Three Party Authenticated Key Distribution using Quantum Cryptography
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 4
Abstract
Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. Over the last two decades an interesting field of the cryptography has raised from non classical atomic theory, Quantum Physics. This field is known as Quantum cryptography. Unlike the classical cryptography of public and private key ciphers which analyse the strength of a cipher by means of mathematical attacks and formulas, the security of the quantum cryptography is ensured by laws of Quantum Physics. In this paper, we present a method for three party authentication using quantum cryptography. Our method depends on partial trusted third party, so that the key is not revealed to the trusted third party.
Authors and Affiliations
V. Padmaja
Increase of Salt Fog Corrosion Resistance of Plasma Nitrided Steel by Pulsed Plasma Post-Oxidation
Abstract: Plasma nitriding has demonstrated to be a good alternative to increase surface hardness, wear and abrasion resistance of AISI 4340 steel. Unfortunately, corrosion resistance of the obtained nitrided laye...
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Radio Network
Scarcity of spectrum is the issue that wireless communication technology has to deal with. Primary user is the licensed user of the spectrum. When primary user is idle or not using the spectrum secondary user c...
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
To make addition operations more efficient parallel prefix addition is a better method. In this paper 64-bit parallel prefix addition has been implemented with the help of cells like black cell and grey cell oper...
Significancy Test For The Control Parameters Considered In Weld Bead Geometry Optimization For Gas Metal Arc Welding Process Using Taguchi Method And Anova Technique
Here in this work, an attempt has been made to find the interaction between control parameters and weld bead geometry for fillet welding in mild steel specimen using Gas Metal Arc Welding process. Accordingly c...
Making Trust Relationship For Peer To Peer System With Secure Protocol
In the peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to...