Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

نویسندگان

چکیده

Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. researchers have overcome many obstacles, yet security remains crucial concern in QC. experimenters recently discovered that QC has lot more data hacking than static networks. Moreover, bitwise error still present implementing Cryptography Protocol (QCCP). Because all are mobile dynamic topology occurs, proposed research uses Elliptical Curve (QECC) protocol. To provide appropriate key generation sharing mechanism convert fool brawny avoid packet loss energy consumption network. By turning into vital node, QECC lowers network's rate. experiment Network Simulator 2 achieve successful outcomes decreased loss, reduced rate with increased consumption, pair for additional nodes, size.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elliptic curve cryptography in cloud computing security

Cloud computing is a technological advancement that has been growing swiftly during the last decade. In simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous access to services through the Internet. It enables consumers to access applications and services that reside on remote servers, without having to allocate large amounts of storage space on the...

متن کامل

Elliptic Curve Cryptography Based Wireless Authentication Protocol

Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...

متن کامل

A Review on Distributed System Security using Elliptic Curve Cryptography

Most of the security architecture uses public key cryptosystems for authentication and to secure the communication that takes place on distributes sites. Now a day’s identity based cryptography and certificate-less public key cryptography are used for enhancing the security. Certificate-less based cryptography has reduced the certificate necessity for key distribution and reducing the problem o...

متن کامل

A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography

In this article, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. ...

متن کامل

Elliptic Curve Cryptography: Pre and Post Quantum

Public-key cryptography has been at the center of online communication and information transfer for decades. With computing power growing at an exponential rate, some of the most widely used encryption schemes are starting to show their limits. The RSA algorithm, which is still widely used around the world, now requires very large keys to ensure security. Since these systems may appear on low c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Intelligent Automation and Soft Computing

سال: 2022

ISSN: ['2326-005X', '1079-8587']

DOI: https://doi.org/10.32604/iasc.2022.026483