BARROS, N. S.; http://lattes.cnpq.br/1192716127505034; BARROS, Naiara de Souza.
Resumo:
This paper presents an analysis of the first two protocols to be proposed for a
secure key exchange. The first protocol was implemented by Bennett and Brassard in
1984, presently known as BB84 and the second protocol is implemented by Bennett in
1992, known as B92. After presenting a basic theoretical foundation necessary for an
understanding of these protocols, we introduce and analyze the security of the same on
an individual attack in which a eavesdropper uses a translucent eavesdropping procedure
that interacts with the protocols in order to obtain more information about the secret
messages they are being transmitted by the protocols.