Y. Begimbayeva, T. Zhaxalykov


The proposed article is devoted to the investigation of quantum key distribution protocols. The idiosyncrasy of this theme lies within the truth that present day strategies of key distribution, which utilize classical computing at their center, have critical downsides, in contrast to quantum key distribution. This issue concerns all sorts of calculations and frameworks for scrambling mystery data, both symmetric encryption with a private key and deviated encryption with an open key. A case is that in a communication channel ensured by quantum key distribution, it is conceivable to distinguish an interceptor between two legitimate organize substances utilizing the standards laid down in quantum material science at the starting of the final century. Standards and hypotheses such as the Heisenberg guideline, quantum trap, superposition, quantum teleportation, and the no-cloning hypothesis. The field of ponder of this theme may be a promising and quickly creating zone within the field of data security and data security. There are as of now made commercial items with the usage of a few of the quantum key dispersion conventions. Numerous of the made items are utilized in different circles of human movement. The significance of applying quantum key distribution conventions beneath perfect conditions without taking into consideration blunders within the frame of quantum clamor is analyzed. The usage of three quantum key distribution conventions is illustrated, as well as the comes about of the appearance of keys and the likelihood of event of each of them. The purpose of the article is pointed at analyzing and investigating quantum key distribution conventions. The article examines the points of interest and impediments of the BB84, B92, and E91 quantum key distribution conventions.

Ключевые слова

quantum cryptography, quantum key distribution, Heisenberg’s uncertainty principle, superposition, quantum gate, quantum entanglement.

Полный текст:

PDF (English)


Kronberg D., Ozhigov Y., Chernyavskyi A. (2006) Kvantovaya kriptographiya [Quantum Cryptography].

MSU named after M.V.Lomonosov - Moscow, p. 23-40.

Vyalyy M. (2011). Kvantovyye algoritmy: vozmozhnosti i ogranicheniya [Quantum Algorithms:

Possibilities and Limitations]. St. Petersburg.



Postulates of quantum theory. VSU, (2012).


Bennett, C.H., Bessette, F., Brassard, G. et al. (1992). Experimental quantum cryptography. J. Cryptology, 5, 3–28.

Gisin, N., Ribordy, G., Tittel, W., Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics,

(1), 145-195.

Baumeyster D. (2002) Fizika kvantovoy informatsii [Physics of quantum information]. Postmarket

Moscow. -376 p.

Bechmann-Pasquinucci, H. (2006). Eavesdropping without quantum memory. Physical Review A, 73,

-305. Retrieved from The Heat Is Online website:

Warke A., Behera B. K., Panigrahi P. K. Experimental realization of three quantum key distribution protocols //Quantum Information Processing. – 2020. – Т. 19. – №. 11. – С. 1-15. https://doi.


Shicheng Zhao, Wendong Li, Yuan Shen, YongHe Yu, XinHong Han, Hao Zeng, Maoqi Cai, Tian Qian,

Shuo Wang, Zhaoming Wang, Ya Xiao, and Yongjian Gu. (2019). «Experimental investigation of quantum key distribution over a water channel,» Appl. Opt., 58, 3902-3907.


Chi Zhang, Xiao-Long Hu, Cong Jiang, Jiu-Peng Chen, Yang Liu, Weijun Zhang, Zong-Wen Yu, Hao

Li, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang, and Jian-Wei Pan. (13 May 2022).

Experimental Side-Channel-Secure Quantum Key Distribution. Phys. Rev. Lett., 128, 190503

Bennet C. (1992) Quantum Cryptography using any Two Nonorthogonal States. Phys.Rev.Lett., 68,

IBM Quantum Composer and the IBM Quantum Lab.

Dhoha A. L. M. et al. Quantum cryptography on IBM QX. 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). – IEEE, 2019. – С. 1-6.


Helstrom, C.W. (1969). Quantum detection and estimation theory. J Stat Phys 1, 231–252. https://

Nurhadi A. I., Syambas N. R. Quantum key distribution (QKD) protocols: A survey. 2018 4th International Conference on Wireless and Telematics (ICWT). – IEEE, 2018. – С. 1-5.




  • Ссылки не определены.

(P): 2707-9031
(E): 2707-904X

Articles are open access under the Creative Commons License  

Бизнес-центр EXPO, блок C.1.
Казахстан, 010000