Prototype of a quantum cryptography system for the end user



FREE-DOWNLOAD R Pizzi… – Proceedings of the 9th WSEAS international …, 2009
Abstract: – It is known that the quantum cryptography protocols are able to detect immediately
any attempt to attack the key generation and the exchange process. The well-known BB84 protocol
(C. Bennet e G. Brassard 1984) uses the quantum property which states that orthogonally