provably secure three-party authenticated quantum key distribution protocols

30
By Avinash Varma. K (07C71A1209) DEPARTMENT OF INFORMATION TECHNOLOGY (ELLENKI COLLEGE OF ENGG & TECH)

Upload: avinash-varma

Post on 26-Nov-2014

133 views

Category:

Documents


6 download

DESCRIPTION

This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, using in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following:1) Security against such attacks as man-in-the-middle, eavesdropping and replay.2) Efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs.3) Two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.

TRANSCRIPT

ByAvinash Varma. K (07C71A1209)

DEPARTMENT OF

INFORMATION TECHNOLOGY(ELLENKI COLLEGE OF ENGG & TECH)

AbstractAbstract• This work presents quantum key distribution This work presents quantum key distribution

protocols (protocols (QKDPsQKDPs) to ) to safeguard security safeguard security in large in large networks, ushering in new directions in classical networks, ushering in new directions in classical cryptography and quantum cryptography. cryptography and quantum cryptography.

• Two three-party QKDPs, one with Two three-party QKDPs, one with implicit user implicit user authentication authentication and the other with and the other with explicit mutual explicit mutual authenticationauthentication, are proposed to demonstrate the , are proposed to demonstrate the merits of the new combination.merits of the new combination.

Existing SystemExisting System

• In classical cryptography, three-party key In classical cryptography, three-party key distribution protocols utilize challenge distribution protocols utilize challenge response mechanisms or timestamps to response mechanisms or timestamps to prevent replay attacks. prevent replay attacks.

• Classical cryptography cannot detect the Classical cryptography cannot detect the existence of passive attacks such as existence of passive attacks such as eavesdropping.eavesdropping.

Limitations of Existing SystemLimitations of Existing System

• Identifies the security threads in the Identifies the security threads in the message, but not the security threads in message, but not the security threads in the session key.the session key.

Proposed SystemProposed System

• The primary goal of the system is to The primary goal of the system is to provide the security to the users, the provide the security to the users, the security is provided by using Quantum security is provided by using Quantum mechanisms.mechanisms.

Advantages of the Proposed SystemAdvantages of the Proposed System

Security against such attacks as man-in-the-Security against such attacks as man-in-the-middle, eavesdropping and replay,middle, eavesdropping and replay,

Efficiency is improved as the proposed Efficiency is improved as the proposed protocols contain the fewest number of protocols contain the fewest number of communication rounds among existing QKDPs, communication rounds among existing QKDPs, and and

Two parties can share and use a long-term Two parties can share and use a long-term secret (repeatedly). secret (repeatedly).

ModulesModules

• Sender ModuleSender Module• Receiver ModuleReceiver Module• Trust CenterTrust Center

UML DiagramsUML Diagrams

Use Case DiagramUse Case DiagramClass DiagramClass DiagramSequence DiagramSequence DiagramActivity DiagramActivity Diagram

Use Case(Trust Center)Use Case(Trust Center)

Trusted center

Secret key verification

Session key verification

Qubit generation

Quantum key generation

Hashing

Key distribution

Class DiagramClass Diagram

Activity Diagram(Receiver)Activity Diagram(Receiver)

Column Name Data Type Allow Nulls

Uid int

Uname varchar(50) ✔

Pwd varchar(50) ✔

Secret varchar(50) ✔

LoginDate varchar(50) ✔

LoginTime Varchar(50) ✔

Column Name Data Type Allow Nulls

Uid int

Uname varchar(50) ✔

Pwd varchar(50) ✔

Secret varchar(50) ✔

LoginDate varchar(50) ✔

LoginTime Varchar(50) ✔

After EncryptionAfter Encryption

Before EncryptionBefore Encryption

After DecryptionAfter Decryption

Before DecryptionBefore Decryption

Future EnhancementFuture Enhancement

At present, by using my project only .txt At present, by using my project only .txt format files can be transmitted, in future my format files can be transmitted, in future my project should be developed in such a way project should be developed in such a way that it can support different formats in order that it can support different formats in order to transfer files using QKDPs.to transfer files using QKDPs.

Reference Reference

http://www.w3schools.comhttp://ieeexplore.ieee.orghttp://www.idquantique.com

THANK YOU...!