Preprint / Version 1

Bridging Classical and Quantum Cryptography: Evaluating BB84 and the Role of Entanglement in Secure Communication

##article.authors##

  • Vidarth Anbu N/A

DOI:

https://doi.org/10.58445/rars.3150

Keywords:

Cryptographic protocols, Quantum Cryptography, Secure Communication

Abstract

In the modern digital era, cryptographic protocols form the foundation of secure communication, from safeguarding messages to protecting national infrastructure. For years classical encryption techniques served the role of protecting our information; however, due to technological advancements not only in the engineering field but also in the field of physics classical encryption no longer provides reliable and safe security [2][3][4][7]. Quantum communication has introduced a fundamentally new paradigm in secure communication, most notably through the BB84 protocol [1]. This protocol uses a fundamentally different approach to security that offers unbreakable encryption [10]. The advances of the field not only offer protection but also open the possiblity to different approaches to attack [11][15]. However, despite its clear advantages, the widespread adoption of the BB84 protocol in everyday communication remains limited by technological and physical barriers [11][15]. These challenges include photon loss in transmission, limited key generation rates, short coherence of quantum states, and difficulty integrating these complex systems with existing classical infrastructures [14][17]. Furthermore, achieving scalability to support large, complex networks introduces new constraints [14]. While these systems can enable fast and long distance transmission, these technologies still remain developmental as well. This paper argues that an overlooked challenge in integrating quantum systems with classical infrastructure is the absence of entanglement in the BB84 protocol, which forces a reliance on classical components that introduce interference and instability [14][18][10]. Although the benefits of entanglement–based protocols are recognized in the literature [8][10] [19] the consequences of the BB84’s non entangled design remains underexplored [14][17][13].

References

Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (pp. 175–179). IEEE.

Nielsen, M. A., & Chuang, I. L. (2010). Quantum computation and quantum information (10th anniversary ed.). Cambridge University Press.

Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484–1509. https://doi.org/10.1137/S0097539795293172

Grover, L. K. (1996). A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing (pp. 212–219). ACM. https://doi.org/10.1145/237814.237866

Singh, S. (2000). The code book: The science of secrecy from ancient Egypt to quantum cryptography. Anchor Books.

Kahn, D. (1996). The codebreakers: The comprehensive history of secret communication from ancient times to the Internet. Scribner.

Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). Wiley.

Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661–663. https://doi.org/10.1103/PhysRevLett.67.661

Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802–803. https://doi.org/10.1038/299802a0

Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dusek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301–1350. https://doi.org/10.1103/RevModPhys.81.1301

Lo, H.-K., & Chau, H. F. (1999). Unconditional security of quantum key distribution over arbitrarily long distances. Science, 283(5410), 2050–2056. https://doi.org/10.1126/science.283.5410.2050

Lo, H.-K., Curty, M., & Qi, B. (2012). Measurement-device-independent quantum key distribution. Physical Review Letters, 108(13), 130503. https://doi.org/10.1103/PhysRevLett.108.130503

Lütkenhaus, N. (2000). Security against individual attacks for realistic quantum key distribution. Physical Review A, 61(5), 052304. https://doi.org/10.1103/PhysRevA.61.052304

Branciard, C., Gisin, N., Kraus, B., & Scarani, V. (2005). Security of two quantum cryptography protocols using the same four qubit states. Physical Review A, 72(3), 032301. https://doi.org/10.1103/PhysRevA.72.032301

Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., … & Wallden, P. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236. https://doi.org/10.1364/AOP.361502

Shor, P., & Preskill, J. (2000). Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters, 85(2), 441–444. https://doi.org/10.1103/PhysRevLett.85.441

Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145–195. https://doi.org/10.1103/RevModPhys.74.145

Bennett, C. H., Brassard, G., & Mermin, N. D. (1992). Quantum cryptography without Bell’s theorem. Physical Review Letters, 68(5), 557–559. https://doi.org/10.1103/PhysRevLett.68.557

Renner, R. (2008). Security of quantum key distribution. International Journal of Quantum Information, 6(1), 1–127. https://doi.org/10.1142/S0219749908003256

Tittel, W., & Weihs, G. (2001). Photonic entanglement for fundamental tests and quantum communication. Quantum Information & Computation, 1(2), 3–56.

Bennett, C. H., Brassard, G., Crépeau, C., & Maurer, U. M. (1995). Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6), 1915–1923. https://doi.org/10.1109/18.476316

Brassard, G., & Salvail, L. (1994). Secret key reconciliation by public discussion. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 410–423). Springer. https://doi.org/10.1007/3-540-48285-7_35

Bennett, C. H., DiVincenzo, D. P., Smolin, J. A., & Wootters, W. K. (1996). Mixed-state entanglement and quantum error correction. Physical Review A, 54(5), 3824–3851. https://doi.org/10.1103/PhysRevA.54.3824

Takesue, H., Nam, S. W., Zhang, Q., Hadfield, R. H., Honjo, T., Tamaki, K., & Yamamoto, Y. (2007). Quantum key distribution over 40-dB channel loss using superconducting single-photon detectors. Nature Photonics, 1(6), 343–348. https://doi.org/10.1038/nphoton.2007.22

Sabottke, C. F., Richardson, C. D., & Anisimov, P. M. (2011). Thwarting the photon number splitting attack with entanglement enhanced BB84 quantum key distribution. arXiv. https://arxiv.org/abs/1111.4510

Downloads

Posted

2025-10-01