Assignment help




On the other hand, challenge response mechanisms need minimum two communication rounds. These two communication rounds involve among the trusted centre and the two users. And also there is a timestamp approach in challenge response mechanism which desires the hypothesis of clock synchronization. This clock synchronization is not helpful in the distributed systems. Because of possible attacks and also changeable nature of network delays this clock synchronization is not helpful. In addition the existence of inactive attacks cannot be noticed in classical cryptography. These attacks are eavesdropping etc. Similarly, the quantum channel which is used to get rid of the eavesdropping attack so the attacks rerun. To the TC (Trusted centre) , to the decrease the total rounds of different protocols this fact is used. This is based on the challenge response mechanisms. And in this we do not use only three party verified key sharing protocols. QKDPs (Quantum Key Distribution Protocols) determine quantum mechanisms to allocate session keys and prove the rightness of the session key and public negotiations to ensure for the eavesdroppers. In between the sender and receiver the public discussions need more communication rounds. In distinguish to this; the classical cryptography gives the well-suited techniques. These suitable techniques that allows capable key verification and user authentication. In the earlier projected QKDPs, they are the security proof, hypothetical design and material functioning.


电子邮件地址不会被公开。 必填项已用*标注