Three Party Authentications for key Distributed Protocol using Implicit and Explicit
#1

Three Party Authentications for key Distributed Protocol using Implicit and Explicit Quantum Cryptography
Abstract:
The combination of 3AQKDP (implicit) and 3AQKDPMA (explicit) quantum cryptography is used to provide authenticated secure communication between sender and receiver.
In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key. However, public discussions require additional communication rounds between a sender and receiver. The advantage of quantum cryptography easily resists replay and passive attacks.
A 3AQKDP with implicit user authentication, which ensures that confidentiality, is only possible for legitimate users and mutual authentication is achieved only after secure communication using the session key start.
In implicit quantum key distribution protocol (3AQKDP) have two phases such as setup phase and distribution phase to provide three party authentications with secure session key distribution. In this system there is no mutual understanding between sender and receiver. Both sender and receiver should communicate over trusted center.
In explicit quantum key distribution protocol (3AQKDPMA) have two phases such as setup phase and distribution phase to provide three party authentications with secure session key distribution. I have mutual understanding between sender and receiver. Both sender and receiver should communicate directly with authentication of trusted center.
Disadvantage of separate process 3AQKDP and 3AQKDPMA were provide the authentication only for message, to identify the security threads in the message. Not identify the security threads in the session key.
Software Requirement Specification
The software requirement specification is produced at the culmination of the analysis task. The function and performance allocated to software as part of system engineering are refined by establishing a complete information description as functional representation, a representation of system behavior, an indication of performance requirements and design constraints, appropriate validation criteria.
User Interface
* Swing - Swing is a set of classes that provides more powerful and flexible components that are possible with AWT. In addition to the familiar components, such as button checkboxes and labels, swing supplies several exciting additions, including tabbed panes, scroll panes, trees and tables.
* Applet - Applet is a dynamic and interactive program that can run inside a web page displayed by a java capable browser such as hot java or Netscape.
Hardware Interface
Hard disk : 40 GB
RAM : 512 MB
Processor Speed : 3.00GHz
Processor : Pentium IV Processor
Software Interface
JDK 1.5
Java Swing
MS-Access/SQL Server
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: implicit passwords, sandop party, freshar party dialog, ppt for finding bugs in web applications using dynamic test generation and explicit state model checking, party schools of 2012, ppt three party authentication for key distribution protocol using classical and quantum cryptography, sendoff party anchorig ppatern,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Three Party Authentications for key Distributed Protocol using Implicit and Explicit - by mechanical engineering crazy - 28-08-2009, 02:03 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,129 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,743 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Combination Lock with LCD and Keypad using pic16f628A: seminar surveyer 5 4,683 30-08-2014, 02:51 AM
Last Post: Guest
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,105 03-06-2013, 11:13 AM
Last Post: computer topic
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 3,563 17-04-2013, 11:37 PM
Last Post: [email protected]
  Image Transfer Protocol for Internt project topics 3 2,328 26-03-2013, 07:42 PM
Last Post: vvk chary
  distributed cache updating for the dynamic source routing protocol project report tiger 4 3,000 05-03-2013, 02:22 PM
Last Post: Guest
  DISTRIBUTED MOBILITY MANAGEMENT FOR TARGET TACKING IN MOBILE SENSOR NETWORKS computer science technology 4 4,015 22-02-2013, 03:05 PM
Last Post: seminar details
  Stateless Multicast Protocol for Ad Hoc Networks Projects9 1 1,389 29-11-2012, 01:06 PM
Last Post: seminar details

Forum Jump: