Security Proofs for Quantum Key Distribution Protocols by Numerical Approaches