Bridging Classical and Quantum Cryptography: Evaluating BB84 and the Role of Entanglement in Secure Communication
DOI:
https://doi.org/10.58445/rars.3150Keywords:
Cryptographic protocols, Quantum Cryptography, Secure CommunicationAbstract
In the modern digital era, cryptographic protocols form the foundation of secure communication, from safeguarding messages to protecting national infrastructure. For years classical encryption techniques served the role of protecting our information; however, due to technological advancements not only in the engineering field but also in the field of physics classical encryption no longer provides reliable and safe security [2][3][4][7]. Quantum communication has introduced a fundamentally new paradigm in secure communication, most notably through the BB84 protocol [1]. This protocol uses a fundamentally different approach to security that offers unbreakable encryption [10]. The advances of the field not only offer protection but also open the possiblity to different approaches to attack [11][15]. However, despite its clear advantages, the widespread adoption of the BB84 protocol in everyday communication remains limited by technological and physical barriers [11][15]. These challenges include photon loss in transmission, limited key generation rates, short coherence of quantum states, and difficulty integrating these complex systems with existing classical infrastructures [14][17]. Furthermore, achieving scalability to support large, complex networks introduces new constraints [14]. While these systems can enable fast and long distance transmission, these technologies still remain developmental as well. This paper argues that an overlooked challenge in integrating quantum systems with classical infrastructure is the absence of entanglement in the BB84 protocol, which forces a reliance on classical components that introduce interference and instability [14][18][10]. Although the benefits of entanglement–based protocols are recognized in the literature [8][10] [19] the consequences of the BB84’s non entangled design remains underexplored [14][17][13].
References
Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (pp. 175–179). IEEE.
Nielsen, M. A., & Chuang, I. L. (2010). Quantum computation and quantum information (10th anniversary ed.). Cambridge University Press.
Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484–1509. https://doi.org/10.1137/S0097539795293172
Grover, L. K. (1996). A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing (pp. 212–219). ACM. https://doi.org/10.1145/237814.237866
Singh, S. (2000). The code book: The science of secrecy from ancient Egypt to quantum cryptography. Anchor Books.
Kahn, D. (1996). The codebreakers: The comprehensive history of secret communication from ancient times to the Internet. Scribner.
Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). Wiley.
Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661–663. https://doi.org/10.1103/PhysRevLett.67.661
Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802–803. https://doi.org/10.1038/299802a0
Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dusek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301–1350. https://doi.org/10.1103/RevModPhys.81.1301
Lo, H.-K., & Chau, H. F. (1999). Unconditional security of quantum key distribution over arbitrarily long distances. Science, 283(5410), 2050–2056. https://doi.org/10.1126/science.283.5410.2050
Lo, H.-K., Curty, M., & Qi, B. (2012). Measurement-device-independent quantum key distribution. Physical Review Letters, 108(13), 130503. https://doi.org/10.1103/PhysRevLett.108.130503
Lütkenhaus, N. (2000). Security against individual attacks for realistic quantum key distribution. Physical Review A, 61(5), 052304. https://doi.org/10.1103/PhysRevA.61.052304
Branciard, C., Gisin, N., Kraus, B., & Scarani, V. (2005). Security of two quantum cryptography protocols using the same four qubit states. Physical Review A, 72(3), 032301. https://doi.org/10.1103/PhysRevA.72.032301
Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., … & Wallden, P. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236. https://doi.org/10.1364/AOP.361502
Shor, P., & Preskill, J. (2000). Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters, 85(2), 441–444. https://doi.org/10.1103/PhysRevLett.85.441
Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145–195. https://doi.org/10.1103/RevModPhys.74.145
Bennett, C. H., Brassard, G., & Mermin, N. D. (1992). Quantum cryptography without Bell’s theorem. Physical Review Letters, 68(5), 557–559. https://doi.org/10.1103/PhysRevLett.68.557
Renner, R. (2008). Security of quantum key distribution. International Journal of Quantum Information, 6(1), 1–127. https://doi.org/10.1142/S0219749908003256
Tittel, W., & Weihs, G. (2001). Photonic entanglement for fundamental tests and quantum communication. Quantum Information & Computation, 1(2), 3–56.
Bennett, C. H., Brassard, G., Crépeau, C., & Maurer, U. M. (1995). Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6), 1915–1923. https://doi.org/10.1109/18.476316
Brassard, G., & Salvail, L. (1994). Secret key reconciliation by public discussion. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 410–423). Springer. https://doi.org/10.1007/3-540-48285-7_35
Bennett, C. H., DiVincenzo, D. P., Smolin, J. A., & Wootters, W. K. (1996). Mixed-state entanglement and quantum error correction. Physical Review A, 54(5), 3824–3851. https://doi.org/10.1103/PhysRevA.54.3824
Takesue, H., Nam, S. W., Zhang, Q., Hadfield, R. H., Honjo, T., Tamaki, K., & Yamamoto, Y. (2007). Quantum key distribution over 40-dB channel loss using superconducting single-photon detectors. Nature Photonics, 1(6), 343–348. https://doi.org/10.1038/nphoton.2007.22
Sabottke, C. F., Richardson, C. D., & Anisimov, P. M. (2011). Thwarting the photon number splitting attack with entanglement enhanced BB84 quantum key distribution. arXiv. https://arxiv.org/abs/1111.4510
Downloads
Posted
Categories
License
Copyright (c) 2025 Vidarth Anbu

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.