Finite-Key Analysis of BB84 and B92 QKD with Discrete Phase Randomization and Koashi Bound

Authors

  • Brenendra Putra Oktaviansyah Department of Informatics Engineering, Faculty of Computer Science, Universitas Dian Nuswantoro, Semarang, Indonesia
  • T. Sutojo Department of Informatics Engineering, Faculty of Computer Science, Universitas Dian Nuswantoro, Semarang, Indonesia
  • Muhamad Akrom Department of Informatics Engineering, Faculty of Computer Science, Universitas Dian Nuswantoro, Semarang, Indonesia

DOI:

10.33395/sinkron.v10i2.15882

Keywords:

BB84, B92, Discrete Phase Randomization, Finite-Key Analysis, Koashi Bound, QBER, Quantum Key Distribution, Side-Channel Attacks

Abstract

Quantum Key Distribution (QKD) enables theoretically secure key exchange based on fundamental quantum principles such as the no-cloning theorem and Heisenberg’s uncertainty principle. However, practical implementations remain vulnerable to side-channel attacks caused by device imperfections, while many existing studies primarily analyze asymptotic security or isolated attack scenarios rather than realistic finite-key conditions. Unlike prior studies that focus on asymptotic or single-attack analyses, this work presents a comprehensive finite-key security evaluation of BB84 and B92 protocols under hybrid side-channel attacks using Discrete Phase Randomization (DPR) as a lightweight mitigation strategy and the Koashi bound for improved phase-error estimation in B92. Numerical simulations are performed using realistic system parameters with a finite-key size of 100 billion pulses across ten representative attack scenarios. The results show that applying DPR (M = 32) significantly suppresses phase-sensitive attack-induced errors, reducing the quantum bit error rate (QBER) from 11–50% to approximately 1.5–3.02%, thereby restoring practical secure key generation. B92 with the Koashi bound achieves secure transmission distance improvements from 181.6 km to 190.8 km without attacks and reaches 187.0 km under hybrid attacks with DPR, slightly exceeding BB84 in certain conditions. Peak secret key rates reach 0.1363 bit/pulse for BB84 and 0.0741 bit/pulse for B92. These findings demonstrate that non-orthogonal protocols can remain competitive under realistic finite-key constraints using practical mitigation techniques, although literature based induced QBER assumptions remain a limitation.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Aquina, N., Cimoli, B., Das, S., Hövelmanns, K., Weber, F. J., Okonkwo, C., … Verschoor, S. (2025). A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. EPJ Quantum Technology, 12(1). doi:10.1140/epjqt/s40507-025-00350-5

Begimbayeva, Y., & Zhaxalykov, T. (2022). Research of quantum key distribution protocols: BB84, B92, E91. Scientific Journal of Astana IT University, 10, 4–14. doi:10.37943/QRKJ7456

Cao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S. X., & Hanzo, L. (2022). The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet. IEEE Communications Surveys and Tutorials, 24(2), 839–894. doi:10.1109/COMST.2022.3144219

Chen, L., Chen, X. M., & Yan, Y. L. (2024). Research on time-division multiplexing for error correction and privacy amplification in post-processing of quantum key distribution. Scientific Reports, 14(1). doi:10.1038/s41598-024-77047-9

Currás-Lorenzo, G., Wooltorton, L., & Razavi, M. (2021). Twin-Field Quantum Key Distribution with Fully Discrete Phase Randomization. Physical Review Applied, 15(1). doi:10.1103/PhysRevApplied.15.014016

Curty, M., Xu, F., Cui, W., Lim, C. C. W., Tamaki, K., & Lo, H. K. (2014). Finite-key analysis for measurement-device-independent quantum key distribution. Nature Communications, 5. doi:10.1038/ncomms4732

Decker, T., Gallezot, M., Kerstan, S. F., Paesano, A., Ginter, A., & Wormsbecher, W. (2025). Quantum key distribution as a quantum machine learning task. Npj Quantum Information, 11(1). doi:10.1038/s41534-025-01088-9

Denys, A., Brown, P., & Leverrier, A. (2021). Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation. Quantum, 5. doi:10.22331/Q-2021-09-13-540

Durr-E-Shahwar, Imran, M., Altamimi, A. B., Khan, W., Hussain, S., & Alsaffar, M. (2024). Quantum Cryptography for Future Networks Security: A Systematic Review. IEEE Access, 12, 180048–180078. doi:10.1109/ACCESS.2024.3504815

Granados, G., Velasquez, W., Cajo, R., & Antonieta-Alvarez, M. (2025). Quantum Key Distribution in Multiple Fiber Networks and Its Application in Urban Communications: A Comprehensive Review. IEEE Access, 13, 100446–100461. doi:10.1109/ACCESS.2025.3577086

Hayashi, M., & Tsurumaru, T. (2012). Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths. New Journal of Physics, 14. doi:10.1088/1367-2630/14/9/093014

Kish, S., Pieprzyk, J., & Camtepe, S. (2025). Quantum Key Distribution. Retrieved from http://arxiv.org/abs/2507.23192

Koashi, M. (2009). Simple security proof of quantum key distribution based on complementarity. New Journal of Physics, 11. doi:10.1088/1367-2630/11/4/045018

Liu, Z., Lawey, A., & Razavi, M. (2025). Analytical bounds for decoy-state quantum key distribution with discrete phase randomization. Retrieved from http://arxiv.org/abs/2508.14664

Lizama-Perez, L. A., & López-Romero, J. M. (2025). Loop-Back Quantum Key Distribution (QKD) for Secure and Scalable Multi-Node Quantum Networks. Symmetry, 17(4). doi:10.3390/sym17040521

Pathak, N. K., Chaudhary, S., Sangeeta, & Kanseri, B. (2023). Phase encoded quantum key distribution up to 380 km in standard telecom grade fiber enabled by baseline error optimization. Scientific Reports, 13(1). doi:10.1038/s41598-023-42445-y

Purohit, K., & Vyas, A. K. (2025). Quantum key distribution through quantum machine learning: a research review. Frontiers in Quantum Science and Technology, 4. doi:10.3389/frqst.2025.1575498

Roosan, D., Khan, R., Nirzhor, S., & Hai, F. (2025). Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution. Blockchain in Healthcare Today, 8(1). doi:10.30953/bhty.v8.379

Scholten, T. L., Williams, C. J., Moody, D., Mosca, M., Hurley, W., Zeng, W. J., … Gambetta, J. M. (2024). Assessing the Benefits and Risks of Quantum Computers. Retrieved from http://arxiv.org/abs/2401.16317

Sharma, P., Agrawal, A., Bhatia, V., Prakash, S., & Mishra, A. K. (2021). Quantum Key Distribution Secured Optical Networks: A Survey. IEEE Open Journal of the Communications Society. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/OJCOMS.2021.3106659

Singh, S. K., Kumar, S., Chhabra, A., Sharma, A., Arya, V., Srinivasan, M., & Gupta, B. B. (2025). Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications. Cyber Security and Applications, 3. doi:10.1016/j.csa.2025.100089

Thakur, G., Chouksey, P., Chopra, M., Sadotra, P., & Kumar, S. (2025, December 1). A comprehensive review on the hybrid BB84 E91 QKD protocol for enhanced security efficiency and practical hardware implementation in quantum cryptography. Discover Computing. Springer Science and Business Media B.V. doi:10.1007/s10791-025-09807-8

Yan, W., Zheng, X., Wen, W., Lu, L., Du, Y., Lu, Y. Q., … Ma, X. S. (2025). A measurement-device-independent quantum key distribution network using optical frequency comb. Npj Quantum Information, 11(1). doi:10.1038/s41534-025-01052-7

Zapatero, V., Navarrete, Á., & Curty, M. (2025, February 1). Implementation Security in Quantum Key Distribution. Advanced Quantum Technologies. John Wiley and Sons Inc. doi:10.1002/qute.202300380

Zapatero, V., Wang, W., & Curty, M. (2023). A fully passive transmitter for decoy-state quantum key distribution. Quantum Science and Technology, 8(2). doi:10.1088/2058-9565/acbc46

Downloads


Crossmark Updates

How to Cite

Oktaviansyah, B. P. ., Sutojo, T. ., & Akrom, M. . (2026). Finite-Key Analysis of BB84 and B92 QKD with Discrete Phase Randomization and Koashi Bound. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 10(2), 951-961. https://doi.org/10.33395/sinkron.v10i2.15882