ANU by kishorkna

VIEWS: 10 PAGES: 7

									 SECURITY IN LARGE NETWORKS USING
       MEDIATOR PROTOCOLS
  A Dissertation submitted to the Acharya Nagarjuna University
            in partial fulfillments of the requirements
                  for the award of the degree of


         MASTER OF TECHNOLOGY
                   in
     COMPUTER SCIENCE & ENGINEERING


                        Submitted By

                   K. ANURADHA SRI
                         Y8MTCS903

               Under the Esteemed Guidance of

                    Sri. I. Ramesh Babu
                           Professor




DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
       ACHARYA NAGARJUNA UNIVERSITY
                   NAGARJUNA NAGAR
                    GUNTUR – 522510

                         JULY - 2010
               ACHARYA NAGARJUNA UNIVERSITY
     DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING




                                    CERTIFICATE

This is to certify that the dissertation entitled “Security in large networks using

Mediator Protocols” is the bonafide work of Ms. K. ANURADHA SRI bearing with

Regd. No.Y8MTCS903, who carried out the work under my supervision, and

submitted in partial fulfillment of the requirements for the award of Master of

Technology in Computer Science & Engineering, during the academic year 2009-

2010.




   Sri. P.S.R.Murthy                                  Prof. I. RAMESH BABU
      Guide, Assoc.Professor                              Head of the Department
Dept. of Computer Science & Engg.                  Dept. of Computer Science & Engg.
 Acharya Nagarjuna University                       Acharya Nagarjuna University
   Nagarjuna Nagar-522 510                             Nagarjuna Nagar-522 510
                                 DECLARATION

              This is to certify that the thesis entitled “Security in large networks using

Mediator Protocols” submitted to Acharya Nagarjuna University in partial fulfillment

of the requirement for the award of the degree Master of Technology, is an original

work carried out by Ms. K. Anuradha Sri bearing the Regd. No. Y8MTCS903.

       The matter embodied in this project is a genuine work, done by us and has not
been submitted whether to this University or to any other University/Institute for the
fulfillment of the requirement of any course of study.




                                                                 K. Anuradha Sri.
ACKNOWLEDGEMENT

       From the idea to art, from the conception to the reality, from emotion to the
response, from the desire to the spasm, I led by those, about whom to write all words
seem meek.
       I would like to express my sincere gratitude to Prof. I. Ramesh Babu, Head of
the Department of Computer Science and Engineering for his encouragement and for
providing the facility to model the system.
       I take this opportunity to express my heartfelt gratitude to my beloved senior
faculty Dr. R. Satya Prasad. I feel extremely grateful for his guidance.
       I am very much thankful to Sri. R. Satya Prasad, Asst. Professor, Dept. of
Computer Science and Engineering, and Guide for the project work, for the
encouragement and constant support to carry out this work successfully.
       I thank all my teachers Sri. P. S. R. Murty, Sri. O. Nagaraju, Mrs. P. Indira
Priyadarshini for their suggestions and the moral support for successful completion
of my project. I thank Mr. Md. Razack, and Smt. Venkataratnam for their valuable
services in the department. I also thank the authorities of our college for providing
necessary facilities.
       It is practically impossible to individually acknowledge many of my friends
and well wishers for their help and affection shown over the years. Finally I would
like to extend my heartful thanks to my beloved parents whose blessings and
encouragement were always there as source of strength and inspiration.



                                                                     K.Anuradha Sri,
                                                                       Y8MTCS903.
                              ABSTRACT

The combination of 3AQKDP (implicit) and 3AQKDPMA (explicit) quantum
cryptography is used to provide authenticated secure communication between
sender and receiver.
       In quantum cryptography, quantum key distribution protocols (QKDPs)
employ quantum mechanisms to distribute session keys and public discussions
to check for eavesdroppers and verify the correctness of a session key.
However, public discussions require additional communication rounds between
a sender and receiver. The advantage of quantum cryptography easily resists
replay and passive attacks.
       A 3AQKDP with implicit user authentication, which ensures that
confidentiality is only possible for legitimate users and mutual authentication is
achieved only after secure communication using the session key start.
       In implicit quantum key distribution protocol(3AQKDP) have two
phases such as setup phase and distribution phase to provide three party
authentication with secure session key distribution. In this system there is no
mutual understanding between sender and receiver. Both sender and receiver
should communicate over trusted center.
       In explicit quantum key distribution protocol (3AQKDPMA) have two
phases such as setup phase and distribution phase to provide three party
authentications with secure session key distribution.           I have mutual
understanding between sender and receiver. Both sender and receiver should
communicate directly with authentication of trusted center.
       Disadvantage of separate process 3AQKDP and 3AQKDPMA were
provide the authentication only for message, to identify the security threads in
the message. Not identify the security threads in the session key.
CHAPTER NO.    TITLE                                PAGE NO.


 1.           Intruduction
              1.1 About the Project
              1.2 Benefits of Three Party Authentications for key Distributed
                 Protocol using Implicit and Explicit Quantum Cryptography
 2.           System Analysis
              2.1 Existing System
              2.2 Limitations of Existing System
              2.3 Proposed System
              2.4 Advantages of Proposed System
 3.           Problem Formulation
              3.1 Objectives
              3.2 Software Requirement Specifications
              3.3 Software Description
 4.           System Design
              4.1 Design Overview
 5.           System Design/Implementation
              5.1 UML Diagram
              5.2 Use case Diagram
              5.3 Sequence Diagram
              5.4 Class Diagram
6.            System Testing
              6.1 Unit Testing
              6.2 Integration Testing
              6.3 Acceptance Testing
7.            Implementation
8.            Conclusion

								
To top