Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

被引:7
作者
Sudharson, K. [1 ]
Arun, S. [2 ]
机构
[1] Anna Univ, Dept Informat & Commun Engn, Chennai 600025, Tamil Nadu, India
[2] Prathyusha Engn Coll, Dept ECE, Thiruvallur 602025, India
关键词
Quantum computing; elliptic curves; mobile ad hoc networks; cryptography; wireless sensor networks; KEY DISTRIBUTION; AUTHENTICATION PROTOCOL;
D O I
10.32604/iasc.2022.026483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum Computing (QC). The content of node or sink nodes is pro-cessed using the fundamental principles of quantum mechanics. However, crypto-graphy techniques face several other issues, such as availability, integrity, andvulnerability, to name a few. The researchers have overcome many obstacles,yet security remains a crucial concern in QC. However, experimenters recentlydiscovered that the QC has a lot more data hacking than static networks. More-over, the bitwise error is still present in implementing the Quantum ComputingCryptography Protocol (QCCP). Because all nodes are mobile and dynamic topol-ogy occurs, the proposed research uses the Quantum Elliptical Curve Cryptogra-phy (QECC) protocol. To provide the appropriate key generation and key sharingmechanism to convert the fool node to a brawny node and avoid packet loss andenergy consumption in the network. By turning the fool node into a vital node, theQECC lowers the network's error rate. The experiment uses Network Simulator2 to achieve successful outcomes such as decreased packet loss, reduced error ratewith increased energy consumption, increased pair key generation for additionalnodes, and increased packet size.
引用
收藏
页码:1769 / 1784
页数:16
相关论文
共 50 条
[41]   Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System [J].
Akhter, Fatema .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) :639-644
[42]   AN EFFICIENT ELLIPTIC CURVE CRYPTOGRAPHY PROCESSOR USING ADDITION CHAINS WITH HIGH INFORMATION ENTROPY [J].
Leinweber, Lawrence ;
Papachristou, Christos ;
Wolff, Francis G. .
2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2012,
[43]   Quantum Cryptography for Future Networks Security: A Systematic Review [J].
Durr-E-Shahwar ;
Imran, Muhammad ;
Altamimi, Ahmed B. ;
Khan, Wilayat ;
Hussain, Shariq ;
Alsaffar, Mohammad .
IEEE ACCESS, 2024, 12 :180048-180078
[44]   Computational Refinements for Post-Quantum Elliptic Curve Security [J].
Sakk, Eric .
2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, :32-35
[45]   Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm [J].
Chalkias, Konstantinos ;
Filiadis, George ;
Stephanides, George .
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 7, 2005, 7 :137-142
[46]   Security in quantum cryptography [J].
Portmann, Christopher ;
Renner, Renato .
REVIEWS OF MODERN PHYSICS, 2022, 94 (02)
[47]   A New Security Protocol Using Hybrid Cryptography Algorithms [J].
Alkady, Yasmin ;
Habib, Mohmed I. ;
Rizk, Rawya Y. .
2013 9TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO 2013): TODAY INFORMATION SOCIETY WHAT'S NEXT?, 2014, :109-115
[48]   NanoECC: Testing the limits of elliptic curve cryptography in sensor networks [J].
Szczechowiak, Piotr ;
Oliveira, Leonardo B. ;
Scott, Michael ;
Collier, Martin ;
Dahab, Ricardo .
WIRELESS SENSOR NETWORKS, 2008, 4913 :305-+
[49]   Securing Resource Constraints Embedded Devices Using Elliptic Curve Cryptography [J].
Tam, Tony ;
Alfasi, Mohamed ;
Mozumdar, Mohammad .
SENSORS AND SYSTEMS FOR SPACE APPLICATIONS VII, 2014, 9085
[50]   Elliptic Curve Cryptography on Constrained Microcontrollers Using Frequency Domain Arithmetic [J].
Gulen, Utku ;
Baktir, Selcuk .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, PART VI - ICCSA 2014, 2014, 8584 :493-506