Key transfer protocols rely on a mutual trust key generation center (KGC) to select session keys and carry session keys to all secret communication entities. More often, KGC encrypts session keys under another shared secret key with each entity during registration. This article proposes an authenticated key transfer protocol based on a secret sharing scheme that KGC can transmit group key information to all members of the group at one time and only authorized group members can retrieve the key from group; but unauthorized users can not retrieve the group key. The confidentiality of this transformation is theoretically secure information.
The key establishment protocol must also provide security, confidentiality, authentication, and integrity for session keys to be sent to any system on the network. There are two types of key establishment protocols: one is the key transfer protocol and another is the key agreement protocol. The key transfer protocol relies on a mutually reliable key generation center (KGC) for selecting session keys and transporting session keys to all communication entities secretly. More often, KGC encrypts session keys under another shared secret key with each entity during registration. A secret sharing scheme is a method that distributes the parts of a secret to a group of participants in such a way that only specific groups of participants can reconstruct the secret through the poling they share. Therefore, this document proposes a security in terms of data encryption Standard (DES) and digital signature (DSA) to send files secretly between groups. Secret sharing schemes have natural applications in access control and in the initialization of cryptographic keys. Data is encrypted with DES using a secret key, encrypted data is sent to particular group entities and KGC is shared between sender and receiver. The data received is decrypted using the KGC, but unauthorized users can not retrieve the group key. To provide a flexible, ondemand and dynamically scalable computing infrastructure for many applications, the best solution is cloud computing. In case access to the private cloud environment is limited to a group of users or an organization. Although there are many aspects in the cloud environment.