In this paper, we will study the influence of spies rate measure on the quantum transmission by u... more In this paper, we will study the influence of spies rate measure on the quantum transmission by using the entropy measures and java simulation. The quantum transmission adopted here is the BB84 protocol (Charles Bennett and Gilles Brassard). In particular, we estimate the measurement error rate which indicate the presence of spies and we analyze the influence of the the spies rate of measures of on the transmission.
In this paper a statistical analysis of common qubits(photon) transmitted by Alice and received b... more In this paper a statistical analysis of common qubits(photon) transmitted by Alice and received by Bob in the same basis using BB84 protocol with and without the presence of eavesdroppers are studied. The simulation used here is based on java language for transmission of the polarized photon between Alice and Bob via quantum channel (BB84 Protocol coding in Java).
The 3rd International Day on Computer Science and Applied Mathematics
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Encryption is critical method to give secrecy while transmitting information over Internet. There... more Encryption is critical method to give secrecy while transmitting information over Internet. There are many methods used for encrypting and decrypting text message, image or other important data. This paper deals with a new hybrid cryptographic technique using combination of AES Algorithm and Elgamal cryptosystem based DNA computing. Further, this paper attempts to utilize the properties of DNA in encryption and decryption process with more efficient. The performance of the proposed scheme is compared with the existing cryptosystems. The steps of the implementation of our algorithm are also investigated. Keywords—Cryptography, AES, Elgamal, Deoxyribo Nucleic Acid Encryption, ASCII.
International Journal of Advanced Engineering, Management and Science, 2018
Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primiti... more Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primitives. Precisely, this technique is based on two laws of quantum mechanics, namely uncertainty principle and no-cloning theorem. The best known QKD is the BB84 protocol published by Bennett and Brassard in 1984. Since then, various QKD protocols have been developed for example a B92 protocol. This latter is similar to that of BB84but this time using only two non-orthogonal states of the four states of BB84. In this work, we develop the java simulation B92 protocol and we give some details of the implementation. Next, we show by an example how Alice (Initiator) can configure the protocol parameters before execution. Finally, we give the statistical results allowing to compare this protocol with that of BB84.
In the last few years, the evolution of new Information and Communication Technologies (ICT) and ... more In the last few years, the evolution of new Information and Communication Technologies (ICT) and networks has enabled the appearance and development of several platforms and tools that serve to operate and distribute the learning content. In some particular domains, especially the scientific one, learners need to work on practical activities, using specific products and equipment to complete, consolidate, or verify their conceptual acquisitions. However, facing the increasing number of learners in Moroccan institutions, it becomes hard and expensive for developing countries, like Morocco, to ensure the appropriate conditions for each learner to perform such activities. The majority of the suggested platforms and tools cannot solve this issue, because of their inefficiency regarding offering students good interactive practical activities. Virtual Reality (VR) and the Internet of Things (IoT), as the two most incredible technologies of the last few decades, can be used as an alternati...
The 3rd International Day on Computer Science and Applied Mathematics
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primiti... more Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primitives. Precisely, this technique is based on two laws of quantum mechanics, namely uncertainty principle and no-cloning theorem. The best known QKD is the BB84 protocol published by Bennett and Brassard in 1984. Since then, various QKD protocols have been developed for example a B92 protocol. This latter is similar to that of BB84but this time using only two non-orthogonal states of the four states of BB84. In this work, we develop the java simulation B92 protocol and we give some details of the implementation. Next, we show by an example how Alice (Initiator) can configure the protocol parameters before execution. Finally, we give the statistical results allowing to compare this protocol with that of BB84.
Uploads
Papers by Brahim ouchao