• DocumentCode
    260220
  • Title

    Statistical analysis for random bits generation on quantum key distribution

  • Author

    Jasim Mohammad, Omer K. ; Abbas, Safia ; El-Horbaty, El-Sayed M. ; Salem, Abdel-Badeeh M.

  • Author_Institution
    FCIS, Ain Shams Univ., Cairo, Egypt
  • fYear
    2014
  • fDate
    April 29 2014-May 1 2014
  • Firstpage
    45
  • Lastpage
    51
  • Abstract
    Recently, Quantum cryptography researchers utilize the quantum keys, in order to provide a more trusted environment for both key distribution and management processes. The quantum keys are generated based on quantum mechanics phenomena. However, all events for the quantum key generation rely on exchanging photons between parties over limited distances. So, in this paper, random tests algorithms, such as NIST and DIEHARD, are implemented to test and evaluate the randomness rates for quantum keys generation. After then, the initialized vector, which is the seed of the symmetric encryption algorithms, is established based on specific analysis to be a key for the algorithms. The paper utilizes the (BB84) quantum key distribution (QKD) protocol based on two different innovated modes, the raw and privacy modes.
  • Keywords
    cryptographic protocols; quantum cryptography; statistical analysis; DIEHARD algorithm; NIST algorithm; QKD protocol; key distribution process; key management process; privacy mode; quantum cryptography; quantum key distribution; quantum mechanics phenomenon; random bits generation; random tests algorithm; raw mode; statistical analysis; Algorithm design and analysis; Encryption; NIST; Photonics; Privacy; Protocols; binary distribution; cryptographic analysis; pseudo random number; quantum key distribution; random number generator; statistical test;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2014 Third International Conference on
  • Conference_Location
    Beirut
  • Print_ISBN
    978-1-4799-3905-3
  • Type

    conf

  • DOI
    10.1109/CyberSec.2014.6913970
  • Filename
    6913970