SUST Repository

Simulation of Quantum Cryptography Based on Ekert Protocol

Show simple item record

dc.contributor.author Mustafa, Sara Idris Babiker
dc.contributor.author Supervisor,- Nafie Abdellateef
dc.date.accessioned 2013-12-03T07:00:38Z
dc.date.available 2013-12-03T07:00:38Z
dc.date.issued 2006-12-01
dc.identifier.citation Mustafa , Sara Idris Babiker. Simulation of Quantum Cryptography Based on Ekert Protocol / Sara Idris Babiker Mustafa ; Nafie Abdellateef .- Khartoum : sudan university of scince and technology , Institute of Laser , 2006 .- 101 P. : ill. ; 28 cm.- PhD. en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/2572
dc.description Thesis en_US
dc.description.abstract Quantum cryptography is new science that relies on the use of protocol designed to exploit quantum mechanical phenomena to achieve the secrecy of cryptographic keys. The purpose of quantum key distribution is for two correspondents, who share no secret information initially, to agree on random keys, which remain secret against attacks from more powerful analytic or computational tools. In this thesis: simulation software for a quantum cryptography based on Ekert – protocol was built. Ekert protocol based on Bell's theorem that can expose eavesdroppers by violated Bell's inequality. Error can occur in quantum transmission due eavesdropping and system inefficiencies. Thus, error elimination technique was implemented. After Error elimination an important mathematical technique called privacy amplification was implemented. The simulation software was built in Borland Delphi language version 7. The simulation result was displayed in an interactive manner with respect to the software user, which explains the effect of number of EPR photons pair on number of coincidences, expected error and Bell's parameter, in case of no-eavesdropping. Also effect of point wise privacy amplification parameters on Eve's information was discussed. In Addition, some examples of encryption and decryption of message was presented to explain the successful of software. en_US
dc.description.sponsorship Sudan University Of Science and Technology en_US
dc.language.iso en en_US
dc.publisher sudan university of scince and technology en_US
dc.subject Quantum cryptography en_US
dc.subject Ekert – protocol en_US
dc.subject eavesdropping en_US
dc.subject Error en_US
dc.subject simulation software en_US
dc.title Simulation of Quantum Cryptography Based on Ekert Protocol en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Share

Search SUST


Browse

My Account