SlideShare a Scribd company logo
By Avinash Varma. K (07C71A1209) DEPARTMENT  OF INFORMATION TECHNOLOGY (ELLENKI COLLEGE OF ENGG & TECH)
Abstract This work presents quantum key distribution protocols ( QKDPs ) to  safeguard security  in large networks, ushering in new directions in classical cryptography and quantum cryptography.  Two three-party QKDPs, one with  implicit user authentication  and the other with  explicit mutual authentication , are proposed to demonstrate the merits of the new combination.
Existing System In classical cryptography, three-party key distribution protocols utilize challenge response mechanisms or timestamps to prevent replay attacks.  Classical cryptography cannot detect the existence of passive attacks such as eavesdropping.
Limitations of Existing System Identifies the security threads in the message, but not the security threads in the session key.
Proposed System The primary goal of the system is to provide the security to the users, the security is provided by using Quantum mechanisms.
Advantages of the Proposed System Security against such attacks as man-in-the-middle, eavesdropping and replay, Efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and  Two parties can share and use a long-term secret (repeatedly).
Modules Sender Module Receiver Module Trust Center
UML Diagrams Use Case Diagram Class Diagram Sequence Diagram Activity Diagram
 
Use Case(Trust Center) Trusted center Secret key verification Session key verification Qubit generation  Quantum key generation  Hashing Key distribution
Class Diagram
 
 
 
Activity Diagram(Receiver)
Column Name Data Type Allow Nulls Uid int Uname varchar(50) ✔ Pwd varchar(50) ✔ Secret varchar(50) ✔ LoginDate varchar(50) ✔ LoginTime Varchar(50) ✔
Column Name Data Type Allow Nulls Uid int Uname varchar(50) ✔ Pwd varchar(50) ✔ Secret varchar(50) ✔ LoginDate varchar(50) ✔ LoginTime Varchar(50) ✔
 
 
 
 
 
 
 
 
After Encryption Before Encryption
After Decryption Before Decryption
Future Enhancement At present, by using my project only .txt format files can be transmitted, in future my project should be developed in such a way that it can support different formats in order to transfer files using QKDPs.
Reference  http://www.w3schools.com http://ieeexplore.ieee.org http://www.idquantique.com
THANK  YOU ...!

More Related Content

PDF
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
PPTX
Seattle Scalability Meetup 6-26-13
PDF
Post quantum cryptography
PDF
Compression and information leakage of plaintext
PDF
暗認本読書会9
PPTX
[Wroclaw #8] TLS all the things!
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
Seattle Scalability Meetup 6-26-13
Post quantum cryptography
Compression and information leakage of plaintext
暗認本読書会9
[Wroclaw #8] TLS all the things!

What's hot (17)

PPT
Message Authentication
PPT
Hash crypto
PDF
TLS/SSL Protocol Design
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
PDF
TLS/SSL Protocol Design 201006
PPT
Message Authentication
PDF
SSL/TLS Handshake
PPTX
All you need to know about transport layer security
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
PPTX
MAC-Message Authentication Codes
PPTX
SSL And TLS
PDF
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
PDF
Post quantum cryptography - thesis
PPT
Message authentication and hash function
PPT
Encryption
PPT
Cryptography Lecture by Sam Bowne
PDF
Transport Layer Security - Mrinal Wadhwa
Message Authentication
Hash crypto
TLS/SSL Protocol Design
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
TLS/SSL Protocol Design 201006
Message Authentication
SSL/TLS Handshake
All you need to know about transport layer security
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
MAC-Message Authentication Codes
SSL And TLS
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
Post quantum cryptography - thesis
Message authentication and hash function
Encryption
Cryptography Lecture by Sam Bowne
Transport Layer Security - Mrinal Wadhwa
Ad

Viewers also liked (7)

PPT
04 Des Aes
PPT
CHỮ KÝ SỐ & ỨNG DỤNG
PDF
Encryption and Key Distribution Methods
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PPT
key distribution in network security
PPT
Socket System Calls
PPTX
Overview on Cryptography and Network Security
04 Des Aes
CHỮ KÝ SỐ & ỨNG DỤNG
Encryption and Key Distribution Methods
Panda public auditing for shared data with efficient user revocation in the c...
key distribution in network security
Socket System Calls
Overview on Cryptography and Network Security
Ad

Similar to Provably Secure Three Party Authenticated Quantum Key Distribution Protocols (20)

PPT
Security in Large Networks by Raja Velampalli
PPT
Client server computing in mobile environments part 2
PPTX
Efficient authentication for mobile and pervasive computing
PPTX
Efficient authentication for mobile and pervasive computing
PDF
Three Party Authenticated Key Distribution using Quantum Cryptography
PPT
ITDCC05.ppt
DOC
Decentralized access control with anonymous authentication of data stored in ...
DOC
Decentralized access control with anonymous authentication of data stored in ...
DOC
IEEE paper 2014 abstract
PPT
Distributed System by Pratik Tambekar
PDF
TAM new report
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
DOCX
Providing user security guarantees in public infrastructure clouds
DOCX
Efficient authentication for mobile and pervasive computing
DOC
Decentralized access control with anonymous authentication of data stored in ...
PDF
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
PDF
W04404135146
PDF
Improved Secure Cloud Transmission Protocol
PDF
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
Security in Large Networks by Raja Velampalli
Client server computing in mobile environments part 2
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Three Party Authenticated Key Distribution using Quantum Cryptography
ITDCC05.ppt
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
IEEE paper 2014 abstract
Distributed System by Pratik Tambekar
TAM new report
Key aggregate cryptosystem for scalable data sharing in cloud storage
Providing user security guarantees in public infrastructure clouds
Efficient authentication for mobile and pervasive computing
Decentralized access control with anonymous authentication of data stored in ...
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
W04404135146
Improved Secure Cloud Transmission Protocol
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Presentation on HIE in infants and its manifestations
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Classroom Observation Tools for Teachers
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Types and Its function , kingdom of life
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
Module 4: Burden of Disease Tutorial Slides S2 2025
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Presentation on HIE in infants and its manifestations
202450812 BayCHI UCSC-SV 20250812 v17.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Classroom Observation Tools for Teachers
O5-L3 Freight Transport Ops (International) V1.pdf
Supply Chain Operations Speaking Notes -ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Types and Its function , kingdom of life
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial disease of the cardiovascular and lymphatic systems
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india

Provably Secure Three Party Authenticated Quantum Key Distribution Protocols

  • 1. By Avinash Varma. K (07C71A1209) DEPARTMENT OF INFORMATION TECHNOLOGY (ELLENKI COLLEGE OF ENGG & TECH)
  • 2. Abstract This work presents quantum key distribution protocols ( QKDPs ) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication , are proposed to demonstrate the merits of the new combination.
  • 3. Existing System In classical cryptography, three-party key distribution protocols utilize challenge response mechanisms or timestamps to prevent replay attacks. Classical cryptography cannot detect the existence of passive attacks such as eavesdropping.
  • 4. Limitations of Existing System Identifies the security threads in the message, but not the security threads in the session key.
  • 5. Proposed System The primary goal of the system is to provide the security to the users, the security is provided by using Quantum mechanisms.
  • 6. Advantages of the Proposed System Security against such attacks as man-in-the-middle, eavesdropping and replay, Efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and Two parties can share and use a long-term secret (repeatedly).
  • 7. Modules Sender Module Receiver Module Trust Center
  • 8. UML Diagrams Use Case Diagram Class Diagram Sequence Diagram Activity Diagram
  • 9.  
  • 10. Use Case(Trust Center) Trusted center Secret key verification Session key verification Qubit generation Quantum key generation Hashing Key distribution
  • 12.  
  • 13.  
  • 14.  
  • 16. Column Name Data Type Allow Nulls Uid int Uname varchar(50) ✔ Pwd varchar(50) ✔ Secret varchar(50) ✔ LoginDate varchar(50) ✔ LoginTime Varchar(50) ✔
  • 17. Column Name Data Type Allow Nulls Uid int Uname varchar(50) ✔ Pwd varchar(50) ✔ Secret varchar(50) ✔ LoginDate varchar(50) ✔ LoginTime Varchar(50) ✔
  • 18.  
  • 19.  
  • 20.  
  • 21.  
  • 22.  
  • 23.  
  • 24.  
  • 25.  
  • 28. Future Enhancement At present, by using my project only .txt format files can be transmitted, in future my project should be developed in such a way that it can support different formats in order to transfer files using QKDPs.
  • 29. Reference http://www.w3schools.com http://ieeexplore.ieee.org http://www.idquantique.com
  • 30. THANK YOU ...!