Implementation of Authenticated Hybrid QKD Protocols for 802.11 LANs
R. Lalu naik1, Seelam Sai Satyanaryana Reddy2, Shrawan Kumarl3
1Dr.R. Lalu Naik*, professor,Dept. of IT, Vardhaman College of Engineering, Shamshabad.
2Dr. Seelam Sai Satyanaryana Reddy, professor, Dept. of CSE, Vardhaman College of Engineering, Shamshabad.
3Mr.Shrawan Kumar, Assistant professor, Dept. of CSE, Vardhaman College of Engineering, Shamshabad.
Manuscript received on January 13, 2020. | Revised Manuscript received on January 22, 2020. | Manuscript published on February 10, 2020. | PP: 2663-2669 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1762029420/2020©BEIESP | DOI: 10.35940/ijitee.D1762.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Quantum cryptography (QC) is used to give approved secure correspondence between the sender and beneficiary. In QC, Authentication Hybrid Quantum Key Distribution Protocols (AHQKDPs) use quantum segments to isolate session keys and open talks to check for covert operatives and affirm the rightness of a session key. In any case, open talks require additional correspondence adjusts between sender beneficiaries. The benefit of QC adequately is against replay and inert assaults. An AQKDP with certain customer approval, which ensures that protection, is achievable for valid down customers and the mutual check is practiced carefully when secure correspondence using the session key starts. AQKDP have two phases, for instance, set up the stage and the appropriation stage to give 3, parties QKDP. In this system, there is no basic perception between the sender and beneficiary. Both sender and beneficiary must focus on confided in core interest. In this express, check blend AHQKDP has two phases, for instance, set up the stage and the dispersion stage to give three gatherings affirmations, and secure session key appointment. In this structure, there is basic perception between the sender and beneficiary. Both sender and beneficiary must compare direct with approval of confided in core interest.
Keywords: Quantum Cryptography, Wireless Networks, Authentication, Protocols.
Scope of the Article: Cryptography and Applied Mathematics