You are on page 1of 5

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

Belgaum-590014.

A Final Year Project


“SYNOPSIS”
For The Academic Year 2010-2011
By

NAVEEN S K. 1RC07CS059
ANAND B S. 1RC07CS008

Sri Revana Siddeshwara Institute of Technology


Department of Computer Science & Engineering
Chikkajala,Bangalore-562157.

i
Three Party Authentications for key Distributed Protocol using
Implicit and Explicit Quantum Cryptography

ABSTRACT

The combination of 3AQKDP (implicit) and 3AQKDPMA (explicit) quantum


cryptography is used to provide authenticated secure communication between sender and
receiver.

In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum


mechanisms to distribute session keys and public discussions to check for eavesdroppers and
verify the correctness of a session key. However, public discussions require additional
communication rounds between a sender and receiver. The advantage of quantum cryptography
easily resists replay and passive attacks.

A 3AQKDP with implicit user authentication, which ensures that confidentiality, is only
possible for legitimate users and mutual authentication is achieved only after secure
communication using the session key start.

An implicit quantum key distribution protocol (3AQKDP) have two phases such as setup
phase and distribution phase to provide three party authentications with secure session key
distribution. In this system there is no mutual understanding between sender and receiver. Both
sender and receiver should communicate over trusted center.

An explicit quantum key distribution protocol (3AQKDPMA) have two phases such as
setup phase and distribution phase to provide three party authentications with secure session key
distribution. It have mutual understanding between sender and receiver. Both sender and receiver
should communicate directly with authentication of trusted center.

Disadvantage of separate process 3AQKDP and 3AQKDPMA were providing the


authentication only for message, to identify the security threads in the message. Not identify the
security threads in the session key.

ii
SYSTEM ANALYSIS:

EXISTING SYSTEM

 In classical cryptography, three-party key distribution protocols utilize challengeresponse


mechanisms or time-stamps to prevent replay attacks.

 However, challengeresponse mechanisms require atleast two communication rounds


between the TC and participants, and the timestamp approach needs the assumption of
clock synchronization which is not practical in distributed systems (due to the
unpredictable nature of network delays and potential hostile attacks) .

 Furthermore, classical cryptography cannot detect the existence of passive attacks such as
eavesdropping. This fact can then be used to reduce the number of rounds of other
protocols based on challenge-response mechanisms to a trusted center (and not only
three-party authenticated key distribution protocols).

LIMITATIONS

Disadvantage of separate process 3AQKDP and 3AQKDPMA were provide the


authentication only for message, to identify the security threads in the message. Not
identify the security threads in the session key.

iii
PROPOSED SYSTEM

In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum


mechanisms to distribute session keys and public discussions to check for eavesdroppers and
verify the correctness of a session key. However, public discussions require additional
communication rounds between a sender and receiver and cost precious qubits. By contrast,
classical cryptography provides convenient techniques that enable efficient key verification and
user authentication.

PROBLEM FORMULATION

This work presents combination of classical cryptography (existing) and quantum


cryptography (proposed). Two three-party QKDPs, one with implicit user authentication and the
other with explicit mutual authentication used to make authentication using quantum mechanism.

In classical cryptography provides convenient techniques that enable efficient key


verification and user authentication but it is not identify eavesdropping. Here, the enhanced key
distribution protocol using classical and quantum cryptography will improve the security and
authentication

Software Requirement Specification


The software requirement specification is produced at the culmination of the analysis
task. The function and performance allocated to software as part of system engineering are
refined by establishing a complete information description as functional representation, a
representation of system behavior, an indication of performance requirements and design
constraints, appropriate validation criteria.

iv
User Interface
 Swing - Swing is a set of classes that provides more powerful and flexible components
that are possible with AWT. In addition to the familiar components, such as button
checkboxes and labels, swing supplies several exciting additions, including tabbed panes,
scroll panes, trees and tables.

 Applet - Applet is a dynamic and interactive program that can run inside a web page
displayed by a java capable browser such as hot java or Netscape.

REQUIREMENTS:

HARDWARE INTERFACE
 Hard disk : 40 GB
 RAM : 512 MB
 Processor Speed : 3.00GHz
 Processor : Pentium IV Processor

SOFTWARE INTERFACE
 JDK 1.5
 Java Swing
 MS-Access/SQL Server

You might also like