Saturday, November 9, 2013

Database Security

INDEX Page no 1. Introduction 2. LITERATURE look into 3. system of rules ANALYSIS 4. scheme DESIGN 5. IMPLEMENTATION 6. SYSTEM TESTING 7.CONCLUSION 8. BIBLIOGRAPHY CHAPTER - I 1. INTRODUCTION 1.1About the Project Existing body In classical cryptography, three-party cardinal diffusion protocols habituate challengeresponse mechanisms or timestamps to prevent replay attacks.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
However, challengeresponse mechanisms require at least two communication rounds between the TC and participants, and the timestamp go on needs the assumption of clock synchronization which is not practicable in coverd systems (due to the unpredictable nature of network delays and potential contrasted attacks) . Furthermore, classical cryptography cannot detect the existence of passive attacks such(prenominal) as eavesdropping. This fact can then be apply to disgrace the number of rounds of other protocols based on challenge-response mechanisms to a bank center (and not only three-party documented key dissemination protocols). Limitations of Existing System Disadv! antage of separate take care on 3AQKDP and 3AQKDPMA were provide the authentication only for message, to identify the protective covering travel in the message. Not identify the security meander in the session key. Proposed System In quantum cryptography, quantum key distribution protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and see to it the correctness of a session key. However, public discussions require additive communication...If you want to describe a full essay, order it on our website: OrderEssay.net

If you want to get a full information about our service, visit our page: write my essay

No comments:

Post a Comment