Skip to content

Quantum Computing News

  • Home
  • Quantum News
    • Quantum Computing
    • Quantum Hardware and Software
    • Quantum Startups and Funding
    • Quantum Computing Stocks
    • Quantum Research and Security
  • IMP Links
    • About Us
    • Contact Us
    • Privacy & Policies
  1. Home
  2. Quantum Computing
  3. Quantum Key Distribution Protocols: BB84, E91, And B92
Quantum Computing

Quantum Key Distribution Protocols: BB84, E91, And B92

Posted on October 20, 2025 by Jettipalli Lavanya6 min read
Quantum Key Distribution Protocols: BB84, E91, And B92

Quantum Key Distribution Protocols

Quantum computing poses a serious threat to the basis of contemporary encryption, which uses mathematical complexity to secure secret information. Existing key distribution techniques have significant drawbacks that quantum computing could potentially exploit and are dependent on classical computing.

Quantum Key Distribution (QKD), on the other hand, offers a secure communication technique based on the basic principles of quantum mechanics. This area of data and information security is one that is rapidly growing and showing promise. With QKD, two communicating parties, typically referred to as Alice (sender) and Bob (receiver), can generate a shared, secret, random key that is only known to them.

The Heisenberg uncertainty principle, quantum entanglement, superposition, and the no-cloning theorem are among the fundamental ideas of quantum mechanics that are utilized by QKD methods. The capacity to identify the existence of any third party (Eve, the eavesdropper) trying to obtain information about the key is a crucial and distinctive feature of QKD. This ability is based on the idea that measuring a quantum system would always cause it to be disturbed, which makes the eavesdropper visible through observable defects.

The key generation process is stopped and the communication is terminated if the error rate exceeds a predetermined threshold. It is crucial to remember that QKD simply creates and disseminates this secret key, which is subsequently utilized for message encryption by traditional encryption techniques like Advanced Encryption Standard (AES) and the one-time pad.

QKD Protocols Based on Quantum Uncertainty: BB84 and B92

The “prepare-and-measure” category of Quantum Key Distribution (QKD) procedures, which is based on the measurement-disturbance principle that results from the Heisenberg uncertainty principle, includes several of them.

The most well-known and fundamental QKD protocol is the BB84 protocol, which was first presented by Charles Bennett and Gilles Brassard in 1984. For encoding, BB84 uses single photons and two conjugate pairs of non-orthogonal states, such as the diagonal basis (45°/135° polarisation) and the rectilinear basis (vertical/horizontal polarisation). Since it is typically impossible to measure these non-orthogonal states without affecting the initial state, security is ensured.

Alice encodes her photon by choosing at random a bit value (0 or 1) and a matching basis, which she then transmits to Bob. Bob chooses one of the two bases at random to measure the received photon since he is unaware of Alice’s selection. Following transmission, they make their bases known to the public (sifting), eliminating any bits whose bases did not match. In an ideal channel, their remaining bit strings should be the same if there were no interference or eavesdropping.

Bennett presented the B92 protocol in 1992 as a revision to BB84. By using only two non-orthogonal quantum states, B92 streamlines the procedure. The objective of B92’s design was to enable variable parameter modification based on channel conditions in order to possibly increase the data exchange rate. In contrast to BB84, the B92 protocol is used more simply in real-world applications on systems such as the IBM Quantum Composer. A parameter pertaining to the angle between the non-orthogonal states is what distinguishes the B92 protocol; altering this angle permits trade-offs between resistance to interference and a faster data exchange rate.

QKD Protocols Based on Quantum Entanglement: E91

Entanglement-based protocols, as opposed to prepare-and-measure schemes, are based on the idea that two or more particles are inherently connected, regardless of their distance from one another, according to quantum entanglement.

In 1991, Artur Ekert developed the E91 protocol, which makes use of maximally entangled photon pairs. Alice, Bob, or an outside source may create these entangled pairs. The entangled pair sends one photon each to Alice and Bob, who use randomly selected bases to make measurements. Their measurement results will be perfectly synchronized if they select the same basis because of entanglement.

Bell’s inequality and the theorem violations provide the foundation of E91’s key security mechanism. Alice and Bob can identify these correlations by comparing a subset of their results, but Eve destroys them if she tries to measure the entangled state or intercept one of the photons. They come to the conclusion that Eve has violated the fundamental quantum correlations by introducing local realism into the system if the Bell test statistic is not maximized.

One of E91’s main advantages is that its security is “device-independent,” which means it depends on the basic characteristics of quantum entanglement rather than the assumed reliability or flawless calibration of the actual devices used to generate the keys.

The Key Generation Process: Post-Processing Steps

To finalize the secret key, QKD necessitates a number of post-processing procedures carried out over an authorized classical channel, regardless of the underlying quantum principle (entanglement or uncertainty).

  1. Sifting: To create a raw, correlated key known as the sifted key, Alice and Bob openly disclose which states or bases were used, eliminating the non-matching or inconclusive results.
  2. Error Estimation: The Quantum Bit Error Rate (QBER) is then calculated by Alice and Bob publicly comparing a little, random portion of their sifted key bits. Eavesdropping or channel flaws (such as quantum noise) might result in errors. Usually, it is thought that Eve is to blame for all mistakes. The process is stopped if the QBER rises above a predetermined level.
  3. Information Reconciliation (Error Correction): Alice and Bob utilize error correction methods, like the Cascade protocol, to make sure their key strings are exactly the same if the error rate is acceptable. However, they frequently provide Eve some incomplete information in the process.
  4. Privacy Amplification: In this last stage, Eve’s residual partial knowledge obtained from parity checks during reconciliation or the quantum channel is diminished. Eve has a very small chance of knowing the final secret key because a universal hash function is applied to the reconciled key to create a new, shorter final key.

Also Read About National Quantum Computing Centre Gets Ion Trap From NPL

Practical Difficulties and Security

Unlike traditional public key cryptography, QKD protocols use information theory based on quantum mechanical rules to provide provable security.

Despite this theoretical power, there are significant obstacles to real-world implementation. Channel loss, decoherence, and flaws in the preparation, transmission, and measurement of quantum states are challenges that result in low secret key rates and transmission distance restrictions. Furthermore, even though the underlying protocol is mathematically safe, real-world QKD systems have been shown to be susceptible to a variety of attacks that take advantage of hardware vulnerabilities, including Trojan-horse attacks and the Photon Number Splitting (PNS) attack.

For the majority of applications, the US National Security Agency (NSA) and the UK National Cyber Security Center (NCSC) have advised switching from QKD to Post-Quantum Cryptography (PQC) due to these security validation issues. High infrastructure costs, the requirement for specialized hardware, and the challenge of safely verifying the hardware of the deployed system, which frequently lacks the adaptability for simple upgrades or security patches, are some of their worries.

However, QKD is still developing quickly, with both commercial devices and in-depth research being conducted to increase security, distance, and efficiency against real-world threats.

Tags

BB84 protocol for quantum key distributionBB84 protocol quantum key distributionBB84 quantum key distribution protocolE91 protocol quantum key distributionE91 qkd protocolE91 quantum key distribution protocolQKD protocolsQuantum Key Distribution Protocols

Written by

Jettipalli Lavanya

Jettipalli Lavanya is a technology content writer and a researcher in quantum computing, associated with Govindhtech Solutions. Her work centers on advanced computing systems, quantum algorithms, cybersecurity technologies, and AI-driven innovation. She is passionate about delivering accurate, research-focused articles that help readers understand rapidly evolving scientific advancements.

Post navigation

Previous: What Is QMA? Quantum Proof System, QMA Complete Problems
Next: Introduction To Loop Quantum Gravity & String Theory Vs LQG

Keep reading

QbitSoft

Scaleway & QbitSoft Launch European Quantum Adoption Program

4 min read
USC Quantum Computing

USC Quantum Computing Advances National Security Research

5 min read
SuperQ Quantum Computing Inc. at Toronto Tech Week 2026

SuperQ Quantum Computing Inc. at Toronto Tech Week 2026

4 min read

Leave a Reply Cancel reply

You must be logged in to post a comment.

Categories

  • Scaleway & QbitSoft Launch European Quantum Adoption Program Scaleway & QbitSoft Launch European Quantum Adoption Program May 23, 2026
  • USC Quantum Computing Advances National Security Research USC Quantum Computing Advances National Security Research May 23, 2026
  • SuperQ Quantum Computing Inc. at Toronto Tech Week 2026 SuperQ Quantum Computing Inc. at Toronto Tech Week 2026 May 23, 2026
  • WISER and Fraunhofer ITWM Showcase QML Applications WISER and Fraunhofer ITWM Showcase QML Applications May 22, 2026
  • Quantum X Labs Integrates Google Data for Error Correction Quantum X Labs Integrates Google Data for Error Correction May 22, 2026
  • SEALSQ and IC’Alps Expand Post-Quantum Security Technologies SEALSQ and IC’Alps Expand Post-Quantum Security Technologies May 21, 2026
  • MTSU Events: Quantum Valley Initiative Launches with MTE MTSU Events: Quantum Valley Initiative Launches with MTE May 20, 2026
  • How Cloud Quantum Computers Could Become More Trustworthy How Cloud Quantum Computers Could Become More Trustworthy May 20, 2026
  • Quantinuum Expands Quantum Leadership with Synopsys Quantum Quantinuum Expands Quantum Leadership with Synopsys Quantum May 20, 2026
View all
  • QeM Inc Reaches Milestone with Q1 2026 Financial Results QeM Inc Reaches Milestone with Q1 2026 Financial Results May 23, 2026
  • Arqit Quantum Stock News: 2026 First Half Financial Results Arqit Quantum Stock News: 2026 First Half Financial Results May 22, 2026
  • Sygaldry Technologies Raises $139M to Quantum AI Systems Sygaldry Technologies Raises $139M to Quantum AI Systems May 18, 2026
  • NSF Launches $1.5B X-Labs to Drive Future Technologies NSF Launches $1.5B X-Labs to Drive Future Technologies May 16, 2026
  • IQM and Real Asset Acquisition Corp. Plan $1.8B SPAC Deal IQM and Real Asset Acquisition Corp. Plan $1.8B SPAC Deal May 16, 2026
  • Infleqtion Q1 Financial Results and Quantum Growth Outlook Infleqtion Q1 Financial Results and Quantum Growth Outlook May 15, 2026
  • Xanadu First Quarter Financial Results & Business Milestones Xanadu First Quarter Financial Results & Business Milestones May 15, 2026
  • Santander Launches The Quantum AI Leap Innovation Challenge Santander Launches The Quantum AI Leap Innovation Challenge May 15, 2026
  • CSUSM Launches Quantum STEM Education With National Funding CSUSM Launches Quantum STEM Education With National Funding May 14, 2026
View all
  • QTREX AME Technology May Alter Quantum Hardware Connectivity QTREX AME Technology May Alter Quantum Hardware Connectivity May 23, 2026
  • Quantum Spain: The Operational Era of MareNostrum-ONA Quantum Spain: The Operational Era of MareNostrum-ONA May 23, 2026
  • NVision Inc Announces PIQC for Practical Quantum Computing NVision Inc Announces PIQC for Practical Quantum Computing May 22, 2026
  • Xanadu QROM Innovation Ends Seven-Year Quantum Memory Stall Xanadu QROM Innovation Ends Seven-Year Quantum Memory Stall May 22, 2026
  • GlobalFoundries Quantum Computing Rise Drives U.S. Research GlobalFoundries Quantum Computing Rise Drives U.S. Research May 22, 2026
  • BlueQubit Platform Expands Access to Quantum AI Tools BlueQubit Platform Expands Access to Quantum AI Tools May 22, 2026
  • Oracle and Classiq Introduce Quantum AI Agents for OCI Oracle and Classiq Introduce Quantum AI Agents for OCI May 21, 2026
  • Kipu Quantum: Classical Surrogates for Quantum-Enhanced AI Kipu Quantum: Classical Surrogates for Quantum-Enhanced AI May 21, 2026
  • Picosecond low-Power Antiferromagnetic Quantum Switch Picosecond low-Power Antiferromagnetic Quantum Switch May 21, 2026
View all
  • Terra Quantum Quantum-Secure Platform for U.S. Air Force Terra Quantum Quantum-Secure Platform for U.S. Air Force May 23, 2026
  • Merqury Cybersecurity and Terra Quantum’s Secured Data Link Merqury Cybersecurity and Terra Quantum’s Secured Data Link May 23, 2026
  • ESL Shipping Ltd & QMill Companys Fleet Optimization project ESL Shipping Ltd & QMill Companys Fleet Optimization project May 23, 2026
  • Pasqals Logical Qubits Beat Physical Qubits on Real Hardware Pasqals Logical Qubits Beat Physical Qubits on Real Hardware May 22, 2026
  • Rail Vision Limited Adds Google Dataset to QEC Transformer Rail Vision Limited Adds Google Dataset to QEC Transformer May 22, 2026
  • Infleqtion Advances Neutral-Atom Quantum Computing Infleqtion Advances Neutral-Atom Quantum Computing May 21, 2026
  • Quantinuum News in bp Collaboration Targets Seismic Image Quantinuum News in bp Collaboration Targets Seismic Image May 21, 2026
  • ParityQC Achieves 52-Qubit Quantum Fourier Transform on IBM ParityQC Achieves 52-Qubit Quantum Fourier Transform on IBM May 21, 2026
  • PacketLight And Quantum XChange Inc Optical Network Security PacketLight And Quantum XChange Inc Optical Network Security May 21, 2026
View all
  • Quantum Computing Funding: $2B Federal Investment in U.S Quantum Computing Funding: $2B Federal Investment in U.S May 22, 2026
  • Quantum Bridge Technologies Funds $8M For Quantum Security Quantum Bridge Technologies Funds $8M For Quantum Security May 21, 2026
  • Nord Quantique Inc Raises $30M in Quantum Computing Funding Nord Quantique Inc Raises $30M in Quantum Computing Funding May 20, 2026
  • ScaLab: Advances Quantum Computing At Clemson University ScaLab: Advances Quantum Computing At Clemson University May 19, 2026
  • National Quantum Mission India Advances Quantum Innovation National Quantum Mission India Advances Quantum Innovation May 18, 2026
  • Amaravati Leads Quantum Computing in Andhra Pradesh Amaravati Leads Quantum Computing in Andhra Pradesh May 18, 2026
  • Wisconsin Technology Council Spotlights Quantum Industries Wisconsin Technology Council Spotlights Quantum Industries May 18, 2026
View all

Search

Latest Posts

  • Scaleway & QbitSoft Launch European Quantum Adoption Program May 23, 2026
  • Terra Quantum Quantum-Secure Platform for U.S. Air Force May 23, 2026
  • Merqury Cybersecurity and Terra Quantum’s Secured Data Link May 23, 2026
  • USC Quantum Computing Advances National Security Research May 23, 2026
  • QTREX AME Technology May Alter Quantum Hardware Connectivity May 23, 2026

Tutorials

  • Quantum Computing
  • IoT
  • Machine Learning
  • PostgreSql
  • BlockChain
  • Kubernettes

Calculators

  • AI-Tools
  • IP Tools
  • Domain Tools
  • SEO Tools
  • Developer Tools
  • Image & File Tools

Imp Links

  • Free Online Compilers
  • Code Minifier
  • Maths2HTML
  • Online Exams
  • Youtube Trend
  • Processor News
© 2026 Quantum Computing News. All rights reserved.
Back to top