MSc Computer Networking A Secure Chat Program project

Example for Quantum distribution protocol:

Assume that a communication process is taken place between A and B. during this process of communication there is a chance for third party involvement in eavesdropping, the two parties A and B can detect the third party involvement by only one way that is called one-time pad. For this purpose bits in random sequence are used to construct an individual private key and this specific key is known to the two parties involved in the communication process. In this MSc Computer Networking communication process if A wants to send a message to B, then A will convert the message into string of bits and between these bits XOR operation is performed across the string of the bits and then transmits the result to B. if the message bit sent by A is m and the key bit is assumed as k then the message is sent in m+k format. The key bit is known to B so that he can decode the received message by using the XOR operation. 

Table of contents:


1.1         Example for Quantum distribution protocol

1.2         Problem Definition

1.3         Aim of MSc Computer Networking Project

1.4         Research Questions and Objectives of A Secure Chat Program project

Literature Review:

2.1         Quantum computing

2.1.1    Advantages of Quantum Computing

2.1.2    Disadvantages of Quantum Computing

 2.2         Quantum key distribution protocol

2.2.1    Advantages of QKDP

2.2.2    Disadvantages of QKDP 

2.3         QKD Introduction

Analysis of the system and Design:

3.1         The Existing System

3.2         Proposed System

3.3         A Secure Chat Program project Design

3.4         Cryptography

3.5         Authentication


4.1         Database coding

4.2         Decryption

4.3         DES Algorithm

4.4         Encryption

4.5         Decision of Destination

4.6         Other important classes

4.7         Important Database tables used

5.1 Introduction

5.2 Configuring the database

5.3 Trusted center

5.4 User login

5.5 Secret key generation

5.6 Choosing the destination

5.7 Receiver side results

5.8 Summary 

Conclusion Chapter 7:

Future recommendations 



List of figures:

Figure 1: DFD level 1

Figure 2: DFD level 0

Figure 3: Use case view of the application

Figure 4: class diagram of the application

Figure 5: Flow diagram of the application 

List of abbreviations:

QKDP: Quantum key distribution protocol

QKD: Quantum key distribution

QKA: Quantum key Agreement

TC: Trust center

DES: data encryption standard

ECC: Elliptic Curve Cryptograph

This Paper is written & submitted by Vamshidhar A.

Leave a Reply

Your email address will not be published. Required fields are marked *