Open Access iconOpen Access

ARTICLE

crossmark

Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

K. Sudharson1,*, S. Arun2

1 Department of Information and Communication Engineering, Anna University, Chennai, 600025, India.
2 Department of ECE, Prathyusha Engineering College, Thiruvallur, 602025, India.

* Corresponding Author: K. Sudharson. Email: email

Intelligent Automation & Soft Computing 2022, 34(3), 1769-1784. https://doi.org/10.32604/iasc.2022.026483

Abstract

Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the Quantum Elliptical Curve Cryptography (QECC) protocol. To provide the appropriate key generation and key sharing mechanism to convert the fool node to a brawny node and avoid packet loss and energy consumption in the network. By turning the fool node into a vital node, the QECC lowers the network's error rate. The experiment uses Network Simulator 2 to achieve successful outcomes such as decreased packet loss, reduced error rate with increased energy consumption, increased pair key generation for additional nodes, and increased packet size.

Keywords


Cite This Article

APA Style
Sudharson, K., Arun, S. (2022). Security protocol function using quantum elliptic curve cryptography algorithm. Intelligent Automation & Soft Computing, 34(3), 1769-1784. https://doi.org/10.32604/iasc.2022.026483
Vancouver Style
Sudharson K, Arun S. Security protocol function using quantum elliptic curve cryptography algorithm. Intell Automat Soft Comput . 2022;34(3):1769-1784 https://doi.org/10.32604/iasc.2022.026483
IEEE Style
K. Sudharson and S. Arun, “Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm,” Intell. Automat. Soft Comput. , vol. 34, no. 3, pp. 1769-1784, 2022. https://doi.org/10.32604/iasc.2022.026483



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1301

    View

  • 749

    Download

  • 0

    Like

Share Link