Question

If Alice and Bob are using quantum key distribution with light polarization and the BB84 protocol, given the information...

If Alice and Bob are using quantum key distribution with light polarization and the BB84 protocol, given the information below, write the resulting key Alice and Bob use in the blank

⟷ = 0
↕︎      = 1
⤡ = 0
⤢ = 1

Alice sends:

↕︎ ↔︎ ↕︎ ↕︎ ↔︎ ↔︎ ↕︎

Bob uses filters:

The key they agree on is

0 0
Add a comment Improve this question Transcribed image text
Answer #1
basis 1 0
+ ↕︎
X
Alice's random bit 1 1 0 1 1 1 1 0 0 0 1 0
Alice's random sending basis X + + X + + X + + X + X
Photon polarization Alice sends ↕︎ ↔︎ ↕︎ ↕︎ ↔︎ ↔︎ ↕︎
Bob's random measuring basis X + + + X + X X + + X X
Photon polarization Bob measures ↕︎ ↔︎ ↕︎ ↕︎ ↔︎ ↔︎
Shared Secret Key 1 1 0 1 1 0 0
Add a comment
Know the answer?
Add Answer to:
If Alice and Bob are using quantum key distribution with light polarization and the BB84 protocol, given the information...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 5. Diffie-Hellman key exchange. Alice and Bob use Diffie-Hellman key exchange protocol to communicate in secret....

    5. Diffie-Hellman key exchange. Alice and Bob use Diffie-Hellman key exchange protocol to communicate in secret. They publicly announce a prime number p = 23 and a primitive root r = 5 under modulus 23, Alice picks a secret key a-6 and in turn receive the key ß-19 from Bob (a.) (2 points) What is the key that Alice sends to Bob? b) (2 points) What is the shared secret key?

  • Answer all of it asap Discrete mathematics Problem 10 (10 pts) Alice and Bob would like to exchange a key using the...

    Answer all of it asap Discrete mathematics Problem 10 (10 pts) Alice and Bob would like to exchange a key using the Diffie-Hellman protocol that uses the following public information: the cyclic group Zio, and 5 as its base element. Alice: If she chooses 3 as her private key, which element does she send to Bob. Bob: If he chooses 4 as his private key, which element does he send to Alice Key-Exchanged: What is their Private Key exchanged. Problem...

  • Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q =...

    Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...

  • 5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key...

    5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key and finds that it is (n-55. c= 3 (a) Specify exactly what information Alice sends to Bob (b) What is Bob's private key? Show how he would use it to recover Alice's message (c) Explain why Bob should never use this choice of public key in real life. 5. Alice wishes to send the message m4 to Bob using RSA encryption....

  • all infor given 4. Supppose Alice and Bob are using the prime p = 1451 and...

    all infor given 4. Supppose Alice and Bob are using the prime p = 1451 and the base g = 2 for an ElGamal cryptosystem. (a) Alice chooses a = 753 as her private key. What is the value of her public key A? (b) Now suppose Bob chooses b = 500 as his private key, and thus his public key is 464 mod 1451. Alice encrypts the message m = 284 using the ephemeral key k=512. What is the...

  • Bob wants to send an encrypted message using public key cryptography to Alice. What key does...

    Bob wants to send an encrypted message using public key cryptography to Alice. What key does he use for encryption? You need to be explicit whose key it is and what kind of key it is. 1 AB I

  • Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189)....

    Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189). = (a) Determine Alice's private key (d, n). (b) Bob sends his first message Mi 67 to Alice, encrypting it with RSA using Alice's public key. He obtains a cypher text Cị that gets forwarded to Alice. What is Cį? (c) Bob sends his second message M2 to Alice, encrypting it with RSA using Alice's public key. Eve, who was eavesdropping on the commu-...

  • (8) In an RSA cryptosystem, Bob’s public key is (n = 629, e = 43). Alice...

    (8) In an RSA cryptosystem, Bob’s public key is (n = 629, e = 43). Alice uses this public key to encrypt the word “MARCH” and send the ciphertext to Bob. First, she represents this word in ASCII where the capital letters A, B, C, . . . , X, Y, Z are represented by integers 65, 66, 67, . . . , 88, 89, 90 respectively. Then she encrypts the five integers that represent M, A, R, C, H...

  • USING RECURSIONN!!! JAVA CODE Coin game: Alice and Bob are playing a game using a bunch...

    USING RECURSIONN!!! JAVA CODE Coin game: Alice and Bob are playing a game using a bunch of coins. The players pick several coins out of the bunch in turn. Each time a player is allowed to pick 1, 2 or 4 coins, and the player that gets the last coin is the winner. Assume that both players are very smart and he/she will try his/her best to work out a strategy to win the game. For example, if there are...

  • please solve this question ASAP this question is related to Quantum information Theory 42 А B...

    please solve this question ASAP this question is related to Quantum information Theory 42 А B rez Where -Ал Q3 Alice and Bob each bossess one member of a pair of interacting magnetic dipoles (spin / particles). The interaction Hamiltonian for two interacting magnetic dipoles separated by a distance re is given by HIE (5.AGB- 3626 &^= 0 ê toy ang to 5x sñt Ty ýt a) write Hi in matrix representation b) Diagonalize HI to find eigenvalues compute the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT