- document
-
van Mil, Juliette (author)This report reviews two quantum key distribution (QKD) protocols: the BB84 protocol and the measurement device independent (MDI) QKD protocol. The goal of this report is to recreate the security proof of the BB84 protocol, to generate the secret key rate for a practical application of the BB84 protocol, both with and without decoy states, and to...bachelor thesis 2021
- document
-
Stenhuis, Ruben (author)While the Routing Protocol for Low Power and Lossy Networks (RPL) is built to support the constraints of low-powered devices, it struggles to meet the standards in security. Generally, low-powered devices are challenged with limited cryptography, tough key management, and interoperability issues. Despite these concerns, security is not only...bachelor thesis 2021