
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
ICCE (2025)
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 3
May-June 2025
Indexing Partners



















Evaluating the Potential of Quantum Key Distribution in Securing Communication Systems Against Classical and Post-Quantum Threats
Author(s) | Mr. Devyansh Chandra |
---|---|
Country | India |
Abstract | Quantum Key Distribution (QKD) is increasingly recognized as a robust solution to the vulnerabilities posed by quantum computing to classical encryption systems. This paper presents a comprehensive investigation of the BB84 protocol, the foundational QKD scheme, through simulated quantum communication using IBM’s Qiskit framework. The study models quantum key exchange under both ideal and adversarial conditions, including channel noise and intercept-resend attacks. The Quantum Bit Error Rate (QBER) was measured as a function of noise intensity and eavesdropping, confirming that QBER increases predictably in compromised channels. A threshold of 11% QBER was used to determine the viability of secure key generation. Final key retention rates were analyzed across multiple channel scenarios, revealing BB84’s sensitivity to both photon loss and adversarial interference.\n\nSecurity vulnerabilities such as photon-number-splitting and detector blinding were assessed, and countermeasures including decoy-state protocols and authenticated classical channels were proposed. Four key performance graphs were generated to visualize system behavior under realistic operational conditions. The results support BB84’s theoretical advantage in ensuring information-theoretic security while acknowledging real-world limitations in transmission range and hardware reliability. The paper concludes by addressing future improvements in QKD systems, including satellite-based distribution, quantum repeaters, and device-independent implementations. Through simulation-driven analysis, this study validates BB84 as a practical defense against quantum-enabled attacks and underscores the need for continued development and standardization in post-quantum cryptographic infrastructure. |
Field | Computer > Network / Security |
Published In | Volume 7, Issue 3, May-June 2025 |
Published On | 2025-06-01 |
DOI | https://doi.org/10.36948/ijfmr.2025.v07i03.46442 |
Short DOI | https://doi.org/g9m2fr |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
