International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 7, Issue 3 (May-June 2025) Submit your research before last 3 days of June to publish your research paper in the issue of May-June.

Evaluating the Potential of Quantum Key Distribution in Securing Communication Systems Against Classical and Post-Quantum Threats

Author(s) Mr. Devyansh Chandra
Country India
Abstract Quantum Key Distribution (QKD) is increasingly recognized as a robust solution to the vulnerabilities posed by quantum computing to classical encryption systems. This paper presents a comprehensive investigation of the BB84 protocol, the foundational QKD scheme, through simulated quantum communication using IBM’s Qiskit framework. The study models quantum key exchange under both ideal and adversarial conditions, including channel noise and intercept-resend attacks. The Quantum Bit Error Rate (QBER) was measured as a function of noise intensity and eavesdropping, confirming that QBER increases predictably in compromised channels. A threshold of 11% QBER was used to determine the viability of secure key generation. Final key retention rates were analyzed across multiple channel scenarios, revealing BB84’s sensitivity to both photon loss and adversarial interference.\n\nSecurity vulnerabilities such as photon-number-splitting and detector blinding were assessed, and countermeasures including decoy-state protocols and authenticated classical channels were proposed. Four key performance graphs were generated to visualize system behavior under realistic operational conditions. The results support BB84’s theoretical advantage in ensuring information-theoretic security while acknowledging real-world limitations in transmission range and hardware reliability. The paper concludes by addressing future improvements in QKD systems, including satellite-based distribution, quantum repeaters, and device-independent implementations. Through simulation-driven analysis, this study validates BB84 as a practical defense against quantum-enabled attacks and underscores the need for continued development and standardization in post-quantum cryptographic infrastructure.
Field Computer > Network / Security
Published In Volume 7, Issue 3, May-June 2025
Published On 2025-06-01
DOI https://doi.org/10.36948/ijfmr.2025.v07i03.46442
Short DOI https://doi.org/g9m2fr

Share this