SlideShare a Scribd company logo
Three-Party Authentication using
Quantum Key Distribution Protocols
By,
xxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx

Guided By : Mr. xxxxxxxxxxx.,
Abstract
This project presents Quantum Key Distribution
Protocols (QKDPs) to safeguard security in large
networks, by using DES algorithm for encryption and
decryption of .txt file.
 In this project, secure communication between the
sender and the receiver is being made possible through a
trusted center by using secret key authentication.

Abstract continued…
The Trusted Center distributes a quantum key to both
the sender and the receiver after the verification of the
secret key.
 The sender encrypts the data and sends to the receiver
side only after obtaining the quantum key from the
Trusted Center.
 Similarly the decryption process occurs. RSA algorithm
is being used for quantum key distribution. Finally the
input .txt file is retrieved on the receiver side.

Existing System


In classical cryptography, three-party key distribution
protocols utilize challenge response mechanisms or
timestamps to prevent replay attacks .



However, challenge response mechanisms require at
least two communication rounds between the TC and
participants.
Demerits of Existing System


The timestamp approach needs the assumption of clock
synchronization which is not practical in distributed
systems.



Furthermore, classical cryptography cannot detect the
existence of passive attacks such as eavesdropping.
Proposed System


In quantum cryptography, quantum key distribution protocols
(QKDPs) employ quantum mechanisms to distribute session keys
and public discussions to check for eavesdroppers and verify the
correctness of a session key.



However, public discussions require additional communication
rounds between a sender and receiver and cost precious qubits. By
contrast, classical cryptography provides convenient techniques that
enable efficient key verification and user authentication.



The advantages of both the classical and quantum cryptography are
utilized in the proposed QKDP.
Working Principle





In Proposed System, the sender and the receiver preshared their
secret key to the Trusted Center (TC).
In Trusted Center session key is generated by using secret key
and random string then quantum key is generated through qubit
generation.
To generate the quantum key using the qubit and the session key
which depends on the qubit combination such as,
1. If the value is 0 and 0, then 1/0.707(p[0]+p[1])
2. If the value is 1 and 0, then 1/0.707(p[0]-p[1])
3. If the value is 0 and 1, then p[0]
4. If the value is 1 and 1, then p[1]
System Requirements
Hardware Requirements
Processor
 RAM capacity
 Hard Disk


-

Intel Pentium III
128 MB
40 GB

Software Requirements
Operating System
 Front End
 Back End


-

Windows XP
Visual C# .Net
SQL Server 2000
List of modules
1.

Sender Module.

2.

Trusted Center Module and

3.

Receiver Module.
Module Description
Sender Module
This module has three sub-modules. They are,
1. Registration
2. Login
3. Send data
Modules Continued…
Trusted Center Module


Secret Key Verification



Session Key Generation



Qubit Generation



Quantum Key Generation



Key Distribution
Modules Continued…
Receiver Module
This module has three sub-modules. They are,
1. Registration
2. Login
3. Receive data
Use case Diagram – Quantum key
Generation
Algorithms


For Encryption & Decryption, DES algorithm is used.



For key Generation RSA algorithm is used, the
algorithms are explained as,
DES algorithm
RSA algorithm
Key Generation
1. Select p ,q where both p and q both prime, p≠q
2. Calculate n=p*q
3. Calculate Ø(n)=(p-1)(q-1)
4. Select integer e where gcd (Ø(n),e)=1; 1<e<Ø(n)
5. Calculate d where d= e^-1 mod Ø(n)
6. Public key KU={e ,n}
7. Private key KR={d ,n}
Registration form - Sender
Secret key Generation - Sender
After Registration - Sender
Login form - Sender
Trusted Center
Registration form- Receiver
Secret Key Generation - Receiver
After Registration - Receiver
Login form - Receiver
Quantum Key Generation (After
both sender and receiver logged in)
Path name of the .txt file and the Ip
address of the local system
Data to be Encrypted
After Encryption
Data to be decrypted
After Decryption
Original Data
Conclusion
Compared with classical three-party key distribution
protocols, the proposed QKDPs easily resist replay and
passive attacks.
 Compared with other QKDPs, the proposed schemes
efficiently achieve key verification and user authentication
and preserve a long-term secret key between the TC and each
user.
 Additionally, the proposed QKDPs have fewer
communication rounds than other protocols. Although the
requirement of the quantum channel can be costly in practice,
it may not be costly in the future.
 Moreover, the proposed QKDPs have been shown secure
under the random oracle model. By combining the advantages
of classical cryptography with quantum cryptography, this
work presents a new direction in designing QKDPs.

Future Enhancements
The whole project can be enhanced for secure
communication between two systems in a local area
network through the trusted center which can be a third
system in the local area network.
 The communication round between the sender and the
receiver becomes one by applying this project as well as
secret key authentication is being provided by the
trusted center which in turn generates the quantum key.

References


G. Li, “Efficient Network Authentication Protocols:
Lower Bounds and Optimal Implementations,”
Distributed Computing, vol. 9, no. 3, pp. 131-145, 1995.



A. Kehne, J. Schonwalder, and H. Langendorfer, “A
Nonce-Based Protocol for Multiple Authentications,”
ACM Operating Systems Rev., vol. 26, no. 4, pp. 84-89,
1992.



M. Bellare and P. Rogaway, “Provably Secure Session
Key Distribution: The Three Party Case,” Proc. 27th
ACM Symp. Theory of Computing, pp. 57-66, 1995.
THANK
YOU

More Related Content

What's hot

18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
IOSR Journals
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
ArthyR3
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
Christopher Frenz
 
Hash
HashHash
Hash
Tazo Al
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
IOSR Journals
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
Joel Briza
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
Meetendra Singh
 
Lecture12
Lecture12Lecture12
Lecture12
Hardik Padhy
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
Kathirvel Ayyaswamy
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
Pratik Tambekar
 

What's hot (19)

18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Ch09
Ch09Ch09
Ch09
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Unit 4
Unit 4Unit 4
Unit 4
 
Ch10
Ch10Ch10
Ch10
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
Hash
HashHash
Hash
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
Lecture12
Lecture12Lecture12
Lecture12
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
 

Viewers also liked

Iron ore ppt social studies
Iron ore ppt social studies Iron ore ppt social studies
Iron ore ppt social studies
Pooja Meledath
 
تقرير عن التعذيب في تونس سنة 1990
تقرير عن التعذيب في تونس سنة 1990تقرير عن التعذيب في تونس سنة 1990
تقرير عن التعذيب في تونس سنة 1990
Ala Zaatour
 
H A P P Y N E W Y E A R
H A P P Y   N E W   Y E A RH A P P Y   N E W   Y E A R
H A P P Y N E W Y E A RPooja Meledath
 
Yuri Vanetik: How Giving Gives Back
Yuri Vanetik: How Giving Gives BackYuri Vanetik: How Giving Gives Back
Yuri Vanetik: How Giving Gives Back
Yuri Vanetik
 
Yuri Vanetik: Candidates on Issues Part II
Yuri Vanetik: Candidates on Issues Part IIYuri Vanetik: Candidates on Issues Part II
Yuri Vanetik: Candidates on Issues Part II
Yuri Vanetik
 
Where Do the Candidates Stand - Part I
Where Do the Candidates Stand - Part IWhere Do the Candidates Stand - Part I
Where Do the Candidates Stand - Part I
Yuri Vanetik
 
SPM_august2016_V4
SPM_august2016_V4SPM_august2016_V4
SPM_august2016_V4yavkos
 
الشروع في مصادرة الرسوم العقارية
الشروع في مصادرة الرسوم العقاريةالشروع في مصادرة الرسوم العقارية
الشروع في مصادرة الرسوم العقارية
Ala Zaatour
 
Five Charities Changing the World as they Operate
Five Charities Changing the World as they OperateFive Charities Changing the World as they Operate
Five Charities Changing the World as they Operate
Yuri Vanetik
 
Client server computing in mobile environments
Client server computing in mobile environmentsClient server computing in mobile environments
Client server computing in mobile environments
Praveen Joshi
 

Viewers also liked (15)

Iron ore ppt social studies
Iron ore ppt social studies Iron ore ppt social studies
Iron ore ppt social studies
 
Solar system
Solar systemSolar system
Solar system
 
تقرير عن التعذيب في تونس سنة 1990
تقرير عن التعذيب في تونس سنة 1990تقرير عن التعذيب في تونس سنة 1990
تقرير عن التعذيب في تونس سنة 1990
 
Punctuation
PunctuationPunctuation
Punctuation
 
H A P P Y N E W Y E A R
H A P P Y   N E W   Y E A RH A P P Y   N E W   Y E A R
H A P P Y N E W Y E A R
 
Yuri Vanetik: How Giving Gives Back
Yuri Vanetik: How Giving Gives BackYuri Vanetik: How Giving Gives Back
Yuri Vanetik: How Giving Gives Back
 
Yuri Vanetik: Candidates on Issues Part II
Yuri Vanetik: Candidates on Issues Part IIYuri Vanetik: Candidates on Issues Part II
Yuri Vanetik: Candidates on Issues Part II
 
Bab%20 ii
Bab%20 iiBab%20 ii
Bab%20 ii
 
Where Do the Candidates Stand - Part I
Where Do the Candidates Stand - Part IWhere Do the Candidates Stand - Part I
Where Do the Candidates Stand - Part I
 
Family Time
Family TimeFamily Time
Family Time
 
SPM_august2016_V4
SPM_august2016_V4SPM_august2016_V4
SPM_august2016_V4
 
الشروع في مصادرة الرسوم العقارية
الشروع في مصادرة الرسوم العقاريةالشروع في مصادرة الرسوم العقارية
الشروع في مصادرة الرسوم العقارية
 
Learning
LearningLearning
Learning
 
Five Charities Changing the World as they Operate
Five Charities Changing the World as they OperateFive Charities Changing the World as they Operate
Five Charities Changing the World as they Operate
 
Client server computing in mobile environments
Client server computing in mobile environmentsClient server computing in mobile environments
Client server computing in mobile environments
 

Similar to Client server computing in mobile environments part 2

Security in Large Networks by Raja Velampalli
Security in Large Networks by Raja VelampalliSecurity in Large Networks by Raja Velampalli
Security in Large Networks by Raja Velampalli
Raja Velampalli
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
Priyasloka Arya
 
Mca3020 advanced database management system
Mca3020  advanced database management systemMca3020  advanced database management system
Mca3020 advanced database management system
smumbahelp
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
IJMER
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
eSAT Publishing House
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Emily Jones
 
O017128591
O017128591O017128591
O017128591
IOSR Journals
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
Rajesh Ishida
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
IJTET Journal
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
IJNSA Journal
 
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYCERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
IJNSA Journal
 
I1086066
I1086066I1086066
I1086066
Selva Raj
 
I1086066
I1086066I1086066
I1086066
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
ijsrd.com
 

Similar to Client server computing in mobile environments part 2 (20)

Security in Large Networks by Raja Velampalli
Security in Large Networks by Raja VelampalliSecurity in Large Networks by Raja Velampalli
Security in Large Networks by Raja Velampalli
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
Mca3020 advanced database management system
Mca3020  advanced database management systemMca3020  advanced database management system
Mca3020 advanced database management system
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
O017128591
O017128591O017128591
O017128591
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYCERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
 
I1086066
I1086066I1086066
I1086066
 
I1086066
I1086066I1086066
I1086066
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
 

Recently uploaded

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

Client server computing in mobile environments part 2

  • 1. Three-Party Authentication using Quantum Key Distribution Protocols By, xxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxx Guided By : Mr. xxxxxxxxxxx.,
  • 2. Abstract This project presents Quantum Key Distribution Protocols (QKDPs) to safeguard security in large networks, by using DES algorithm for encryption and decryption of .txt file.  In this project, secure communication between the sender and the receiver is being made possible through a trusted center by using secret key authentication. 
  • 3. Abstract continued… The Trusted Center distributes a quantum key to both the sender and the receiver after the verification of the secret key.  The sender encrypts the data and sends to the receiver side only after obtaining the quantum key from the Trusted Center.  Similarly the decryption process occurs. RSA algorithm is being used for quantum key distribution. Finally the input .txt file is retrieved on the receiver side. 
  • 4. Existing System  In classical cryptography, three-party key distribution protocols utilize challenge response mechanisms or timestamps to prevent replay attacks .  However, challenge response mechanisms require at least two communication rounds between the TC and participants.
  • 5. Demerits of Existing System  The timestamp approach needs the assumption of clock synchronization which is not practical in distributed systems.  Furthermore, classical cryptography cannot detect the existence of passive attacks such as eavesdropping.
  • 6. Proposed System  In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key.  However, public discussions require additional communication rounds between a sender and receiver and cost precious qubits. By contrast, classical cryptography provides convenient techniques that enable efficient key verification and user authentication.  The advantages of both the classical and quantum cryptography are utilized in the proposed QKDP.
  • 7. Working Principle    In Proposed System, the sender and the receiver preshared their secret key to the Trusted Center (TC). In Trusted Center session key is generated by using secret key and random string then quantum key is generated through qubit generation. To generate the quantum key using the qubit and the session key which depends on the qubit combination such as, 1. If the value is 0 and 0, then 1/0.707(p[0]+p[1]) 2. If the value is 1 and 0, then 1/0.707(p[0]-p[1]) 3. If the value is 0 and 1, then p[0] 4. If the value is 1 and 1, then p[1]
  • 8. System Requirements Hardware Requirements Processor  RAM capacity  Hard Disk  - Intel Pentium III 128 MB 40 GB Software Requirements Operating System  Front End  Back End  - Windows XP Visual C# .Net SQL Server 2000
  • 9. List of modules 1. Sender Module. 2. Trusted Center Module and 3. Receiver Module.
  • 10. Module Description Sender Module This module has three sub-modules. They are, 1. Registration 2. Login 3. Send data
  • 11. Modules Continued… Trusted Center Module  Secret Key Verification  Session Key Generation  Qubit Generation  Quantum Key Generation  Key Distribution
  • 12. Modules Continued… Receiver Module This module has three sub-modules. They are, 1. Registration 2. Login 3. Receive data
  • 13. Use case Diagram – Quantum key Generation
  • 14. Algorithms  For Encryption & Decryption, DES algorithm is used.  For key Generation RSA algorithm is used, the algorithms are explained as,
  • 16. RSA algorithm Key Generation 1. Select p ,q where both p and q both prime, p≠q 2. Calculate n=p*q 3. Calculate Ø(n)=(p-1)(q-1) 4. Select integer e where gcd (Ø(n),e)=1; 1<e<Ø(n) 5. Calculate d where d= e^-1 mod Ø(n) 6. Public key KU={e ,n} 7. Private key KR={d ,n}
  • 20. Login form - Sender
  • 23. Secret Key Generation - Receiver
  • 25. Login form - Receiver
  • 26. Quantum Key Generation (After both sender and receiver logged in)
  • 27. Path name of the .txt file and the Ip address of the local system
  • 28. Data to be Encrypted
  • 30. Data to be decrypted
  • 33. Conclusion Compared with classical three-party key distribution protocols, the proposed QKDPs easily resist replay and passive attacks.  Compared with other QKDPs, the proposed schemes efficiently achieve key verification and user authentication and preserve a long-term secret key between the TC and each user.  Additionally, the proposed QKDPs have fewer communication rounds than other protocols. Although the requirement of the quantum channel can be costly in practice, it may not be costly in the future.  Moreover, the proposed QKDPs have been shown secure under the random oracle model. By combining the advantages of classical cryptography with quantum cryptography, this work presents a new direction in designing QKDPs. 
  • 34. Future Enhancements The whole project can be enhanced for secure communication between two systems in a local area network through the trusted center which can be a third system in the local area network.  The communication round between the sender and the receiver becomes one by applying this project as well as secret key authentication is being provided by the trusted center which in turn generates the quantum key. 
  • 35. References  G. Li, “Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations,” Distributed Computing, vol. 9, no. 3, pp. 131-145, 1995.  A. Kehne, J. Schonwalder, and H. Langendorfer, “A Nonce-Based Protocol for Multiple Authentications,” ACM Operating Systems Rev., vol. 26, no. 4, pp. 84-89, 1992.  M. Bellare and P. Rogaway, “Provably Secure Session Key Distribution: The Three Party Case,” Proc. 27th ACM Symp. Theory of Computing, pp. 57-66, 1995.