Secure Three-Party Authenticated Quantum Key Distribution Protocols
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#1
22-10-2010, 12:04 PM



.doc   nsmail.doc (Size: 43 KB / Downloads: 93)

Secure Three-Party Authenticated Quantum Key Distribution Protocols

Secure Three-Party Authenticated Quantum Key Distribution Protocols

ABSTRACT

This project and implimentation presents Quantum Key Distribution Protocols (QKDP’s) to safeguard security in large networks, by using DES algorithm for encryption and decryption of .txt file. In this project and implimentation the sender and the receiver should register themselves into the separate databases maintained for them and then whenever each user either on the sender or the receiver side makes a login request, an individual secret key is created. The Trusted Center considered being the three party authenticates both the sender and the receiver, the secret key is generated by the Trusted Center.
The Trusted Center issues a quantum key to both the sender and the receiver after the verification of the secret key. The generation of the quantum key involves the selection of 8-bit random key using the appropriate function available in .Net. By using RSA algorithm session key is generated. The session key is converted into binary from which the last two binary digits are chosen through which the quantum key is created. Once the quantum key matches on both the sender and the receiver side, the data can be encrypted and the intermediate encrypted form is viewable. Similarly after decryption the encrypt_decrypt file is also available. Thus a secure transmission of data takes place between the sender and the receiver using Trusted Center.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  secure atm by image processing jaseelati 0 286 10-02-2015, 01:33 PM
Last Post: jaseelati
  secure atm by image processing abstract jaseelati 0 351 23-01-2015, 03:08 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,327 13-09-2014, 02:35 PM
Last Post: Radhika.m
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,700 13-05-2014, 10:16 AM
Last Post: seminar project topic
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,152 24-03-2014, 02:51 PM
Last Post: seminar project topic
  Security Framework for Wireless Communications in Smart Distribution Grid seminar tips 2 1,030 28-10-2013, 10:56 AM
Last Post: purplepearls
  Protocols and the TCP/IP Suite PPT seminar projects maker 0 385 28-09-2013, 02:42 PM
Last Post: seminar projects maker
  Open Secure Shell seminar ideas 4 4,097 27-09-2013, 10:05 AM
Last Post: seminar projects maker
  SIMULATION OF NETWORK PROTOCOLS: M/M/1 and M/M/1/N queues. seminar projects maker 0 429 25-09-2013, 04:29 PM
Last Post: seminar projects maker
  TCP/IP PROTOCOLS seminar projects maker 0 478 25-09-2013, 04:26 PM
Last Post: seminar projects maker