Quantum Key Distribution Simulator
Simulate BB84 quantum key distribution for satellite links
BB84 Protocol Steps
Step 1: Photon Transmission
Alice sends single photons encoded in random bases (rectilinear + or diagonal x) with random bit values.
Step 2: Measurement
Bob independently chooses a random basis for each photon and records the measurement result.
Step 3: Basis Reconciliation
Alice and Bob publicly compare their basis choices (not bit values). They keep only bits where bases matched (~50%).
Step 4: Error Estimation
A random subset of sifted bits is compared to estimate the Quantum Bit Error Rate (QBER). High QBER indicates eavesdropping.
Step 5: Privacy Amplification
Hash functions compress the key to remove any information an eavesdropper may have gained, producing the final secure key.