A Real-Time Design Based on FPGA for Expeditious Error Reconciliation in QKD System Abstract: In quantum cryptography, Quantum Key Distribution Protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key. Key Distribution Protocols are used to facilitate sharing secret session keys between users on communication networks. Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. A high-speed quantum key distribution (QKD) system has been developed with the goal of secure key generation under transmission loss. Quantum key distribution protocol which works on network security by the use of key agreement. Secrete Key which is used by each user in the network. Each user has unique Secrete and which will be shared by each user to Trusted Center. In Trusted Center we have generate a Key for network Security with the Help of Algorithms and Quantum Mechanics. Through that we have to prove how secure the data has been transmitted over network to receiver. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. Existing System: In classical Cryptography Challenge-Response Authentication Mechanism (CRAM) was used. In Challenge-Response Authentication Mechanism is the two-level (basic authentication and digest authentication) scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP). Basic Authentication Scheme The "basic" authentication scheme is based on the model that the client must authenticate itself with a user-ID and a password for each real. Disadvantages of Basic Scheme Web Browser or other client Program provides credentials in the form of username and Password. Although the scheme is easily implemented, it relies on the assumption that the connection between the client and server computers is secure and can be trusted. Digest Authentication Scheme Digest authentication is out of date unencrypted Basic access authentication, allowing user identity to be established securely without having to send a password in plaintext over the network. Digest authentication is basically an application of cryptographic hashing with usage of nonce values to prevent cryptanalysis. Proposed System: This project presents Quantum Key Distribution Protocols (QKDP’s) to safeguard security in large networks. Key Distribution Protocols are used to facilitate sharing secret session keys between users on communication networks. In this project the sender and the receiver should register themselves into the separate databases maintained for them and then whenever each user either on the sender or the receiver side makes a login request, an individual secret key is created. The Trusted Center considered being the three party authenticates both the sender and the receiver, the secret key is generated by the Trusted Center. Registration phase after providing username and password, user must generate one unique key for identification. That is Secret key. This key will take part in our final key (Quantum Key). At this instance our system will store every detail such as username. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. To generate a secure key while satisfying both high speed and high security. Hardware Requirements: Processor : Pentium IV 2.4 GHz Hard Disk : 40 GB RAM : 256 MB Software Requirements: IDE : Microsoft VS.NET-2005 Programming Language : C#.net Database : Sql Server Operating System : Windows XP