Figure 7: Q-Q Plot of the QBER.
Figure 8: Q-Q Plot of the SKR.
A statistical analysis of QBER inrelation to at-
tenuation and QBER in relation to SKR suggested
correlations between each of these parameter pairs.
Regression curves were calculated for these relation-
ships and showed statistically significant correlations
between QBER and SKR and QBER and attenuation.
These results were expected. The results for normal-
ity, the histogram and Q-Q plots indicate that the mea-
sured values can be regarded as population samples
from a normal distribution.
The experiments were conducted to demonstrate
the hypothesis that as attenuation increases, the
QBER increases and the SKR decreases. The hy-
pothesis was verified by the results in correlation dia-
grams (Figs. 3, 4 and 5). Future work will include
a test for the limits in capability of the IDQ QKD
system. The system was upgraded for a maximum
attenuation of 18 dB, but the experiments in the cur-
rent study showed that it has an attenuation limit of
approximately 20 dB. The experiment was performed
on a real QKD link and thus provides a valuable con-
tribution to understanding its behaviour.
ACKNOWLEDGEMENTS
The research leading to the published results was sup-
ported under the NATO SPS G894 project “Quantum
Cybersecurity in 5G Networks (QUANTUM5)” and
partly under the H2020 project “OPENQKD Grant
Agreement No. 857156”.
REFERENCES
(2022). Idq,https://www.idquantique.com/quantum-safe-
security/products/cerberis3-qkd-system/.
Alia, O., Tessinari, R. S., Hugues-Salas, E., Kanellos, G. T.,
Nejabati, R., and Simeonidou, D. (2022). Dynamic
dv-qkd networking in trusted-node-free software-
defined optical networks. Journal of Lightwave Tech-
nology, 40(17):5816–5824.
Dianati, M. and All
´
eaume, R. (2007). Architecture of the
secoqc quantum key distribution network. In 2007
First International Conference on Quantum, Nano,
and Micro Technologies (ICQNM’07), pages 13–13.
IEEE.
Gardner, M. (1977). A new kind of cipher that would
take millions of years to break. Scientific American,
237(8):120–124.
Gisin, N., Ribordy, G., Zbinden, H., Stucki, D., Brunner,
N., and Scarani, V. (2004). Towards practical and
fast quantum cryptography. arXiv preprint quant-
ph/0411022.
He, M., Malaney, R., and Bumett, B. A. (2020). Multi-
mode cv-qkd with noiseless attenuation and amplifi-
cation. In 2020 IEEE Globecom Workshops (GC Wk-
shps, pages 1–7.
Lauterbach, F., Burdiak, P., Rozhon, J., Dervisevic, E.,
Slivova, M., Plakalovic, M., Mehic, M., and Voz-
nak, M. (2022). Quantum channel characteristics from
the point of view of stability. In 2022 XXVIII Inter-
national Conference on Information, Communication
and Automation Technologies (ICAT), pages 1–6.
Li, N. (2010). Research on diffie-hellman key exchange
protocol. In 2010 2nd International Conference on
Computer Engineering and Technology, volume 4,
pages V4–634. IEEE.
Mehic, M., Maurhart, O., Rass, S., and Voznak, M. (2017).
Implementation of quantum key distribution network
simulation module in the network simulator ns-3.
Quantum Information Processing, 16(10).
Mehic, M., Niemiec, M., Rass, S., Ma, J., Peev, M.,
Aguado, A., Martin, V., Schauer, S., Poppe, A.,
Pacher, C., and Voznak, M. (2020). Quantum key dis-
tribution: A networking perspective. ACM Comput.
Surv., 53(5).
Mehic, M., Niemiec, M., and Voznak, M. (2015). Calcu-
lation of the key length for quantum key distribution.
Elektronika ir Elektrotechnika, 21(6):81–85.
Mlejnek, M., Kaliteevskiy, N., and Nolan, D. (2018). Mod-
eling high quantum bit rate qkd systems over optical
fiber.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
422