Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

被引:6
|
作者
Sudharson, K. [1 ]
Arun, S. [2 ]
机构
[1] Anna Univ, Dept Informat & Commun Engn, Chennai 600025, Tamil Nadu, India
[2] Prathyusha Engn Coll, Dept ECE, Thiruvallur 602025, India
来源
关键词
Quantum computing; elliptic curves; mobile ad hoc networks; cryptography; wireless sensor networks; KEY DISTRIBUTION; AUTHENTICATION PROTOCOL;
D O I
10.32604/iasc.2022.026483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum Computing (QC). The content of node or sink nodes is pro-cessed using the fundamental principles of quantum mechanics. However, crypto-graphy techniques face several other issues, such as availability, integrity, andvulnerability, to name a few. The researchers have overcome many obstacles,yet security remains a crucial concern in QC. However, experimenters recentlydiscovered that the QC has a lot more data hacking than static networks. More-over, the bitwise error is still present in implementing the Quantum ComputingCryptography Protocol (QCCP). Because all nodes are mobile and dynamic topol-ogy occurs, the proposed research uses the Quantum Elliptical Curve Cryptogra-phy (QECC) protocol. To provide the appropriate key generation and key sharingmechanism to convert the fool node to a brawny node and avoid packet loss andenergy consumption in the network. By turning the fool node into a vital node, theQECC lowers the network's error rate. The experiment uses Network Simulator2 to achieve successful outcomes such as decreased packet loss, reduced error ratewith increased energy consumption, increased pair key generation for additionalnodes, and increased packet size.
引用
收藏
页码:1769 / 1784
页数:16
相关论文
共 50 条
  • [31] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [32] An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security
    Azim, MA
    Jamalipour, A
    2005 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2005, : 376 - 380
  • [33] A Systematic Way to Provide Security for Digital Signature Using Elliptic Curve Cryptography
    Randhawa, Navneet
    Singh, Lolita
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (07): : 154 - 158
  • [34] Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm
    Shanthakumari, R.
    Malliga, S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (5-6) : 3975 - 3991
  • [35] DES Security Reinforcement Using Chaotic Logistic Map and Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwah
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 54 - 57
  • [36] Enhanced Performance and Data Security using Elliptic Curve Cryptography in Cloud Environment
    Acharya, Shreenath
    Manoj, K.
    Gayana, M. N.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 869 - 873
  • [37] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [38] A security protocol for D2D communications in 5G networks using elliptic curve cryptography
    R. Kishore
    I. Ioannou
    C. Christophorou
    N. Prabagarane
    V. Vassiliou
    S. Vignesh
    H. Vinayak
    S. Venkatesh
    A. Pitsillides
    International Journal of Information Security, 2022, 21 : 1389 - 1408
  • [39] A security protocol for D2D communications in 5G networks using elliptic curve cryptography
    Kishore, R.
    Ioannou, I.
    Christophorou, C.
    Prabagarane, N.
    Vassiliou, V.
    Vignesh, S.
    Vinayak, H.
    Venkatesh, S.
    Pitsillides, A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (06) : 1389 - 1408
  • [40] An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
    Wu, Kan
    Gong, Peng
    Wang, Jiantao
    Yan, Xiaopeng
    Li, Ping
    ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2013, 16 (04): : 324 - 335