A SECURE AND EFFICIENT KEY DISTRIBUTION SYSTEM
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science technology
Active In SP
**

Posts: 740
Joined: Jan 2010
#1
30-01-2010, 07:19 AM


The project and implimentation implements the fundamental establishment of group key through distributed and collaborative approach for a dynamic peer group. The main function of the project and implimentation is to provide secured communication through key authentication process. Three Interval Based Re-Keying algorithms are used to eliminate the individual re-keying approach in which re-computation of the key is performed after each joining and leaving of the member. The three interval based re-keying algorithms are 1. Rebuild Algorithm 2. Batch Algorithm 3. Queue-Batch Algorithm. The usage of these three interval based rekeying algorithm maintains the distributed nature in which there is no centralized key server and collaborative nature in which the key is generated in a contributory fashion. The interval based re-keying algorithms significantly out-performs the individual rekeying algorithm. Queue-Batch Algorithm performs the best among the three intervals based algorithms. More importantly, the Queue-Batch Algorithm substantially reduces the computation workload in a highly dynamic environment. The interval based re-keying algorithms concentrates on authentication, which focuses on security.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
fruit
Active In SP
**

Posts: 18
Joined: May 2011
#2
20-05-2011, 10:39 AM

plz send a full report to my email - fruit_ooi10@yahoo.com
Reply
seminar-database
Active In SP
**

Posts: 133
Joined: May 2011
#3
20-05-2011, 09:36 PM

A Secure and Efficient Conference Key Distribution System

A practical interactive conference key distribution system based on public keys is presented in this article. Under the assumption that the Diffie-Hellman problem is intractable, the system is proven secure. The users are authenticated by the system and they can compute their own conference keys. The number of interactions required is independent of the number of users. The same amount of computation and communication is performed by all the users involved.
The secret keys must be distributed securely in order to communicate securely over insecure channels. If the keys are not distributed safely, the entire system is vulnerable even if the encryption algorithm used is computationally infeasible to break. the Diffie-Hellman key distribution system is the most popular among the ones that has been proposed for this purpose. This enables two users to compute a common key from a secret key and publicly exchanged information.But it has the drawback that it does not authenticate the users. a conference key distribution system is used when more than two users want to compute a common key.owing to the the complexity of the interactions between the many users, designing of such systems can be very challenging.

Get the report here:
cs.fsu.edu/~langley/Eurocrypt/euro-pre.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 736 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering report seminar projects maker 0 469 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  Efficient and Robust Detection of Duplicate Videos in a Large Database Report seminar projects maker 0 450 24-09-2013, 12:47 PM
Last Post: seminar projects maker
  EFFICIENT RESOURCE ALLOCATION FOR WIRELESS MUTICAST ABSTRACT study tips 0 380 07-09-2013, 04:57 PM
Last Post: study tips
  Efficient Fuzzy Type-Ahead Search in XML Data pdf study tips 0 511 07-09-2013, 04:56 PM
Last Post: study tips
  THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT study tips 0 438 29-08-2013, 02:15 PM
Last Post: study tips
  Secure Access for MANET Using Authorization Enforcement Facility Report study tips 0 343 27-08-2013, 12:56 PM
Last Post: study tips
  EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS REPORT project girl 1 915 17-08-2013, 11:16 PM
Last Post: Guest
  Scalable and Efficient Provable Data Possession Abstract study tips 0 23,768 16-08-2013, 05:00 PM
Last Post: study tips
  Toward publicly auditable secure cloud data storage services Abstract study tips 0 332 16-08-2013, 04:59 PM
Last Post: study tips