Ideally, in any quantum key distribution (QKD) Keywords: Hamming code, error correction, QKD, reconciliation protocol.
INTRODUCTIONConfidentiality, integrity, authentication and non-repudiation are four significant criteria specified to ensure secrecy in communication between legitimate parties nowadays [1 -6]. In order to achieve these requirements, several measures based on cryptography have long since been practiced. Previously confidentiality is secured via encryption by transforming ordinary message into scrambled text prior to dissemination, thus concealing information in the message. Meanwhile, one-way cryptographic hash function was exploited to corroborate the correctness of a received message without undue amendment in transit, thus contributing towards the verification of message integrity. Surpassing the hash function, the utilization of message authentication code allows authentication to justify user identity besides safeguarding message's integrity. Lastly, digital signature is utilized to address nonrepudiation, deterring refutability of forgeable actions like financial transaction consummated via electronic payment [1].The Advanced Encryption Standard (AES) [7,8] is a symmetric-key cryptography which has been adopted worldwide today to protect classified information. An algorithm described by Ronald Rivest, Adi Shamir and Leonard Adleman or commonly known as RSA [9] is the pioneer in brand-new asymmetric-key cryptography, used mainly to consolidate key-agreement protocol. Together with lengthy secret key, the former utilizes substitutionpermutation network which creates confusion and diffusion for secure cryptography, whereas the later makes use of infeasibility to factor large numbers in retrieving key via classical computer for the same purpose [10].