Exploring Quantum Key Distribution (QKD) Protocols for Secure Communication Over Classical Networks

Authors

  • Vikram Nair Full Stack Developer, London, UK Author

Keywords:

Quantum key distribution (QKD), BB84 protocol, E91 protocol, continuous-variable QKD, quantum cryptography, classical networks, secure communication, quantum mechanics, encryption, cybersecurity

Abstract

Quantum Key Distribution (QKD) represents a groundbreaking advancement in cryptographic security, leveraging the principles of quantum mechanics to facilitate secure communication. Unlike classical encryption methods, which rely on computational complexity, QKD provides unconditional security based on the laws of physics. This paper explores the theoretical foundations, implementation challenges, and recent advancements in QKD protocols, with a focus on their integration into classical networks. We examine various QKD protocols, including BB84, E91, and continuous-variable QKD, analyzing their security properties and vulnerabilities. Furthermore, we review state-of-the-art experimental implementations, network architectures, and their potential applications in modern communication infrastructures. Through an extensive literature review of research conducted before 2023, we provide insights into the limitations and future prospects of QKD, highlighting its role in securing next-generation communication networks. Additionally, we present experimental data, security comparisons, and a performance analysis of different QKD implementations.

References

Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175–179.

Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661–663.

Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145–195.

Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301–1350.

Sasaki, M., Fujiwara, M., Ishizuka, H., Klaus, W., Wakui, K., Takeoka, M., Tanaka, A., Yoshino, K., Nambu, Y., & Tomita, A. (2011). Field test of quantum key distribution in the Tokyo QKD network. Optics Express, 19(11), 10387–10409.

Hwang, W. Y. (2003). Quantum key distribution with high loss: Toward global secure communication. Physical Review Letters, 91(5), 057901.

Gottesman, D., & Lo, H. K. (2003). Proof of security of quantum key distribution with two-way classical communications. IEEE Transactions on Information Theory, 49(2), 457–475.

Renner, R. (2008). Security of quantum key distribution. International Journal of Quantum Information, 6(1), 1–127.

Dianati, M., Alléaume, R., Gagnaire, M., & Bouda, J. (2008). Architecture and protocols of the future European quantum key distribution network. Security and Communication Networks, 1(1), 57–74.

Sharma, P., Agrawal, A., & Bhatia, V. (2021). Quantum key distribution secured optical networks: A survey. IEEE Transactions on Communications, 69(5), 3025–3040.

Kong, P. Y. (2020). A review of quantum key distribution protocols in the perspective of smart grid communication security. IEEE Systems Journal, 14(3), 3851–3862.

Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2), 025002.

Syambas, N. R., & Nurhadi, A. I. (2018). Quantum key distribution (QKD) protocols: A survey. International Conference on Information Technology and Electrical Engineering, 1–6.

Sasaki, T., Yamamoto, Y., & Koashi, M. (2014). Practical quantum key distribution protocol without monitoring signal disturbance. Nature, 509(7498), 475–478.

Padamvathi, V., & Vardhan, B. V. (2016). Quantum cryptography and quantum key distribution protocols: A survey. Proceedings of the IEEE 6th International Conference on Communication Systems and Networks (COMSNETS), 1–6.

Amarnath, G., & Kartheek, D. N. (2013). Security in quantum computing using quantum key distribution protocols. Proceedings of the IEEE Conference on Information, Communication, Control and Computing, 1–5.

Zhang, Z., Zhuang, Q., Wong, F. N. C., & Shapiro, J. H. (2017). Floodlight quantum key distribution: Demonstrating a framework for high-rate secure communication. Physical Review A, 95(1), 012332.

Tanizawa, Y., Takahashi, R., & Sato, H. (2016). A secure communication network infrastructure based on quantum key distribution technology. IEICE Transactions on Communications, E99-B(5), 1054–1063.

Oesterling, L., Hayford, D., & Friend, G. (2012). Comparison of commercial and next-generation quantum key distribution technologies for secure communication of information. IEEE International Conference on Technologies for Homeland Security (HST), 1–6.

Renner, R., & Cirac, J. I. (2009). De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Physical Review Letters, 102(11), 110504.

Downloads

Published

2025-03-10

How to Cite

Vikram Nair. (2025). Exploring Quantum Key Distribution (QKD) Protocols for Secure Communication Over Classical Networks. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 13(2), 20-29. https://jrtcse.com/index.php/home/article/view/JRTCSE.2025.13.2.3