Research Article Open Access

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Iyed Ben Slimen, Olfa Trabelsi, Houria Rezig, Ridha Bouallègue and Ammar Bouallègue


BB84 (Bennett and Brassard 1984) is one of the well known protocols of quantum keys distribution. It is built to allow two interlocutors commonly called Alice and Bob to share two similar binary keys and to detect the eavesdropper presence (the eavesdropper is commonly called Eve). However, Eve presence in a disturbed environment causes errors to the sifted keys and decreases the amount of secure information between Alice and Bob. One of the most important stages in BB84 protocol is to decide by using error probability estimation if we can continue the protocol phases or no. Indeed, this decision is function of some factors like: what is the amount of information that we will lose in the error correction phase? What is the degree of errors detected in our sifted keys? What is the origin of these errors: Eve strategy or the channel disturbance? For these reasons, we will study in this study some conditions to stop BB84 protocol in the context of depolarizing channel. We implement two types of eavesdropping strategy: Intercept and Resend and Cloning Attack.

Journal of Computer Science
Volume 3 No. 6, 2007, 424-429


Submitted On: 24 March 2007 Published On: 30 June 2007

How to Cite: Slimen, I. B., Trabelsi, O., Rezig, H., Bouallègue, R. & Bouallègue, A. (2007). Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) . Journal of Computer Science, 3(6), 424-429.

  • 7 Citations



  • Error probability
  • secure information
  • decision threshold
  • sifted keys