Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 2
Abstract
Cryptography is the science of information security. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. The combination of Implicit quantum key distribution protocol (3AQKDP) and explicit quantum key distribution protocol (3AQKDPMA) are used to form the new combination and demonstrate the following merits: Establishment of a secure connection which can prevent attacks such as eavesdropping, man-in-the-middle and replay. Reduction in communication rounds among existing QKDPs, improves efficiency of proposed protocols. A long term secret key can be used and shared between two parties repeatedly. Classical cryptography methods currently used are unsafe and cannot detect the existence of passive attacks such as eavesdropping. Hence the combination of both classical as well as quantum cryptography is proposed.
Authors and Affiliations
Dr. G. Ananda Rao , Y. Srinivas , J. Vijaya Sekhar , Ch. Pavan Kumar
OPTIMAL IMPLEMENTATION METHODS FOR AUDIO CROSSTALK CANCELLATION ON DSP PROCESSORS
In general, frequency domain based techniques are preferred to time domain techniques for the implementation of audio crosstalk cancellation due to time domain techniques suffer from more computations. In this paper, the...
Dividend key share for protected information transmit using Watermarking in images and Audio
The art and science of hiding information by encrypting messages within other, looks a harmless message. The proposed steganography system, where edges in the spread picture have been utilized to insert messages and anot...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT CLUSTERING SCHEMES FOR WSN
Clustering enables energy constrained wireless sensor networks to consume less battery power for routing the data packets. In order to achieve the key goal of prolonging the lifetime of sensor nodes besides avoiding unde...
A GENETIC ALGORITHM FOR FINITE STATE AUTOMATA
The genetic algorithm is described, including its three main steps: selection, crossover, and mutation. A comparison between implementation costs and running times of regular expressions matching a string is then made. T...
SPEECH RECOGNITION USING GENERIC SHORTEST DISTANCE ALGORITHM
The first major contribution of this paper may well be a dialog model support propositional content and intentions. Two distinct components of the model square measure mentioned in depth: (a) associate approach to the mo...