Abstract:
An algorithm simulating the behavior of participants in the BB84 protocol has been developed. It demonstrates the possibility of restoring a shared secret under noisy conditions and in the presence of potential attacks. Additionally, compatibility with existing cryptographic tools for data storage and transmission is ensured. Computational experiments confirm the correctness of the simulation and the method’s resilience against basic attacks.