Finite-Key Analysis of BB84 and B92 QKD with Discrete Phase Randomization and Koashi Bound
DOI:
10.33395/sinkron.v10i2.15882Keywords:
BB84, B92, Discrete Phase Randomization, Finite-Key Analysis, Koashi Bound, QBER, Quantum Key Distribution, Side-Channel AttacksAbstract
Quantum Key Distribution (QKD) enables theoretically secure key exchange based on fundamental quantum principles such as the no-cloning theorem and Heisenberg’s uncertainty principle. However, practical implementations remain vulnerable to side-channel attacks caused by device imperfections, while many existing studies primarily analyze asymptotic security or isolated attack scenarios rather than realistic finite-key conditions. Unlike prior studies that focus on asymptotic or single-attack analyses, this work presents a comprehensive finite-key security evaluation of BB84 and B92 protocols under hybrid side-channel attacks using Discrete Phase Randomization (DPR) as a lightweight mitigation strategy and the Koashi bound for improved phase-error estimation in B92. Numerical simulations are performed using realistic system parameters with a finite-key size of 100 billion pulses across ten representative attack scenarios. The results show that applying DPR (M = 32) significantly suppresses phase-sensitive attack-induced errors, reducing the quantum bit error rate (QBER) from 11–50% to approximately 1.5–3.02%, thereby restoring practical secure key generation. B92 with the Koashi bound achieves secure transmission distance improvements from 181.6 km to 190.8 km without attacks and reaches 187.0 km under hybrid attacks with DPR, slightly exceeding BB84 in certain conditions. Peak secret key rates reach 0.1363 bit/pulse for BB84 and 0.0741 bit/pulse for B92. These findings demonstrate that non-orthogonal protocols can remain competitive under realistic finite-key constraints using practical mitigation techniques, although literature based induced QBER assumptions remain a limitation.
Downloads
References
Aquina, N., Cimoli, B., Das, S., Hövelmanns, K., Weber, F. J., Okonkwo, C., … Verschoor, S. (2025). A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. EPJ Quantum Technology, 12(1). doi:10.1140/epjqt/s40507-025-00350-5
Begimbayeva, Y., & Zhaxalykov, T. (2022). Research of quantum key distribution protocols: BB84, B92, E91. Scientific Journal of Astana IT University, 10, 4–14. doi:10.37943/QRKJ7456
Cao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S. X., & Hanzo, L. (2022). The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet. IEEE Communications Surveys and Tutorials, 24(2), 839–894. doi:10.1109/COMST.2022.3144219
Chen, L., Chen, X. M., & Yan, Y. L. (2024). Research on time-division multiplexing for error correction and privacy amplification in post-processing of quantum key distribution. Scientific Reports, 14(1). doi:10.1038/s41598-024-77047-9
Currás-Lorenzo, G., Wooltorton, L., & Razavi, M. (2021). Twin-Field Quantum Key Distribution with Fully Discrete Phase Randomization. Physical Review Applied, 15(1). doi:10.1103/PhysRevApplied.15.014016
Curty, M., Xu, F., Cui, W., Lim, C. C. W., Tamaki, K., & Lo, H. K. (2014). Finite-key analysis for measurement-device-independent quantum key distribution. Nature Communications, 5. doi:10.1038/ncomms4732
Decker, T., Gallezot, M., Kerstan, S. F., Paesano, A., Ginter, A., & Wormsbecher, W. (2025). Quantum key distribution as a quantum machine learning task. Npj Quantum Information, 11(1). doi:10.1038/s41534-025-01088-9
Denys, A., Brown, P., & Leverrier, A. (2021). Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation. Quantum, 5. doi:10.22331/Q-2021-09-13-540
Durr-E-Shahwar, Imran, M., Altamimi, A. B., Khan, W., Hussain, S., & Alsaffar, M. (2024). Quantum Cryptography for Future Networks Security: A Systematic Review. IEEE Access, 12, 180048–180078. doi:10.1109/ACCESS.2024.3504815
Granados, G., Velasquez, W., Cajo, R., & Antonieta-Alvarez, M. (2025). Quantum Key Distribution in Multiple Fiber Networks and Its Application in Urban Communications: A Comprehensive Review. IEEE Access, 13, 100446–100461. doi:10.1109/ACCESS.2025.3577086
Hayashi, M., & Tsurumaru, T. (2012). Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths. New Journal of Physics, 14. doi:10.1088/1367-2630/14/9/093014
Kish, S., Pieprzyk, J., & Camtepe, S. (2025). Quantum Key Distribution. Retrieved from http://arxiv.org/abs/2507.23192
Koashi, M. (2009). Simple security proof of quantum key distribution based on complementarity. New Journal of Physics, 11. doi:10.1088/1367-2630/11/4/045018
Liu, Z., Lawey, A., & Razavi, M. (2025). Analytical bounds for decoy-state quantum key distribution with discrete phase randomization. Retrieved from http://arxiv.org/abs/2508.14664
Lizama-Perez, L. A., & López-Romero, J. M. (2025). Loop-Back Quantum Key Distribution (QKD) for Secure and Scalable Multi-Node Quantum Networks. Symmetry, 17(4). doi:10.3390/sym17040521
Pathak, N. K., Chaudhary, S., Sangeeta, & Kanseri, B. (2023). Phase encoded quantum key distribution up to 380 km in standard telecom grade fiber enabled by baseline error optimization. Scientific Reports, 13(1). doi:10.1038/s41598-023-42445-y
Purohit, K., & Vyas, A. K. (2025). Quantum key distribution through quantum machine learning: a research review. Frontiers in Quantum Science and Technology, 4. doi:10.3389/frqst.2025.1575498
Roosan, D., Khan, R., Nirzhor, S., & Hai, F. (2025). Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution. Blockchain in Healthcare Today, 8(1). doi:10.30953/bhty.v8.379
Scholten, T. L., Williams, C. J., Moody, D., Mosca, M., Hurley, W., Zeng, W. J., … Gambetta, J. M. (2024). Assessing the Benefits and Risks of Quantum Computers. Retrieved from http://arxiv.org/abs/2401.16317
Sharma, P., Agrawal, A., Bhatia, V., Prakash, S., & Mishra, A. K. (2021). Quantum Key Distribution Secured Optical Networks: A Survey. IEEE Open Journal of the Communications Society. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/OJCOMS.2021.3106659
Singh, S. K., Kumar, S., Chhabra, A., Sharma, A., Arya, V., Srinivasan, M., & Gupta, B. B. (2025). Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications. Cyber Security and Applications, 3. doi:10.1016/j.csa.2025.100089
Thakur, G., Chouksey, P., Chopra, M., Sadotra, P., & Kumar, S. (2025, December 1). A comprehensive review on the hybrid BB84 E91 QKD protocol for enhanced security efficiency and practical hardware implementation in quantum cryptography. Discover Computing. Springer Science and Business Media B.V. doi:10.1007/s10791-025-09807-8
Yan, W., Zheng, X., Wen, W., Lu, L., Du, Y., Lu, Y. Q., … Ma, X. S. (2025). A measurement-device-independent quantum key distribution network using optical frequency comb. Npj Quantum Information, 11(1). doi:10.1038/s41534-025-01052-7
Zapatero, V., Navarrete, Á., & Curty, M. (2025, February 1). Implementation Security in Quantum Key Distribution. Advanced Quantum Technologies. John Wiley and Sons Inc. doi:10.1002/qute.202300380
Zapatero, V., Wang, W., & Curty, M. (2023). A fully passive transmitter for decoy-state quantum key distribution. Quantum Science and Technology, 8(2). doi:10.1088/2058-9565/acbc46
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2026 Brenendra Putra Oktaviansyah, T. Sutojo, Muhamad Akrom

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.






















Moraref
PKP Index
Indonesia OneSearch
OCLC Worldcat
Index Copernicus
Scilit
