INDEX Page no 1. Introduction 2. LITERATURE see 3. system of rules ANALYSIS 4. ashes DESIGN 5. IMPLEMENTATION 6. SYSTEM TESTING 7.CONCLUSION 8. BIBLIOGRAPHY CHAPTER - I 1. INTRODUCTION 1.1About the Project Existing placement In classical cryptography, three-party discover diffusion protocols hire challengeresponse mechanisms or timest amps to prevent replay attacks. However, challengeresponse mechanisms require at least(prenominal) two communication rounds between the TC and participants, and the timestamp go on needs the assumption of clock synchronization which is not utilitarian in coverd systems (due to the unpredictable nature of network delays and potential malapropos attacks) . Furthermore, classical cryptography cannot detect the existence of passive attacks such(prenominal) as eavesdropping. This fact can then be apply to scale down the number of rounds of other protocols based on challenge-response mechanisms to a bank center (and not only three-party documented key diffusion protocols). Limitations of Existing System Disadvantage of separate gestate on 3AQKDP and 3AQKDPMA were provide the authentication only for message, to identify the security measures travel in the message. Not identify the security togs in the session key. Proposed System In quantum cry ptography, quantum key distribution protocol! s (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and support the correctness of a session key. However, public discussions require extra communication...If you want to describe a full essay, order it on our website: OrderEssay.net
If you want to get a full information about our service, visit our page: write my essay
No comments:
Post a Comment