Download Securable network in 3 party network

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Density matrix wikipedia , lookup

Theoretical and experimental justification for the Schrödinger equation wikipedia , lookup

Max Born wikipedia , lookup

Quantum field theory wikipedia , lookup

Bell's theorem wikipedia , lookup

Copenhagen interpretation wikipedia , lookup

Hydrogen atom wikipedia , lookup

Quantum dot wikipedia , lookup

Path integral formulation wikipedia , lookup

Quantum entanglement wikipedia , lookup

Coherent states wikipedia , lookup

Symmetry in quantum mechanics wikipedia , lookup

Quantum fiction wikipedia , lookup

Many-worlds interpretation wikipedia , lookup

EPR paradox wikipedia , lookup

Orchestrated objective reduction wikipedia , lookup

History of quantum field theory wikipedia , lookup

Interpretations of quantum mechanics wikipedia , lookup

Quantum computing wikipedia , lookup

Quantum group wikipedia , lookup

Hidden variable theory wikipedia , lookup

Quantum state wikipedia , lookup

Quantum machine learning wikipedia , lookup

Quantum teleportation wikipedia , lookup

T-symmetry wikipedia , lookup

Canonical quantization wikipedia , lookup

Quantum key distribution wikipedia , lookup

Transcript
Three Party
Authentication for key
Distributed Protocol
using Classical and
Quantum Cryptography
Abstract


This work presents combination of classical
cryptography (existing) and quantum
cryptography (proposed).
Two three-party QKDPs, one with implicit
user authentication and the other with explicit
mutual authentication which is used to make
authentication using quantum mechanism
Objective


In classical cryptography provides
convenient techniques that enable
efficient key verification and user
authentication but it is not identify
eavesdropping.
Here, the enhanced key distribution
protocol using classical and quantum
cryptography will improve the security and
authentication
Existing System



In classical cryptography, three-party key distribution
protocols utilize challengeresponse mechanisms or
timestamps to prevent replay attacks .
However, challengeresponse mechanisms require at least
two communication rounds between the TC and
participants, and the timestamp approach needs the
assumption of clock synchronization which is not practical
in distributed systems (due to the unpredictable nature of
network delays and potential hostile attacks) .
Furthermore, classical cryptography cannot detect the
existence of passive attacks such as eavesdropping.
Proposed System


In quantum cryptography, quantum key distribution
protocols (QKDPs) employ quantum mechanisms to
distribute session keys and public discussions to
check for eavesdroppers and verify the correctness
of a session key.
However, public discussions require additional
communication rounds between a sender and
receiver and cost precious qubits.

This section presents a 3AQKDP with implicit user
authentication, which ensures that confidentiality is
only possible for legitimate users and mutual
authentication is achieved only after secure
communication using the session key start. The
proposed three-party QKDPs are executed purely in
the quantum channel, and this work does not
consider errors caused by environmental noise.
Modules
Sender Module
Encryption
Secret key Authentication
Trusted Center
Secret Key Verification
Session Key Generation
Qubit Generation
Quantum Key Generation
Hashing
Key Distribution
Receiver Module
Secret key Authentication
Decryption
Software & Hardware
Requirements

Software Requirement




Java1.3 or More
Swings
Windows 98 or more.
Hardware requirement



Hard disk
:
40 GB
RAM
:
128mb
Processor : Pentium
Conclusion

This study proposed two three-party QKDPs to
demonstrate the advantages of combining classical
cryptography with quantum cryptography. Compared
with classical three-party key distribution protocols, the
proposed QKDPs easily resist replay and passive
attacks. Compared with other QKDPs, the proposed
schemes efficiently achieve key verification and user
authentication and preserve a longterm secret key
between the TC and each user.