Skip to content
#

bb84-protocol

Here are 20 public repositories matching this topic...

The security of our critical infrastructure is threatened by the advent of future quantum computers, breaking asymmetric cryptography – an essential part of our secure communication architecture. Quantum key distribution (QKD) remedies this weakness by providing a long term secure solution, safe against attacks from quantum computers.

  • Updated Jul 15, 2020
  • Python

This project demonstrates a basic implementation of the BB84 quantum key distribution protocol using Qiskit. The code simulates the process of Alice preparing quantum bits (qubits) with random bases and sending them to Bob, who then measures them with his own randomly chosen bases.

  • Updated Sep 4, 2024
  • Python

A simulation of the BB84 protocol in a Jupyter Notebook using the code from https://qiskit.org/textbook/ch-algorithms/quantum-key-distribution.html. Protocol steps until key sifting have been implemented. Error correction & parameter estimation were not executed.

  • Updated Sep 6, 2024
  • Jupyter Notebook

Federated Multimodal Cyberattack classification model on social media messages (utilizing blockchain and quantum key cryptography). Blockchain server at https://cyberattack-blockchain.onrender.com/. Model interaction link below.

  • Updated Nov 17, 2024
  • Jupyter Notebook

Improve this page

Add a description, image, and links to the bb84-protocol topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the bb84-protocol topic, visit your repo's landing page and select "manage topics."

Learn more