Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

被引:6
|
作者
Sudharson, K. [1 ]
Arun, S. [2 ]
机构
[1] Anna Univ, Dept Informat & Commun Engn, Chennai 600025, Tamil Nadu, India
[2] Prathyusha Engn Coll, Dept ECE, Thiruvallur 602025, India
来源
关键词
Quantum computing; elliptic curves; mobile ad hoc networks; cryptography; wireless sensor networks; KEY DISTRIBUTION; AUTHENTICATION PROTOCOL;
D O I
10.32604/iasc.2022.026483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum Computing (QC). The content of node or sink nodes is pro-cessed using the fundamental principles of quantum mechanics. However, crypto-graphy techniques face several other issues, such as availability, integrity, andvulnerability, to name a few. The researchers have overcome many obstacles,yet security remains a crucial concern in QC. However, experimenters recentlydiscovered that the QC has a lot more data hacking than static networks. More-over, the bitwise error is still present in implementing the Quantum ComputingCryptography Protocol (QCCP). Because all nodes are mobile and dynamic topol-ogy occurs, the proposed research uses the Quantum Elliptical Curve Cryptogra-phy (QECC) protocol. To provide the appropriate key generation and key sharingmechanism to convert the fool node to a brawny node and avoid packet loss andenergy consumption in the network. By turning the fool node into a vital node, theQECC lowers the network's error rate. The experiment uses Network Simulator2 to achieve successful outcomes such as decreased packet loss, reduced error ratewith increased energy consumption, increased pair key generation for additionalnodes, and increased packet size.
引用
收藏
页码:1769 / 1784
页数:16
相关论文
共 50 条
  • [21] An authenticated group key transfer protocol using elliptic curve cryptography
    Priyanka Jaiswal
    Sachin Tripathi
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 857 - 864
  • [22] A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm
    Origines, Domingo V., Jr.
    Sison, Ariel M.
    Medina, Ruji P.
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND BIG DATA (ICCBD 2019), 2019, : 73 - 80
  • [23] Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve Cryptography
    Albalas, Firas
    Al-Soud, Majd
    Almomani, Omar
    Almomani, Ammar
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (3A) : 550 - 558
  • [24] Point choosing algorithm of elliptic curve cryptography
    [J]. Lu, Chen, 2000, Xi'an Jiaotong Univ, China (34):
  • [25] Research and Optimizing of the Algorithm of Elliptic Curve Cryptography
    Chen, Er-Yang
    Lei, Lin
    Luo, Jun-Yi
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 1219 - 1225
  • [26] An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
    Pandey, Jai Gopal
    Mitharwal, Chhavi
    Karmakar, Abhijit
    [J]. 2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 66 - 72
  • [27] Next generation security for wireless: elliptic curve cryptography
    Vanstone, SA
    [J]. COMPUTERS & SECURITY, 2003, 22 (05) : 412 - 415
  • [28] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [29] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    [J]. International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [30] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67