Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

被引:7
作者
Sudharson, K. [1 ]
Arun, S. [2 ]
机构
[1] Anna Univ, Dept Informat & Commun Engn, Chennai 600025, Tamil Nadu, India
[2] Prathyusha Engn Coll, Dept ECE, Thiruvallur 602025, India
关键词
Quantum computing; elliptic curves; mobile ad hoc networks; cryptography; wireless sensor networks; KEY DISTRIBUTION; AUTHENTICATION PROTOCOL;
D O I
10.32604/iasc.2022.026483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum Computing (QC). The content of node or sink nodes is pro-cessed using the fundamental principles of quantum mechanics. However, crypto-graphy techniques face several other issues, such as availability, integrity, andvulnerability, to name a few. The researchers have overcome many obstacles,yet security remains a crucial concern in QC. However, experimenters recentlydiscovered that the QC has a lot more data hacking than static networks. More-over, the bitwise error is still present in implementing the Quantum ComputingCryptography Protocol (QCCP). Because all nodes are mobile and dynamic topol-ogy occurs, the proposed research uses the Quantum Elliptical Curve Cryptogra-phy (QECC) protocol. To provide the appropriate key generation and key sharingmechanism to convert the fool node to a brawny node and avoid packet loss andenergy consumption in the network. By turning the fool node into a vital node, theQECC lowers the network's error rate. The experiment uses Network Simulator2 to achieve successful outcomes such as decreased packet loss, reduced error ratewith increased energy consumption, increased pair key generation for additionalnodes, and increased packet size.
引用
收藏
页码:1769 / 1784
页数:16
相关论文
共 50 条
[31]   An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach [J].
Sen, Nilanjan .
APPLIED ALGORITHMS, 2014, 8321 :110-121
[32]   A Novel Elliptic Curve Cryptography Scheme Using Random Sequence [J].
Akhter, Faterna .
2015 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION ENGINEERING (ICCIE), 2015, :46-49
[33]   Issues in Elliptic Curve Cryptography Implementation [J].
Paryasto, Marisa W. ;
Kuspriyanto ;
Sutikno, Sarwono ;
Sasongko, Arif .
INTERNETWORKING INDONESIA, 2009, 1 (01) :29-33
[34]   An Efficient Method for text Encryption using Elliptic Curve Cryptography [J].
Das, Prasenjit ;
Giri, Chandan .
PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, :96-101
[35]   Elliptic Curve Lightweight Cryptography: A Survey [J].
Andres Lara-Nino, Carlos ;
Diaz-Perez, Arturo ;
Morales-Sandoval, Miguel .
IEEE ACCESS, 2018, 6 :72514-72550
[36]   Elliptic Curve Cryptography: A Dynamic Paradigm [J].
Som, Subhranil ;
Majumder, Rana ;
Dutta, Sandip .
2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, :427-431
[37]   COMPARATIVE ANALYSIS OF ELLIPTIC CURVE AND LATTICE BASED CRYPTOGRAPHY [J].
Davenport, Amanda ;
Shetty, Sachin .
PROCEEDINGS OF THE 2021 ANNUAL MODELING AND SIMULATION CONFERENCE (ANNSIM'21), 2020,
[38]   Elliptic curve cryptography on smart cards [J].
de-Miguel-de-Santos, M ;
Sanchez-Avila, C ;
Sanchez-Reillo, R .
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, :162-167
[39]   A Critical Review on Elliptic Curve Cryptography [J].
Singh, Soram Ranbir ;
Khan, Ajoy Kumar ;
Singh, Takhellambam Sonamani .
2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, :13-18
[40]   Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications [J].
Azarderakhsh, Reza ;
Jarvinen, Kimmo U. ;
Mozaffari-Kermani, Mehran .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2014, 61 (04) :1144-1155