Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols report
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols


[attachment=39753]

INTRODUCTION

Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDP II) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e., the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice’s encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. Finally, the root cause of this insecurity and a possible way to improve these protocols are discussed.
Cryptography is the approach to protect data secrecy in public environment. As we know , the security of most classical cryptosystem is based on the assumption computational complexity. But it was shown that this kind of security might be susceptible to the strong ability of quantum computation[1],[2].that is many existing cryptosystem will become no longer secure once quantum computer appears. Fortunately, this difficulty can be overcome by quantum cryptography [3],[4]. Different from its classical counterpart, quantum cryptography is the combination of quantum mechanics and cryptography, where the security is assured by physical principles such as Heisenberg uncertainty principle and quantum no cloning theorem. Now quantum cryptography has attracted a great deal of attention because it can stand against the threat from an attacker with

SYSTEM ANALYSIS

EXISTING SYSTEM

We can attack secret key from Trusted Center. The eavesdropper Eve can elicit all or part of the secret key without being discovered by Alice and Bob. QKD protocol, it is generally supposed that the quantum channel can be attacked with any manner allowed by quantum mechanics. Denial-of-Service (DoS) attack and some more attack can be applied by Eve to Hack the Alice and Bob Datas. The situation is where the center is un-trusted

PROPOSED SYSTEM

We have the two three-party QKD protocols II. In this protocol the operations of qubit generation and measurement are focused in the center’s lab, and Alice and Bob only need to perform unitary operations on the qubits. This protocol has high efficiency

Background Study

Three-Party QKD Protocols has two three-party QKD protocol were proposed. One deals with an honest center and the other is with an
untrusted center. In the following description, for the sake of simplicity, we will call these two protocols QKDP-I and QKDP-II, respectively, and use the same notations as that in Now let us see QKDP-I first, where the technique of “blocktransmission,” proposed is utilized.

Selection of the organization

RIT (Regional Institute of Technology) is a Government
IT Service Company, offering a wide array of solutions customized for a range of key industry verticals and horizontals. It had developed competencies in developing and implementing web-based solutions, client server applications, ERP and Payroll management software and Point of Sale Solutions. Our need-driven deployment of domain and technology expertise brings to customers a range of solutions and products that enhance performance and competitiveness.
Since 1995 RIT has built a solid reputation as an enterprise dedicated to offering a complete and sound approach to systems development in the emerging Paradigm of the network world.

SYSTEM DESIGN

Problem Formulation

Microsoft SQL provides a package with it, which is used to create database, table and also execute other queries. The problem is that the server must be installed in each machine. The user cannot access his database remotely. Also the user must have full knowledge about SQL commands. So a web application is created in such a way that the web server itself contains the SQL server, so the database can be accessed from anywhere using the website.

Main Objective

Here we analyze the security of two three-party quantum key distribution protocols (QKDP II) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e., the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice’s encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed.

Feasibility Analysis

A feasibility study is a preliminary study undertaken to determine and document a project's viability .Results of this study are used to make a decision whether to proceed with the project, or not. If it indeed leads to a project being approved, it will-before the real work of problem and the recommendation on the best alternative.
Enterprise Project Planning is an online site for the registering complaints. This site also helps customers for getting information like solution for their complaints. The feasibility study was carried out to find whether the proposed system can be developed and implemented without any problem within the time limit. The following feasibility was considered for the project in order to ensure that the project is viable and it does not have any major obstructions. In this regard, the following feasibility analysis was conducted.

Conclusion

It can attack secret key from Trusted Center. For that purpose have the two three-party QKD protocols II. In this protocol the operations of qubit generation and measurement are focused in the center’s lab, and Alice and Bob only need to perform unitary operations on the qubits. This protocol has high efficiency.
In this paper we analyze the security of two three-party quantum key distribution protocols (QKDP II) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e., the dense-coding attack.