Research Article Open Access

Quantum Cryptography with Several Cloning Attacks

Mustapha Dehmani, Hamid Ez-Zahraouy and Abdelilah Benyoussef


Problem statement: In a previous research, we investigated the quantum key distribution of the well known BB84 protocol with several intercept and resend attacks. In the present research, we studied the effect of many eavesdroppers cloning attacks of the Bennett-Brassard cryptographic protocol on the quantum error and mutual information between honest parties and information with sender for each eavesdropper. Approach: The quantum error and the mutual information were calculated analytically and computed for arbitrary number of cloning attacks. Our objective in this study was to know if the number of the eavesdroppers and their angle of cloning act on the safety of information. Results: It was found that the quantum error and the secured/no secured transition depend strongly on the number of eavesdropper and their angle of attacks. The particular cases where all eavesdroppers collaborate were also investigated. Conclusion: Furthermore, the cloning attack’s quantum error is lower than the intercept and resends attacks one, which means that the cloning attacks is the optimal one for arbitrary number of eavesdropper.

Journal of Computer Science
Volume 6 No. 7, 2010, 684-688


Submitted On: 11 May 2010 Published On: 31 July 2010

How to Cite: Dehmani, M., Ez-Zahraouy, H. & Benyoussef, A. (2010). Quantum Cryptography with Several Cloning Attacks. Journal of Computer Science, 6(7), 684-688.

  • 7 Citations



  • Quantum
  • cryptography
  • cloning
  • eavesdroppers