QuarkOrbit

Quantum Key Distribution Simulator

Simulate BB84 quantum key distribution for satellite links

BB84 Protocol Steps

Step 1: Photon Transmission

Alice sends single photons encoded in random bases (rectilinear + or diagonal x) with random bit values.

Step 2: Measurement

Bob independently chooses a random basis for each photon and records the measurement result.

Step 3: Basis Reconciliation

Alice and Bob publicly compare their basis choices (not bit values). They keep only bits where bases matched (~50%).

Step 4: Error Estimation

A random subset of sifted bits is compared to estimate the Quantum Bit Error Rate (QBER). High QBER indicates eavesdropping.

Step 5: Privacy Amplification

Hash functions compress the key to remove any information an eavesdropper may have gained, producing the final secure key.