Secure Three-Party Authenticated Quantum Key Distribution Protocols
#1

[attachment=6729]

Secure Three-Party Authenticated Quantum Key Distribution Protocols

Secure Three-Party Authenticated Quantum Key Distribution Protocols

ABSTRACT

This project presents Quantum Key Distribution Protocols (QKDP’s) to safeguard security in large networks, by using DES algorithm for encryption and decryption of .txt file. In this project the sender and the receiver should register themselves into the separate databases maintained for them and then whenever each user either on the sender or the receiver side makes a login request, an individual secret key is created. The Trusted Center considered being the three party authenticates both the sender and the receiver, the secret key is generated by the Trusted Center.
The Trusted Center issues a quantum key to both the sender and the receiver after the verification of the secret key. The generation of the quantum key involves the selection of 8-bit random key using the appropriate function available in .Net. By using RSA algorithm session key is generated. The session key is converted into binary from which the last two binary digits are chosen through which the quantum key is created. Once the quantum key matches on both the sender and the receiver side, the data can be encrypted and the intermediate encrypted form is viewable. Similarly after decryption the encrypt_decrypt file is also available. Thus a secure transmission of data takes place between the sender and the receiver using Trusted Center.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: authenticated group key transfer protocol based on secret sharing project report, project x party in california, feveral party joks, anchering for freser party, secure clustering in dsn with key predistribution and wcds ppt, quantum key distribution in 802 11 ppt, uml authenticated group key transfer protocol based on secret sharing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,181 31-10-2015, 02:16 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,390 03-04-2014, 11:39 PM
Last Post: seminar report asees
  QUANTUM CRYPTOGRAPHY- MAKING CODE UNBREAKABLE seminar class 2 2,457 11-07-2013, 02:07 PM
Last Post: computer topic
  Network security and protocols project topics 1 2,253 24-01-2013, 12:41 PM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 7,973 22-12-2012, 10:54 AM
Last Post: seminar details
  Secure Data Transmission PPT seminar surveyer 2 3,429 24-11-2012, 01:35 PM
Last Post: seminar details
  Public Key Cryptography and the RSA algorithm seminar class 1 2,484 23-11-2012, 11:32 AM
Last Post: seminar details
  A SURVEY OF QoS ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS project report helper 1 2,007 07-11-2012, 12:42 PM
Last Post: seminar details
  routing Protocols presentation project topics 1 3,842 07-11-2012, 12:42 PM
Last Post: seminar details
  Routing Protocols in Mobile Adhoc Networks iitbuji 2 3,661 07-11-2012, 12:41 PM
Last Post: seminar details

Forum Jump: