Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography

Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 2

Abstract

Cryptography is the science of information security. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. The combination of Implicit quantum key distribution protocol (3AQKDP) and explicit quantum key distribution protocol (3AQKDPMA) are used to form the new combination and demonstrate the following merits: Establishment of a secure connection which can prevent attacks such as eavesdropping, man-in-the-middle and replay. Reduction in communication rounds among existing QKDPs, improves efficiency of proposed protocols. A long term secret key can be used and shared between two parties repeatedly. Classical cryptography methods currently used are unsafe and cannot detect the existence of passive attacks such as eavesdropping. Hence the combination of both classical as well as quantum cryptography is proposed.

Authors and Affiliations

Dr. G. Ananda Rao , Y. Srinivas , J. Vijaya Sekhar , Ch. Pavan Kumar

Keywords

Related Articles

AN EFFECTIVE APPROACH TO REGRESSION TEST OPTIMIZATION TECHNIQUE

Unswerving product quality is the main goal of any software engineering product. It involves rigorous product development and testing. Whenever new features are introduced to any existing product, the stress on quality i...

Low Contrast Image Enhancement Using Adaptive Filter and DWT: A Literature Review 

Image enhancement refers to accentuation, or sharpening of image features such as edges, boundaries or contrast to make a graphic display more useful for display and analysis. One of the most common defects of photograph...

SOFT COMPUTING BASED ADAPTIVE CRUISE CONTROL

Research on adaptive cruise control (ACC) is presently one of the most important topics in the field of Intelligent Transportation Systems. The main feature of such controllers is that there is adaptation to a user-prese...

Estimation of Fundamental and Formant frequencies of infants’ cries; a study of Infants with congenital Heart disorder

A congenital heart disease (CHD) is a defect in the structure of the heart and great vessels of a newborn.CHD s are classified into Cyanotic and Acyanotic. The most common cyanotic heart disorder in infants is Tetralogy...

PERFORMANCE OF CONCURRENCY CONTROL MECHANISMS IN CENTRALISED DATABASE SYSTEMS

The objective of this study is to propose user control system that definitely increases the performance of realtime data service. However the most existing work on this RTDB was based on very critical closed loop control...

Download PDF file
  • EP ID EP155395
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Dr. G. Ananda Rao, Y. Srinivas, J. Vijaya Sekhar, Ch. Pavan Kumar (2011). Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography. Indian Journal of Computer Science and Engineering, 2(2), 143-145. https://europub.co.uk/articles/-A-155395