Secure Three-Party Authenticated Quantum Key Distribution Protocols
#1

[attachment=6729]

Secure Three-Party Authenticated Quantum Key Distribution Protocols

Secure Three-Party Authenticated Quantum Key Distribution Protocols

ABSTRACT

This project presents Quantum Key Distribution Protocols (QKDP’s) to safeguard security in large networks, by using DES algorithm for encryption and decryption of .txt file. In this project the sender and the receiver should register themselves into the separate databases maintained for them and then whenever each user either on the sender or the receiver side makes a login request, an individual secret key is created. The Trusted Center considered being the three party authenticates both the sender and the receiver, the secret key is generated by the Trusted Center.
The Trusted Center issues a quantum key to both the sender and the receiver after the verification of the secret key. The generation of the quantum key involves the selection of 8-bit random key using the appropriate function available in .Net. By using RSA algorithm session key is generated. The session key is converted into binary from which the last two binary digits are chosen through which the quantum key is created. Once the quantum key matches on both the sender and the receiver side, the data can be encrypted and the intermediate encrypted form is viewable. Similarly after decryption the encrypt_decrypt file is also available. Thus a secure transmission of data takes place between the sender and the receiver using Trusted Center.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: perfectly secure key distribution for dynamic conferences ppt, pasadena party riot, secure clustering in dsn with key predistribution and wcds ppt, party plot management system project in c c, three party authentication using quantum key distribution project source code, ferwell party ankaring, key distribution center kdc,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,168 31-10-2015, 02:16 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,331 03-04-2014, 11:39 PM
Last Post: seminar report asees
  QUANTUM CRYPTOGRAPHY- MAKING CODE UNBREAKABLE seminar class 2 2,451 11-07-2013, 02:07 PM
Last Post: computer topic
  Network security and protocols project topics 1 2,252 24-01-2013, 12:41 PM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 7,968 22-12-2012, 10:54 AM
Last Post: seminar details
  Secure Data Transmission PPT seminar surveyer 2 3,428 24-11-2012, 01:35 PM
Last Post: seminar details
  Public Key Cryptography and the RSA algorithm seminar class 1 2,482 23-11-2012, 11:32 AM
Last Post: seminar details
  A SURVEY OF QoS ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS project report helper 1 2,002 07-11-2012, 12:42 PM
Last Post: seminar details
  routing Protocols presentation project topics 1 3,836 07-11-2012, 12:42 PM
Last Post: seminar details
  Routing Protocols in Mobile Adhoc Networks iitbuji 2 3,649 07-11-2012, 12:41 PM
Last Post: seminar details

Forum Jump: