Computer and Communication System Faculty of Computer Science and Information,
Engineering, Faculty of Engineering, Universiti Putra Universiti Putra Malaysia, Serdang, Malaysia
Malaysia, Serdang, Malaysia

Abstract—A simulation of BB84 protocol of QKD using pho- diagonal or rectilinear. Then, she will send a bit for each
tonic simulator OptiSystem is demonstrated. The simulation is photon with corresponding polarization to Bob. When Bob
divided into two categories which are without security attacks receive the bit that Alice gave to him, he will measure
scenario and with several attacks scenario that consists of
Intercept and Resend and sent new qubits. The simulation the photon’s polarization by a randomly chosen basis. The
results meet the theory of BB84. This project is able to provide percentage of Bob getting the same basis with Alice is in
better understanding about the quantum key distribution process 50% chances. If there is a presence of Eve at this moment,
especially in BB84 protocol. Eve will approximately obtain the correct bit by 25% [3].
Index Terms—BB84 Protocol; Cryptography; Quantum Cryp- For the second phase, Bob will contact Alice in the classic
tography; Quantum Key Distribution; Optisystem
channel to tell her what basis that he used to measure each
I. I NTRODUCTION photon. Alice will compare Bob basis and her basis and will
inform back to Bob whether he used the correct basis for each
The security has become one of the most important tasks in
photon. After doing this, both of Alice and Bob will discard
wired and wireless network. In order to have a good security in
the photon that Bob measured with a different basis. Lastly,
the network, it must achieve all the security goals which are,
Alice and Bob will have an identical string of bits that known
authentication, confidentiality, available, integrity and access
as sifted key [4].
control. In the communication fields, cryptographic technique
is commonly used for secure communications. Charles Bennett III. P ROPOSED M ODELING AND S IMULATION S ETUP
and Gilles Brassard introduced the first Quantum Key Distri-
In this modeling and simulation, we used the OptiSystemTM
bution in 1984 known as BB84 protocol [1]. The main idea of
7.0 software that offers optical communication devices sim-
this protocol is the sender can send a random secret key that
ulator. The components that we used in this simulation are
are encoded in polarization of photons to the receiver in a form
User Defined Bit Sequence Generator, Optical Gaussian Pulse
of string of photons. This protocol is based on Heisenberg’s
Generator, Optical Attenuator, Linear Polarizer, Polarization
Uncertainty Principle that can guarantee an eavesdropper can-
Rotator, Select, Optical Fiber, Switch and Polarization Ana-
not measure the photon that send from Alice to Bob without
lyzer. In this simulation the User Defined Bit Sequence Gener-
disturbing the photons state in a noticeable way [2].
ator, Optical Gaussian Pulse Generator and Optical Attenuator
II. BB84 P ROTOCOL component is used to produce single photon per pulse [5].
In BB84 protocol, rectilinear basis (+) and diagonal basis The linear polarizer and polarization rotator is used to make
(×) is used are the basis sequence. Rectilinear basis consist the photon in the desirable angle. The function of switch is
of two polarization state which is horizontal polarization (0◦ ) to generate randomness in sending the polarization of photon
and vertical polarization (90◦ ). The horizontal and the vertical during transmitting and during detection using rectilinear or
polarization represent of 0 and 1 bit. It is same goes to the diagonal basis detection [6].
diagonal basis that consist of two polarization state which are A. BB48 Protocol Simulation
45 represent 0◦ bit and -45◦ represent 1 bit. Table I shows the
bit value representation by BB84. Fig. 1 shows the simulation setup for BB84. We used four
units of each user defined bit sequence generator, optical
TABLE I: Encoding technique in BB84 Gaussian pulse generator and optical attenuator to create a
single photon per pulse. We set the optical attenuator to 30 dB
Polarization Mode Symbol Bit value 0 Bit value 1
Rectiliner Basis + 0◦ , → 90◦ , ↑ and the input power is 0.0002 Watts. After we were able to get
Diagonal Basis × 45◦ , % 135◦ , - a single photon per pulse propagate thought the optical fiber,
we set four type of polarizer which are vertical horizontal, right
The first phase of this protocol is Alice will communicate diagonal and left diagonal. There are 100 sets of iteration in
to Bob using quantum channel. Alice will pick randomly this simulations and each iteration, the component ‘select’ will
string of bit and she will randomly choose a basis either choose randomly one of the polarization angles to set a qubit

978-1-4799-4883-3/14/$31.00 c 2014 IEEE 29


Proc. of 2014 IEEE 5th International Conference on Photonics (ICP), Kuala Lumpur, 2-4 Sept. 2014

to the receiver side via optical fiber. The component ‘select’ TABLE II: The Simulation Result With and Without Eve’s
is also used at the receiver side to simulate the randomness Attack
of selecting the diagonal or liner polarization [7]. Lastly, the Alice Eve Bob Action
polarization analyzer is used to measure the angle of the Polarization Bit Attack Bit Action Polarization Bit
(degree) (degree)
photon detected. Horizontal 0 Nil - 7 Rectilinear 0 Sift key
(0) (0)
Vertical 1 Nil - 7 Rectilinear 1 Sift key
(90) (90)
Diagonal 0 Nil - 7 Diagonal 0 Sift key
(45) (45)
Diagonal 1 Nil - 7 Diagonal 1 Sift key
(-45) (-45)
Vertical 1 Nil - ? Diagonal 0 Discard
(90) (45)
Diagonal 0 Nil - ? Rectilinear 1 Discard
(45) (90)
Horizontal 0 Intercept 0 3 Rectilinear 0 Sift key
(0) Resend (0)
Fig. 1: BB84 without Eve (Recti-
linear)
Vertical 1 Intercept 0 7 Rectilinear 1 Sift key
(90) Resend (90)
B. BB84 Operation with Eve’s Attacks (D)
Diagonal 0 Intercept 0 3 Diagonal 0 Sift key
In our simulation shown in Fig. 2, we utilized a simple (45) Resend (45)
model of demonstrating the attacks. We generalize the Eve’s (D)
attack usually based on Intercept-Resend attack strategy and Diagonal 1 Intercept 0 7 Diagonal 1 Sift key
(-45) Resend (-45)
sending a new qubit to Bob. Eve is connected between Alice (Recti-
and Bob. She launched attack to obtain the key or information linear)
from the transmitter Eve able to intercept on received qubits Horizontal 0 Intercept 1 ? Diagonal 1 Discard
and measure the qubits with rectilinear polarizers and diagonal (0) Resend (45)
(Recti-
polarizers shown in the figure. Eve will resent the qubit to Bob linear)
after she had measure it. Another attack that Eve are able to Horizontal 0 Send 0 3 Rectilinear 0 Sift key
do is she can send a new qubit to Bob. Further, she sends new (0) New (0)
Qubit
qubit to Bob that are no related to what Alice had sent. We (Recti-
use ‘select’ component for Eve’s attacks. The total number of linear)
sweep iteration is 100. Finally, we compare the polarization Diagonal 1 Send 1 7 Diagonal 1 Sift key
(45) New (45)
basis between Alice, Eve and Bob’s. Qubit
(Recti-
linear)
Diagonal 0 Send 0 ? Rectilinear 1 Discard
(-45) New (90)
Qubit
(D)
Diagonal 1 Send 1 ? Rectilinear 0 Discard
(-45) New (0)
Qubit
(D)

Meanwhile Fig. 3 shows the result of the same photon sent


by Alice and received by Bob in the same basis with the
absence of Eve. Based on our simulation which have iteration
of 100, we found that number of qubits receives by Bob is
Fig. 2: BB84 with Eve roughly half of what Alice had sent which is 54 same basis
of qubits.
Fig. 4 shows the result of the same photon sent by Alice
IV. R ESULTS AND D ISCUSSION
and received by Bob in the same basis with the presence of
Table II shows the simulation result with and without the Eve. The result combines two attacks which are ‘intercept
Eve’s attack on BB84. Alice Bob will keep the sifted key and and resent’ and ‘Eve send a new qubit’ to Bob. The result
discard any bit that they having different basis. We can see shown that number of qubits receives by Bob is roughly half
that, even with the presence of Eve, Alice and Bob still can of what Alice had sent which is 54 same basis of qubits in are
maintain the secrecy of their bit. ‘intercept and resent attack’ and the correct qubit that Eve get

30
Proc. of 2014 IEEE 5th International Conference on Photonics (ICP), Kuala Lumpur, 2-4 Sept. 2014

[4] V. Scarani, A. Acin, G. Ribordy, and N. Gisin, “Quantum cryptography


protocols robust against photon number splitting attacks for weak laser
pulse implementations,” Physical Review Letters, vol. 92, no. 5, p.
057901, 2004.
[5] S. Lafrance, “Symbolic approach to the analysis of security protocols.”
J. UCS, vol. 10, no. 9, pp. 1156–1198, 2004.
[6] H.-K. Lo, H.-F. Chau, and M. Ardehali, “Efficient quantum key dis-
tribution scheme and a proof of its unconditional security,” Journal of
Cryptology, vol. 18, no. 2, pp. 133–165, 2005.
[7] S. J. Gay and R. Nagarajan, “Types and typechecking for communicat-
ing quantum processes,” Mathematical Structures in Computer Science,
vol. 16, no. 03, pp. 375–406, 2006.

Fig. 3: Same Photon Sent By Alice and Received By Bob in


the Same Basis with the Absence of Eve

is almost half compare to Bob. In this case we can say that


the percentage of Bob obtains the qubit in same basis is 50%
and 25% for Eve. In sending new qubit scenario attack, we
can notice that the percentage of of Bob get the qubit in same
basis is slight lower that intercept and resent attack. However,
the percentage of Eve getting the correct qubit is still half of
percentage of Bob.

Fig. 4: Comparison of Performance between IR Attack and


Send New Qubit Attack

V. C ONCLUSION
We have simulated BB84 protocol of QKD using photonic
simulator OptiSystem. It has been proved from this simulation
that we are able to get the result similar with the theory.
R EFERENCES
[1] A. Buhari, Z. A. Zukarnai, S. K. Subramaniam, H. Zainuddin, and
S. Saharudin, “Bb84 and noise immune quantum key distribution pro-
tocols simulation: An approach using photonic simulator,” in Interna-
tional Conference on Computer and Intelligent Systems (ICCIS2012) &
International Conference of Electrical, Electronics, Instrumentation and
Biomedical Engineering (ICEEIB2012), p. 30.
[2] M. Elboukhari, M. Azizi, and A. AziziL, “Analysis of the security of
BB84 by model checking.” International Journal of Network Security &
Its Applications, vol. 2, no. 2, 2010.
[3] F. Gao, S.-J. Qin, F.-Z. Guo, and Q.-Y. Wen, “Dense-coding attack on
three-party quantum key distribution protocols,” Quantum Electronics,
IEEE Journal of, vol. 47, no. 5, pp. 630–635, 2011.

31

You might also like