* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Securable network in 3 party network
Density matrix wikipedia , lookup
Theoretical and experimental justification for the Schrödinger equation wikipedia , lookup
Quantum field theory wikipedia , lookup
Bell's theorem wikipedia , lookup
Copenhagen interpretation wikipedia , lookup
Hydrogen atom wikipedia , lookup
Quantum dot wikipedia , lookup
Path integral formulation wikipedia , lookup
Quantum entanglement wikipedia , lookup
Coherent states wikipedia , lookup
Symmetry in quantum mechanics wikipedia , lookup
Quantum fiction wikipedia , lookup
Many-worlds interpretation wikipedia , lookup
EPR paradox wikipedia , lookup
Orchestrated objective reduction wikipedia , lookup
History of quantum field theory wikipedia , lookup
Interpretations of quantum mechanics wikipedia , lookup
Quantum computing wikipedia , lookup
Quantum group wikipedia , lookup
Hidden variable theory wikipedia , lookup
Quantum state wikipedia , lookup
Quantum machine learning wikipedia , lookup
Quantum teleportation wikipedia , lookup
Three Party Authentication for key Distributed Protocol using Classical and Quantum Cryptography Abstract This work presents combination of classical cryptography (existing) and quantum cryptography (proposed). Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication which is used to make authentication using quantum mechanism Objective In classical cryptography provides convenient techniques that enable efficient key verification and user authentication but it is not identify eavesdropping. Here, the enhanced key distribution protocol using classical and quantum cryptography will improve the security and authentication Existing System In classical cryptography, three-party key distribution protocols utilize challengeresponse mechanisms or timestamps to prevent replay attacks . However, challengeresponse mechanisms require at least two communication rounds between the TC and participants, and the timestamp approach needs the assumption of clock synchronization which is not practical in distributed systems (due to the unpredictable nature of network delays and potential hostile attacks) . Furthermore, classical cryptography cannot detect the existence of passive attacks such as eavesdropping. Proposed System In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key. However, public discussions require additional communication rounds between a sender and receiver and cost precious qubits. This section presents a 3AQKDP with implicit user authentication, which ensures that confidentiality is only possible for legitimate users and mutual authentication is achieved only after secure communication using the session key start. The proposed three-party QKDPs are executed purely in the quantum channel, and this work does not consider errors caused by environmental noise. Modules Sender Module Encryption Secret key Authentication Trusted Center Secret Key Verification Session Key Generation Qubit Generation Quantum Key Generation Hashing Key Distribution Receiver Module Secret key Authentication Decryption Software & Hardware Requirements Software Requirement Java1.3 or More Swings Windows 98 or more. Hardware requirement Hard disk : 40 GB RAM : 128mb Processor : Pentium Conclusion This study proposed two three-party QKDPs to demonstrate the advantages of combining classical cryptography with quantum cryptography. Compared with classical three-party key distribution protocols, the proposed QKDPs easily resist replay and passive attacks. Compared with other QKDPs, the proposed schemes efficiently achieve key verification and user authentication and preserve a longterm secret key between the TC and each user.