8/2/2019 Securable Network in 3 Party Network
1/12
Securable network in three-party protocols
8/2/2019 Securable Network in 3 Party Network
2/12
Abstract:
This work presents combination of classical
cryptography (existing) and quantum
cryptography (proposed).
Two three-party QKDPs, one with implicituser authentication and the other with explicit
mutual authentication which is used to make
authentication using quantum mechanism
8/2/2019 Securable Network in 3 Party Network
3/12
Introduction:
In classical cryptography provides convenienttechniques that enable efficient keyverification and user authentication but it isnot identify eavesdropping.
Here, the enhanced key distribution protocolusing classical and quantum cryptography
will improve the security and authentication
8/2/2019 Securable Network in 3 Party Network
4/12
Existing System:
In classical cryptography, three-party key distributionprotocols utilize challengeresponse mechanisms ortimestamps to prevent replay attacks .
However, challengeresponse mechanisms require at leasttwo communication rounds between the TC andparticipants, and the timestamp approach needs theassumption of clock synchronization which is notpractical in distributed systems (due to the unpredictable
nature of network delays and potential hostile attacks) . Furthermore, classical cryptography cannot detect the
existence of passive attacks such as eavesdropping.
8/2/2019 Securable Network in 3 Party Network
5/12
Disadvantages of Existing System:
Disadvantage of separate process 3AQKDP and 3AQKDPMA
were provide the authentication only for message, to identify
the security threads in the message. Not identify the security
threads in the session key.
8/2/2019 Securable Network in 3 Party Network
6/12
Proposed System:
In quantum cryptography, quantum key distributionprotocols (QKDPs) employ quantum mechanisms todistribute session keys and public discussions to check
for eavesdroppers and verify the correctness of asession key.
However, public discussions require additionalcommunication rounds between a sender and receiverand cost precious qubits.
8/2/2019 Securable Network in 3 Party Network
7/12
This section presents a 3AQKDP with implicit userauthentication, which ensures that confidentiality isonly possible for legitimate users and mutualauthentication is achieved only after secure
communication using the session key start. Theproposed three-party QKDPs are executed purely in thequantum channel, and this work does not considererrors caused by environmental noise.
8/2/2019 Securable Network in 3 Party Network
8/12
Advantages of Proposed System
Data would be more secure when Compared to
Existing System
High Efficiency
8/2/2019 Securable Network in 3 Party Network
9/12
Project Architecture:
Trusted
center
Receiver
Secret Key Secret Key
Session Key
Encrypted Msg by Sess Key
Level1
Key Generation
Sender
8/2/2019 Securable Network in 3 Party Network
10/12
Modules:
Sender Module Encryption Secret key Authentication
Trusted Center Secret Key Verification
Session Key Generation
Qubit Generation
Quantum Key Generation
Hashing
Key Distribution
8/2/2019 Securable Network in 3 Party Network
11/12
Receiver Module Secret key Authentication
Decryption
8/2/2019 Securable Network in 3 Party Network
12/12
Software Specifications:
Software Requirement
Java1.3 or More
Java Swing
Hardware requirement
Hard disk : 40 GB
RAM : 128mb
Processor : Pentium