provably secure three-party authenticated quantum key distribution protocols
DESCRIPTION
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, using in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following:1) Security against such attacks as man-in-the-middle, eavesdropping and replay.2) Efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs.3) Two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.TRANSCRIPT
ByAvinash Varma. K (07C71A1209)
DEPARTMENT OF
INFORMATION TECHNOLOGY(ELLENKI COLLEGE OF ENGG & TECH)
AbstractAbstract• This work presents quantum key distribution This work presents quantum key distribution
protocols (protocols (QKDPsQKDPs) to ) to safeguard security safeguard security in large in large networks, ushering in new directions in classical networks, ushering in new directions in classical cryptography and quantum cryptography. cryptography and quantum cryptography.
• Two three-party QKDPs, one with Two three-party QKDPs, one with implicit user implicit user authentication authentication and the other with and the other with explicit mutual explicit mutual authenticationauthentication, are proposed to demonstrate the , are proposed to demonstrate the merits of the new combination.merits of the new combination.
Existing SystemExisting System
• In classical cryptography, three-party key In classical cryptography, three-party key distribution protocols utilize challenge distribution protocols utilize challenge response mechanisms or timestamps to response mechanisms or timestamps to prevent replay attacks. prevent replay attacks.
• Classical cryptography cannot detect the Classical cryptography cannot detect the existence of passive attacks such as existence of passive attacks such as eavesdropping.eavesdropping.
Limitations of Existing SystemLimitations of Existing System
• Identifies the security threads in the Identifies the security threads in the message, but not the security threads in message, but not the security threads in the session key.the session key.
Proposed SystemProposed System
• The primary goal of the system is to The primary goal of the system is to provide the security to the users, the provide the security to the users, the security is provided by using Quantum security is provided by using Quantum mechanisms.mechanisms.
Advantages of the Proposed SystemAdvantages of the Proposed System
Security against such attacks as man-in-the-Security against such attacks as man-in-the-middle, eavesdropping and replay,middle, eavesdropping and replay,
Efficiency is improved as the proposed Efficiency is improved as the proposed protocols contain the fewest number of protocols contain the fewest number of communication rounds among existing QKDPs, communication rounds among existing QKDPs, and and
Two parties can share and use a long-term Two parties can share and use a long-term secret (repeatedly). secret (repeatedly).
ModulesModules
• Sender ModuleSender Module• Receiver ModuleReceiver Module• Trust CenterTrust Center
UML DiagramsUML Diagrams
Use Case DiagramUse Case DiagramClass DiagramClass DiagramSequence DiagramSequence DiagramActivity DiagramActivity Diagram
Use Case(Trust Center)Use Case(Trust Center)
Trusted center
Secret key verification
Session key verification
Qubit generation
Quantum key generation
Hashing
Key distribution
Column Name Data Type Allow Nulls
Uid int
Uname varchar(50) ✔
Pwd varchar(50) ✔
Secret varchar(50) ✔
LoginDate varchar(50) ✔
LoginTime Varchar(50) ✔
Column Name Data Type Allow Nulls
Uid int
Uname varchar(50) ✔
Pwd varchar(50) ✔
Secret varchar(50) ✔
LoginDate varchar(50) ✔
LoginTime Varchar(50) ✔
Future EnhancementFuture Enhancement
At present, by using my project only .txt At present, by using my project only .txt format files can be transmitted, in future my format files can be transmitted, in future my project should be developed in such a way project should be developed in such a way that it can support different formats in order that it can support different formats in order to transfer files using QKDPs.to transfer files using QKDPs.