dc.contributor.author |
Mustafa, Sara Idris Babiker |
|
dc.contributor.author |
Supervisor,- Nafie Abdellateef |
|
dc.date.accessioned |
2013-12-03T07:00:38Z |
|
dc.date.available |
2013-12-03T07:00:38Z |
|
dc.date.issued |
2006-12-01 |
|
dc.identifier.citation |
Mustafa , Sara Idris Babiker. Simulation of Quantum Cryptography Based on Ekert Protocol / Sara Idris Babiker Mustafa ; Nafie Abdellateef .- Khartoum : sudan university of scince and technology , Institute of Laser , 2006 .- 101 P. : ill. ; 28 cm.- PhD. |
en_US |
dc.identifier.uri |
http://repository.sustech.edu/handle/123456789/2572 |
|
dc.description |
Thesis |
en_US |
dc.description.abstract |
Quantum cryptography is new science that relies on
the use of protocol designed to exploit quantum
mechanical phenomena to achieve the secrecy of
cryptographic keys. The purpose of quantum key
distribution is for two correspondents, who share no
secret information initially, to agree on random keys,
which remain secret against attacks from more powerful
analytic or computational tools.
In this thesis: simulation software for a quantum
cryptography based on Ekert – protocol was built. Ekert
protocol based on Bell's theorem that can expose
eavesdroppers by violated Bell's inequality.
Error can occur in quantum transmission due
eavesdropping and system inefficiencies. Thus, error
elimination technique was implemented. After Error
elimination an important mathematical technique called
privacy amplification was implemented.
The simulation software was built in Borland
Delphi language version 7. The simulation result was
displayed in an interactive manner with respect to the
software user, which explains the effect of number of
EPR photons pair on number of coincidences, expected
error and Bell's parameter, in case of no-eavesdropping.
Also effect of point wise privacy amplification
parameters on Eve's information was discussed.
In Addition, some examples of encryption and
decryption of message was presented to explain the
successful of software. |
en_US |
dc.description.sponsorship |
Sudan University Of Science and Technology |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
sudan university of scince and technology |
en_US |
dc.subject |
Quantum cryptography |
en_US |
dc.subject |
Ekert – protocol |
en_US |
dc.subject |
eavesdropping |
en_US |
dc.subject |
Error |
en_US |
dc.subject |
simulation software |
en_US |
dc.title |
Simulation of Quantum Cryptography Based on Ekert Protocol |
en_US |
dc.type |
Thesis |
en_US |