filmov
tv
The BB84 Quantum Key Exchange Protocol Explained
![preview_player](https://i.ytimg.com/vi/IE5952ExMK8/maxresdefault.jpg)
Показать описание
#cryptology, #cryptography, #cryptanalysis
The BB84 is a key exchange protocol for establishing a secret key between two parties (e.g. Alice and Bob) securely. In contrast to other (common) protocols like Diffie-Hellman-Merkle or RSA, the BB84 protocol's security is not based on hard mathematical problems. Its security is based on actual physical properties of light (quantums). Due to that, Alice and Bob exchange a key using light and they can measure if an attacker (Eve) is also listening and receiving the key while they exchange it. If they detect and attacker, they change their communication channel and restart the protocol.
In this video, we explain how the BB84 protocol works. We also have a look at its security, so what happens when an attacker is present. Finally, we have a look at the implementation of a simulation of the BB84 protocol in CrypTool 2.
The BB84 is a key exchange protocol for establishing a secret key between two parties (e.g. Alice and Bob) securely. In contrast to other (common) protocols like Diffie-Hellman-Merkle or RSA, the BB84 protocol's security is not based on hard mathematical problems. Its security is based on actual physical properties of light (quantums). Due to that, Alice and Bob exchange a key using light and they can measure if an attacker (Eve) is also listening and receiving the key while they exchange it. If they detect and attacker, they change their communication channel and restart the protocol.
In this video, we explain how the BB84 protocol works. We also have a look at its security, so what happens when an attacker is present. Finally, we have a look at the implementation of a simulation of the BB84 protocol in CrypTool 2.
The BB84 Quantum Key Exchange Protocol Explained
Quantum Key Distribution, BB84 - simply explained | Quantum 1x1
BB84 Protocol of quantum key distribution
How Quantum Key Distribution Works (BB84 & E91)
Quantum cryptography: The BB 84 protocol (U3-02-03)
9-3 BB84 Protocol
28.Quantum key distribution I: BB84 protocol
QKD - BB84 Protocol - Sarah Croke - QCSYS 2011
Quantum Science and Technology Webinar Series - Session 3 - Quantum Cryptography
What is the BB84 Protocol? | Quantum Cryptography | Q-munity Tech
What is Quantum Cryptography? An Introduction
A Brief of the BB84 Quantum Key Distribution
Quantum cryptography, animated
Steve Girvin: Secure Communication in a Quantum World – BB84 Protocol
Quantum Key Distribution | QuTech Academy
IQIS Lecture 5.7 — Quantum key distribution
MS17164 IDC452 Seminar Delivery on Quantum Key Distribution BB84 Protocol
Quantum cryptography explained
BB84: Quantum Protected Cryptography
Lecture 9.3 | The BB84 Protocol (Part1)
Quantum Cryptography BB84
Quantum Cryptography Explained
23: The BB84 key distribution scheme
Security of Quantum Key Distribution 6: Prepare-and-Measure Protocols
Комментарии