Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

by   Arindam Sarkar, et al.

In this paper secured wireless communication using fuzzy logic based high speed public key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC) which is a sort of public key cryptography used in wireless communication provides equivalent level of security like other existing public key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80 computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.


Key management system for WSNs based on hash functions and elliptic curve cryptography

Due to hostile environment and wireless communication channel, security ...

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

Public-key cryptography algorithms, especially elliptic curve cryptograp...

An Open-source Library of Large Integer Polynomial Multipliers

Polynomial multiplication is a bottleneck in most of the public-key cryp...

Breaking the Hidden Irreducible Polynomials Scheme

In 2019 Gómez described a new public key cryptography scheme based on id...

A New Algorithm for Double Scalar Multiplication over Koblitz Curves

Koblitz curves are a special set of elliptic curves and have improved pe...

Efficient Verification of Optimized Code: Correct High-speed Curve25519

Code that is highly optimized poses a problem for program-level verifica...

Set It and Forget It! Turnkey ECC for Instant Integration

Historically, Elliptic Curve Cryptography (ECC) is an active field of ap...