Three Party Authentications for key Distributed Protocol using Implicit and Explicit
#1

Three Party Authentications for key Distributed Protocol using Implicit and Explicit Quantum Cryptography
Abstract:
The combination of 3AQKDP (implicit) and 3AQKDPMA (explicit) quantum cryptography is used to provide authenticated secure communication between sender and receiver.
In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key. However, public discussions require additional communication rounds between a sender and receiver. The advantage of quantum cryptography easily resists replay and passive attacks.
A 3AQKDP with implicit user authentication, which ensures that confidentiality, is only possible for legitimate users and mutual authentication is achieved only after secure communication using the session key start.
In implicit quantum key distribution protocol (3AQKDP) have two phases such as setup phase and distribution phase to provide three party authentications with secure session key distribution. In this system there is no mutual understanding between sender and receiver. Both sender and receiver should communicate over trusted center.
In explicit quantum key distribution protocol (3AQKDPMA) have two phases such as setup phase and distribution phase to provide three party authentications with secure session key distribution. I have mutual understanding between sender and receiver. Both sender and receiver should communicate directly with authentication of trusted center.
Disadvantage of separate process 3AQKDP and 3AQKDPMA were provide the authentication only for message, to identify the security threads in the message. Not identify the security threads in the session key.
Software Requirement Specification
The software requirement specification is produced at the culmination of the analysis task. The function and performance allocated to software as part of system engineering are refined by establishing a complete information description as functional representation, a representation of system behavior, an indication of performance requirements and design constraints, appropriate validation criteria.
User Interface
* Swing - Swing is a set of classes that provides more powerful and flexible components that are possible with AWT. In addition to the familiar components, such as button checkboxes and labels, swing supplies several exciting additions, including tabbed panes, scroll panes, trees and tables.
* Applet - Applet is a dynamic and interactive program that can run inside a web page displayed by a java capable browser such as hot java or Netscape.
Hardware Interface
Hard disk : 40 GB
RAM : 512 MB
Processor Speed : 3.00GHz
Processor : Pentium IV Processor
Software Interface
JDK 1.5
Java Swing
MS-Access/SQL Server
Reply
#2
i want the full project document for This topic. can u please mail me.. its urgent.
Reply
#3
plz send me full report and ppt of this project.
thank u.
Reply
#4
please send me the full reports
esandapo[at]yahoo.co.uk
thanks
Reply
#5
can u plz send me the full details,documents,pptr,reports of this project to my mail id..?? i really need this project very much..
thnx in adv.
Reply
#6

to get information about the topic"Three Party Authentications for key Distributed Protocol using Implicit and Explicit" refer the page link bellow

http://studentbank.in/report-three-party...d-explicit
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: three party authentication for quantum key distribution protocol, key generation, implicit, explicit load balancing technique for ngeo satellite ip networks with on board processing capabilities ppts, fressers party cotation, three party authentication using quantum key distribution project source code, invitation farwell party,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,047 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,653 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Combination Lock with LCD and Keypad using pic16f628A: seminar surveyer 5 4,604 30-08-2014, 02:51 AM
Last Post: Guest
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,022 03-06-2013, 11:13 AM
Last Post: computer topic
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 3,442 17-04-2013, 11:37 PM
Last Post: [email protected]
  Image Transfer Protocol for Internt project topics 3 2,265 26-03-2013, 07:42 PM
Last Post: vvk chary
  distributed cache updating for the dynamic source routing protocol project report tiger 4 3,000 05-03-2013, 02:22 PM
Last Post: Guest
  DISTRIBUTED MOBILITY MANAGEMENT FOR TARGET TACKING IN MOBILE SENSOR NETWORKS computer science technology 4 3,911 22-02-2013, 03:05 PM
Last Post: seminar details
  Stateless Multicast Protocol for Ad Hoc Networks Projects9 1 1,324 29-11-2012, 01:06 PM
Last Post: seminar details

Forum Jump: