You are on page 1of 10

ABSTRACT

This project presents Quantum Key Distribution Protocols (QKDP’s) to safeguard security in large networks, by using DES algorithm for encryption and decryption of .txt file. In this project the sender and the receiver should register themselves into the separate databases maintained for them and then whenever each user either on the sender or the receiver side makes a login request, an individual secret key is created. The Trusted Center considered being the three party authenticates both the sender and the receiver, the secret key is generated by the Trusted Center. The Trusted Center issues a quantum key to both the sender and the receiver after the verification of the secret key. The generation of the quantum key involves the selection of 8-bit random key using the appropriate function available in .Net. By using RSA algorithm session key is generated. The session key is converted into binary from which the last two binary digits are chosen through which the quantum key is created. Once the quantum key matches on both the sender and the receiver side, the data can be encrypted and the intermediate encrypted form is viewable. Similarly after decryption the encrypt_decrypt file is also available. Thus a secure transmission of data takes place between the sender and the receiver using Trusted Center.

However. By using these shared session keys. Designing secure key distribution protocols in communication security is a top priority. classical cryptography provides convenient techniques that enable efficient key verification and user authentication. secure communication is possible on insecure public networks. Key Distribution Protocols are used to facilitate sharing secret session keys between users on communication networks. for example. Quantum Key Distribution Protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key. However. various security problems exist in poorly designed key distribution protocols.INTRODUCTION In quantum cryptography. a malicious attacker may derive the session key from the key distribution process. public discussions require additional communication rounds between a sender and receiver and cost precious qubits. 5.1 MODULE DESCRIPTION QKDP includes three basic modules. A legitimate participant cannot ensure that the received session key is correct or fresh and a legitimate participant cannot confirm the identity of the other participant. By contrast. They are  Sender  Trusted Center  Receiver .

By Providing username and Password user sets their Authentication. These values are stored in the Database quantum key in which reg table. In this module we have to give username. password and Secret key which was generated by the system. he/she must log in by using his/her authentication credentials. he wants unique Identification. Login and 3. Password and Secret key system will identify the Authorized person. And System provides one more credentials that is Secrete key which is generated by the system for each user.Sender Overview Getting Authorization is the first stage in sending phase. This phase or Sender Module has Sub Modules. If the user does not provide proper information or the given information is mismatched with database then our system shows Exception message immediately. If a user wants to send a text to Destination user. By using username. By using that Identification System knows that the person is an authorized person. . They are as: 1. Registration 2. Receive Data Registration Registration is the Initial state for getting Authentication. Login A user wants to send a file means.

e. Registration Date and Registration Time. our Trusted Center program starts listen the client or sender. secrete key.If the user’s details are verified and matched with the existing database then our system allows the person to transmit the file. Through Login we send the sender’s secrete key for Identification. The secret key generation is in separate class which will return. Encryption will happen only if the system gets a key from Trusted Center (TC). At this instance our system will store every details such as username. Methodology used In Registration phase after providing username and password. After Registration for New User system redirects the user to Login Stage. This key will take part in our final key (Quantum Key). Trusted Center Module  Secret Key Verification . After login the TCP program calls i. So after verification of user identification system will send the current user’s name and his/her secrete key to Trusted Center (TC). At this stage the user must provide the relevant details which was noted or given through registration. password. user must generate one unique key for identification. That is Secrete key. Send Data The main aim of this module is to encrypt a file and send that encrypted file to receiver.

If the value is 0 and 1. If the value is 1 and 0. find the least bit of two binary values and get the quantum bit of 0 and 1. then p[0] 4. .  Session Key Generation It is shared secret key which is used to for encryption and decryption. such as 1. then p[1]  Key Distribution It distributes the original session key and qubit to the sender for encryption. it distributes the qubit and the session key on the receiver side for decryption.707(p[0]-p[1]) 3. The size of session key is 8 bits.Verify the secret key received from the user and authenticate the corresponding user for secure transmission. Also. If the value is 1 and 1. then 1/0.  Quantum Key Generation To generate the quantum key using the qubit and session key which depends on qubit combinations. then convert into hexcode and then convert it into binary.707(p[0]+p[1]) 2. then 1/0.  Qubit Generation To get secret key and random string. This session key is generated from pseudo random prime number and exponential value of random number. If the value is 0 and 0.

This phase or Receiver Module has Sub Modules. If the user does not provide proper information or the given information is mismatched with database then our system shows Exception message immediately. Login and 3.Receiver Overview Getting Authorization is the first stage in receive phase. he wants unique Identification. If a user wants to receive a text from source user. Receive Data Registration Registration is the Initial state for getting Authentication. These values are stored in the Database quantum key in which recreg table. In this module we have to give username. he/she must log in by using his/her authentication credentials. They are as: 1. password and Secret key which was generated by the system. And System provides one more credentials that is Secrete key which is generated by the system for each user. Password and Secrete key system will identify the Authorized person. Login A user wants to send a file means. Registration 2. By using that Identification System knows that the person is an authorized person. . By Providing username and Password user sets their Authentication. By using username.

After Registration for New User system redirects the user to Login Stage. ALGORITHMS USED . Receive Data The main aim of this module is to decrypt a file. That is Secret key. Methodology used In Registration phase after providing username and password. After login the TCP program calls i. our Trusted Center program starts listen the client or sender. password. Decryption will happen only if the system gets a key from Trusted Center (TC).e.If the user’s details are verified and matched with the existing database then our system allows the person to transmit the file. user must generate one unique key for identification. Through Login we send the sender’s secrete key for Identification. secret key. At this stage the user must provide the relevant details which was noted or given through registration. This key will take part in our final key (Quantum Key). So after verification of user identification system will send the current user’s name and his/her secret key to Trusted Center (TC). Registration Date and Registration Time. At this instance our system will store every details such as username.

e)=1.q where both p and q both prime. RSA ALGORITHM Key Generation 1. the algorithms are explained as.n} Private key KR={d . The basic operations are DES Encryption a) Initial permutation b) Details of a single round c) Sub-Key generation DES Decryption uses the same procedure as encryption. Calculate d where d= e^-1 mod Ø(n) 6. DES algorithm is used. p≠q 2. except that the application of the Sub-Keys is reversed. Select p . . Public key KU={e . For key Generation RSA algorithm is used. Calculate n=p*q 3.n} DES ALGORITHM DES stands for Data Encryption Standard. Calculate Ø(n)=(p-1)(q-1) 4.For Encryption & Decryption. 1<e<Ø(n) 5. Select integer e where gcd (Ø(n).

Module diagram Login Trusted Center User Random String generation Session Key Generation Quantum Key Generation Sender Receiver Secret Key Authentication Secrete Key Authenticatio n Decryption Get Quantum Key Encryption .

Fig shows that the various modules involved in the project are listed and the associated activities involved in the modules are mentioned. If any activity is common between any modules they are mentioned separately .