Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/2572
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMustafa, Sara Idris Babiker
dc.contributor.authorSupervisor,- Nafie Abdellateef
dc.date.accessioned2013-12-03T07:00:38Z
dc.date.available2013-12-03T07:00:38Z
dc.date.issued2006-12-01
dc.identifier.citationMustafa , Sara Idris Babiker. Simulation of Quantum Cryptography Based on Ekert Protocol / Sara Idris Babiker Mustafa ; Nafie Abdellateef .- Khartoum : sudan university of scince and technology , Institute of Laser , 2006 .- 101 P. : ill. ; 28 cm.- PhD.en_US
dc.identifier.urihttp://repository.sustech.edu/handle/123456789/2572
dc.descriptionThesisen_US
dc.description.abstractQuantum cryptography is new science that relies on the use of protocol designed to exploit quantum mechanical phenomena to achieve the secrecy of cryptographic keys. The purpose of quantum key distribution is for two correspondents, who share no secret information initially, to agree on random keys, which remain secret against attacks from more powerful analytic or computational tools. In this thesis: simulation software for a quantum cryptography based on Ekert – protocol was built. Ekert protocol based on Bell's theorem that can expose eavesdroppers by violated Bell's inequality. Error can occur in quantum transmission due eavesdropping and system inefficiencies. Thus, error elimination technique was implemented. After Error elimination an important mathematical technique called privacy amplification was implemented. The simulation software was built in Borland Delphi language version 7. The simulation result was displayed in an interactive manner with respect to the software user, which explains the effect of number of EPR photons pair on number of coincidences, expected error and Bell's parameter, in case of no-eavesdropping. Also effect of point wise privacy amplification parameters on Eve's information was discussed. In Addition, some examples of encryption and decryption of message was presented to explain the successful of software.en_US
dc.description.sponsorshipSudan University Of Science and Technologyen_US
dc.language.isoenen_US
dc.publishersudan university of scince and technologyen_US
dc.subjectQuantum cryptographyen_US
dc.subjectEkert – protocolen_US
dc.subjecteavesdroppingen_US
dc.subjectErroren_US
dc.subjectsimulation softwareen_US
dc.titleSimulation of Quantum Cryptography Based on Ekert Protocolen_US
dc.typeThesisen_US
Appears in Collections:PhD theses : Laser

Files in This Item:
File Description SizeFormat 
Simulation of Quantum ... .pdfTitle 117.74 kBAdobe PDFView/Open
Abstract.pdfAbstract117.74 kBAdobe PDFView/Open
Chapter 1 .pdf
  Restricted Access
Chapter1.6 MBAdobe PDFView/Open Request a copy
Contents.pdfContents112.17 kBAdobe PDFView/Open
Resersh.pdf
  Restricted Access
Resersh53.87 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.