Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Secure Transmission Using Trusted Protocols

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

Secure Transmission Using Trusted Protocols

ABSTRACT

This work presents quantum key distribution protocols (QKDPs) to safeguard


security in large networks, ushering in new directions in classical cryptography and
quantum cryptography. Two three-party QKDPs, one with implicit user authentication
and the other with explicit mutual authentication, are proposed to demonstrate the merits
of the new combination, which include the following:
1) Security against such attacks as man-in-the-middle, eavesdropping and replay.
2) Efficiency is improved as the proposed protocols contain the fewest number of
communication rounds among existing QKDPs.
3) Two parties can share and use a long-term secret (repeatedly). To prove the
security of the proposed schemes, this work also presents a new primitive called the
Unbiased-Chosen Basis (UCB) assumption.
In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum
mechanisms to distribute session keys and public discussions to check for eavesdroppers
and verify the correctness of a session key. However, public discussions require
additional communication rounds between a sender and receiver and cost precious quits.
By contrast,
classical cryptography provides convenient techniques that enable efficient key
verification and user authentication.
SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

Processor : Pentium III / IV

Hard Disk : 40 GB

Ram : 256 MB

Monitor : 15VGA Color

Mouse : Ball / Optical

Keyboard : 102 Keys

SOFTWARE REQUIREMENTS

Operating System : Windows XP professional

Front End : Microsoft Visual Studio .Net 2005

Language : Visual C#.Net

Back End : SQL Server 2000

You might also like