Thesis etd-04012024-114801 |
Link copiato negli appunti
Thesis type
Tesi di laurea magistrale
Author
OSELE, ANTONIO
URN
etd-04012024-114801
Thesis title
Intrusion Detection Method for BB84 Quantum Key Distribution protocol
Department
INGEGNERIA DELL'INFORMAZIONE
Course of study
CYBERSECURITY
Supervisors
relatore Prof. Pagano, Michele
relatore Prof. Garroppo, Rosario Giuseppe
relatore Prof. Garroppo, Rosario Giuseppe
Keywords
- bb84
- demand
- eavesdropper
- ibm
- intrusion detection
- qiskit
- quantum computer
- quantum key distribution
- quantumsolver
- simulation
Graduation session start date
17/04/2024
Availability
Withheld
Release date
17/04/2027
Summary
This master's thesis deals with issues related to Quantum Key Distributions.
In more detail, at first it provides an overview of the current literature on quantum computation and discusses the relevance of this study.
By collecting data on the usage of IBM's publicly available quantum computers, we stress the high demand for such machines.
Finally we evaluate the effectiveness of a new Intrusion Detection Method for the BB84 Quantum Key Distribution protocol. This alternative method aims to reduce the number of bits required to be shared between two users in order to ensure the absence of eavesdroppers on a channel during the generation of a private shared key. To validate the efficiency of the intrusion detection method and explore its possible real-world applications, we utilized QuantumSolver, a framework that uses IBM's Qiskit to simulate real quantum computers, with or without noise. We also discovered and fixed some bugs in its implementation.
In more detail, at first it provides an overview of the current literature on quantum computation and discusses the relevance of this study.
By collecting data on the usage of IBM's publicly available quantum computers, we stress the high demand for such machines.
Finally we evaluate the effectiveness of a new Intrusion Detection Method for the BB84 Quantum Key Distribution protocol. This alternative method aims to reduce the number of bits required to be shared between two users in order to ensure the absence of eavesdroppers on a channel during the generation of a private shared key. To validate the efficiency of the intrusion detection method and explore its possible real-world applications, we utilized QuantumSolver, a framework that uses IBM's Qiskit to simulate real quantum computers, with or without noise. We also discovered and fixed some bugs in its implementation.
File
Nome file | Dimensione |
---|---|
The thesis is not available. |