Quantum Key Distribution Based on Selective Post-Processing in Passive Optical Networks Abstract: In quantum cryptography, Quantum Key Distribution Protocols (QKDPs) employ quantum mechanisms to distribute session keys and public discussions to check for eavesdroppers and verify the correctness of a session key. Key Distribution Protocols are used to facilitate sharing secret session keys between users on communication networks.Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. A high-speed quantum key distribution (QKD) system has been developed with the goal of secure key generation under transmission loss.Quantum key distribution protocol which works on network security by the use of key agreement. Secrete Key which is used by each user in the network. Each user has unique Secrete and which will be shared by each user to Trusted Center. In Trusted Center we have generate a Key for network Security with the Help of Algorithms and Quantum Mechanics. Through that we have to prove how secure the data has been transmitted over network to receiver. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. The main advantage is that the integration is straightforward and does not require any modification, neither of the QKD systems nor of the network standard, including Encryption and decryption. Existing System: In classical Cryptography Challenge-Response Authentication Mechanism (CRAM) was used. In Challenge-Response Authentication Mechanism is the two-level (basic authentication and digest authentication) scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP). The "basic" authentication scheme is based on the model that the client must authenticate itself with a user-ID and a password for each real. Although the scheme is easily implemented, it relies on the assumption that the connection between the client and server computers is secure and can be trusted. Proposed System: This project presents Quantum Key Distribution Protocols (QKDP’s) to safeguard security in large networks. Key Distribution Protocols are used to facilitate sharing secret session keys between users on communication networks. In this project the sender and the receiver should register themselves into the separate databases maintained for them and then whenever each user either on the sender or the receiver side makes a login request, an individual secret key is created. The Trusted Center considered being the three party authenticates both the sender and the receiver, the secret key is generated by the Trusted Center. Registration phase after providing username and password, user must generate one unique key for identification. That is Secret key. This key will take part in our final key (Quantum Key). At this instance our system will store every detail such as username. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. To generate a secure key while satisfying both high speed and high security. Hardware Requirements: Processor : Pentium IV 2.4 GHz Hard Disk : 40 GB RAM : 256 MB Software Requirements: IDE : Programming Language : C#.net Database : Sql Server Operating System : Windows XP Microsoft VS.NET-2005