Skip to main content
Figure 3 | EPJ Quantum Technology

Figure 3

From: A quantum key distribution protocol for rapid denial of service detection

Figure 3

Illustrating how changing the number of bases represented by a single authentication tag affects both classical communication and computational resource requirements. To get a rough estimate for how our protocol will perform on a particular physical system, one can multiply the classical channel capacity by the QKD clock rate, and the worst-case number of comparisons by the time taken to perform a single binary search comparison. The size of a 128-bit hash lookup table will always be double that of its 64-bit counterpart

Back to article page