Secured Communication Protocol via Encrypted Key Ensuring Message Integrity

نویسنده

  • DEVARAKONDA JOHN LIVINGSTONE
چکیده

The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cryptography, quantum key distribution protocols employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key. However, public discussions require additional communication rounds between a sender and receiver. The advantage of quantum cryptography easily resists replay and passive attacks. A Third Party Authentication Quantum Key Distribute with implicit user authentication, which ensures that confidentiality, is only possible for legitimate users and mutual authentication is achieved only after secure communication using the session key start. In implicit quantum key distribution protocol Third Party Authentication Quantum Key Distribute have two phases such as setup phase and distribution phase to provide three party authentications with secure session key distribution. In this system there is no mutual understanding between sender and receiver. Both sender and receiver should communicate over trusted center. In explicit quantum key distribution protocol Third Party Authentication Quantum Key Distribute Mutual Authentication have phases such as setup phase and distribution phase to provide three party authentications with secure session key distribution. I have mutual understanding between sender and receiver. Both sender and receiver should communicate directly authentication of trusted center. Disadvantage of separate process 3AQKDP and 3AQKDPMA were providing the authentication only for message, to identify the security threads in the message. Not identify the security threads in the session key.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Wireless Network Security Protocols

Today, the majority of wireless networks hold some form of sensitive data that only authorized users are meant to access. As a result, communication networks must enforce some type of security protocols that will limit the users who have access to the network resources. To ensure that a network is secure, the network must be able to enforce two key concepts: data privacy and data integrity. Dat...

متن کامل

Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet

A Mobile Ad-Hoc Network(MANET) is a structure-less network where the mobile nodes randomly moved in any direction within the transmission range of the network. Due to this mobility, wide range of intrusion occurs in MANET. Therefore, Intrusion Detection Systems (IDS) are significant in MANETs to identify the malicious behavior. In order to improve the secured data communication an efficient Qua...

متن کامل

IDUP and SPKM: Developing Public-Key-Based APIs and Mechanisms for Communication Security Services

In this paper we discuss progress in the development of Application Program Interfaces (APIs) and mechanisms which provide a comprehensive set of security services to application developers. The APIs, though similar, are designed for distinct environments: the session API (“GSS”) is aimed at the on-line real-time messaging environment; the store-and-forward API (“IDUP”) is particularly suited t...

متن کامل

Economically Improving Message-Unilaterally-Transmitted Quantum Secure Direct Communication to Realize Two-Way Communication

We present a subtle idea to economically improve message-unilaterally-transmitted quantum secure direct communication (QSDC) protocols to realize two-way secure direct communication. Suppose Alice and Bob securely share a secret key. When the message sender, say, Alice, wants to send her secret messages to Bob, she can first use the secret key to encrypt her secret messages, then she publicly s...

متن کامل

Data Encryption and Decryption Using RSA Algorithm in a Network Environment

One of the principal challenges of resource sharing on data communication network is its security. This is premised on the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. This paper presents a design of data encryption and decryption in a network environment using RSA algorithm with a specific message block size. The al...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012