https://doi.org/10.1140/epjqt/s40507-025-00411-9
Research
Post-quantum AES encryption using ECC points derived from BB84 sifted keys
School of Electronics Engineering, Vellore Institute of Technology, 632014, Vellore, Tamil Nadu, India
a
This email address is being protected from spambots. You need JavaScript enabled to view it.
Received:
18
June
2025
Accepted:
20
August
2025
Published online:
29
September
2025
Abstract
Generating a secure key and securely communicating it are crucial aspects for ensuring information security during encryption and decryption processes. Quantum Key Distribution (QKD) is a promising technique for enabling secure communication in Industrial Internet of Things (IIoT) applications. This paper presents an enhanced BB84 protocol integrated with Elliptic Curve Cryptography (ECC) that improves efficiency, security, and practical implementation. Our enhanced BB84 protocol employs a basis reconciliation mechanism and introduces a depolarizing channel model to simulate realistic noise conditions and eavesdropping detections. The system effectively identifies potential eavesdroppers based on Quantum Bit Error Rate (QBER) thresholds, thereby ensuring a secure key exchange process. Unlike traditional ECC implementations, our approach dynamically extracts prime numbers from a sifted key to generate elliptic curve parameters. The extracted key is used for AES encryption, providing an additional security layer for data confidentiality. The performance evaluation demonstrates efficient key generation and computational time, making this approach practical for IIoT environments. The experimental results indicate successful key generation and privacy amplification with a final key derived from the matched measurement bases. Elliptic curve generation successfully computes valid points supporting secure cryptographic operations. The estimated QBER ranged from 0.0 to 0.25, ensuring a secure key exchange. The AES encryption and decryption processes validate the usability of the generated key in real-world applications, confirming the robustness of our integrated QKD-ECC framework. The average key generation time ranged from 0.0000297 s, while the computational time was 0.0000714 s.
Key words: Quantum Key Distribution / BB84 Protocol / Elliptic Curve Cryptography / QBER / AES Encryption / Industrial Internet of Things (IIoT) / Secure Communication
© The Author(s) 2025
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

