Your SlideShare is downloading. ×
0
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Provably Secure Three Party Authenticated Quantum Key Distribution Protocols
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Provably Secure Three Party Authenticated Quantum Key Distribution Protocols

2,863

Published on

This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, using in new directions in classical cryptography and quantum cryptography. Two three-party …

This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, using in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following:
1) Security against such attacks as man-in-the-middle, eavesdropping and replay.
2) Efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs.
3) Two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.

Project Execution: https://vimeo.com/AvinashVarma/provably

Published in: Education
4 Comments
6 Likes
Statistics
Notes
No Downloads
Views
Total Views
2,863
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
4
Likes
6
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. By Avinash Varma. K (07C71A1209) DEPARTMENT OF INFORMATION TECHNOLOGY (ELLENKI COLLEGE OF ENGG & TECH)
  • 2. Abstract <ul><li>This work presents quantum key distribution protocols ( QKDPs ) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. </li></ul><ul><li>Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication , are proposed to demonstrate the merits of the new combination. </li></ul>
  • 3. Existing System <ul><li>In classical cryptography, three-party key distribution protocols utilize challenge response mechanisms or timestamps to prevent replay attacks. </li></ul><ul><li>Classical cryptography cannot detect the existence of passive attacks such as eavesdropping. </li></ul>
  • 4. Limitations of Existing System <ul><li>Identifies the security threads in the message, but not the security threads in the session key. </li></ul>
  • 5. Proposed System <ul><li>The primary goal of the system is to provide the security to the users, the security is provided by using Quantum mechanisms. </li></ul>
  • 6. Advantages of the Proposed System <ul><li>Security against such attacks as man-in-the-middle, eavesdropping and replay, </li></ul><ul><li>Efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and </li></ul><ul><li>Two parties can share and use a long-term secret (repeatedly). </li></ul>
  • 7. Modules <ul><li>Sender Module </li></ul><ul><li>Receiver Module </li></ul><ul><li>Trust Center </li></ul>
  • 8. UML Diagrams <ul><li>Use Case Diagram </li></ul><ul><li>Class Diagram </li></ul><ul><li>Sequence Diagram </li></ul><ul><li>Activity Diagram </li></ul>
  • 9.  
  • 10. Use Case(Trust Center) Trusted center Secret key verification Session key verification Qubit generation Quantum key generation Hashing Key distribution
  • 11. Class Diagram
  • 12.  
  • 13.  
  • 14.  
  • 15. Activity Diagram(Receiver)
  • 16. Column Name Data Type Allow Nulls Uid int Uname varchar(50) ✔ Pwd varchar(50) ✔ Secret varchar(50) ✔ LoginDate varchar(50) ✔ LoginTime Varchar(50) ✔
  • 17. Column Name Data Type Allow Nulls Uid int Uname varchar(50) ✔ Pwd varchar(50) ✔ Secret varchar(50) ✔ LoginDate varchar(50) ✔ LoginTime Varchar(50) ✔
  • 18.  
  • 19.  
  • 20.  
  • 21.  
  • 22.  
  • 23.  
  • 24.  
  • 25.  
  • 26. After Encryption Before Encryption
  • 27. After Decryption Before Decryption
  • 28. Future Enhancement <ul><li>At present, by using my project only .txt format files can be transmitted, in future my project should be developed in such a way that it can support different formats in order to transfer files using QKDPs. </li></ul>
  • 29. Reference <ul><ul><li>http://www.w3schools.com </li></ul></ul><ul><ul><li>http://ieeexplore.ieee.org </li></ul></ul><ul><ul><li>http://www.idquantique.com </li></ul></ul>
  • 30. THANK YOU ...!

×