The process of Quantum Key Distribution Protocols and the importance of quantum cryptography are described clearly in the discussions done till now. It is evident from the studies that in many cases the distributed key gets affected and so even the distributed key should be applied with some security constraints in order to avoid that affect. In quantum cryptography these distributed keys are protected from the mishandling by using the help of a protocol and this separate protocol is called as Quantum key distribution protocol. Both 3AQKDP which is referred as implicit and 3AQKDPMA which is referred as explicit are included in this protocol.

In some cases there is some possibility for the third party to generate the distributed key, they will use that key and send that key to the other two parties who actually involved in the communication process. When the parties received that distributed key they will try to break that key, during this process the actual key of the two parties is revealed for the third party. A false key cannot be identified by the end users as there are no separate techniques for identifying the fake key exactly and so there will be a lot of problem for the parties involved in the communication parties.

The main problem they face is they can select the correct key of distribution and cannot decode it problem and as a result they cannot securely understand the message received. These problems can be solved by implementing a mechanism which is known as “Three party authentications for key distributed protocols. Implementation of this mechanism includes the explicit and implicit Quantum cryptography. Detecting the third party or eavesdroppers or identifying the difference between the fake session keys and exact session keys are the advantages of these protocols. Here the Quantum Key Distribution Protocols A Secure Chat Program Project is distributed most perfectly and in a secured approach. In this approach, a trusted and secure center verifies the generated session key whether it is sent by the parties involved in communication process or sent by a third party.

This trusted center identifies the issue that occurs during the communication process and the other common issues like verifying the key and message are handled at the sender side. The implementation of these mechanisms can identify the minor noises that occur across the transmission of data and can also filter them in this level itself.

 This Paper is written & submitted by Vamshidhar A.