Vol. 3, No. 10, 2012
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography
(FLHSPKC)
Arindam Sarkar
J. K. Mandal
Department of Computer Science & Engineering
University of Kalyani
Kalyani-741235, Nadia, West Bengal, India.
Department of Computer Science & Engineering
University of Kalyani
Kalyani-741235, Nadia, West Bengal, India.
Abstract— In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography
(FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor
Network (WSN) has several major constraints likes’ inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve
Cryptography (ECC) which is a sort of public-key cryptography used in wireless communication provides equivalent level of security like other existing public–key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.
Keywords- Soft computing; Wireless Communication; High Speed;
ECC.
I.
References: Transactions on Information Theory 22 (6) (1976) 644–654. 1976. (1985) 469–472, 1985. Cryptology – Crypto ’92, LNCS, 740, Springer- Verlag, 345-357, 1992. D. Knuth, “The Art of Computer Programming – Semi Numerical Algorithms”, Vol.2, Addison-Wesley, Third Edition, 1998. N. Koblitz, “A Course in Number Theory and Cryptography”, Second Edition, Springer-Verlag, 1994. J. Kelsey, B. Schneier, D. Wagner, C. Hall (1998). "Cryptanalytic Attacks on Pseudorandom Number Generators" Encryption, 5th International Proceedings, 1998. Cohen H., Miyaji A., and Ono T. 1998. Efficient elliptic curve exponentiation using mixed coordinates UK, 51–65, 1998. 1556, Springer-Verlag,201-212, 1998. S. Shantz,2000. From Euclid’s GCD to Montgomery Multiplication to the Great Divide, preprint, 2000. August , 2004. Embedded Systems (CHES’04),” Springer, 119– 132, 2004. Polynomial basis and ONB”, PWAEST, Vol. 10, pp. 130-134, December, 2005. [16] Atul Kahate, Cryptography and Network Security, 2003, Tata McGrawHill publishing Company Limited, Eighth reprint 2006. volcano," IEEE Internet Computing, vol. 10, pp. 18-25, 2006. 10.5121/ijassn.2012.2302, pp. 9-25. ISSN: 2231 - 4482 [Online]; 2231 5225 [Print], 2012. 10.5121/ijans.2012.2302, pp 11-28, ISSN: 2249 - 0175 [Online]; 2249 2682 [Print], 2012. (IJCSET), Vol. 3 No. 7 July 2012, pp 267-273, ISSN: 2229-3345, 2012.