z-logo
open-access-imgOpen Access
Modeling Elliptical Curve Cryptography Keys using Back Propagation Algorithm
Author(s) -
Ekta Narwal,
Sumeet Gill
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.i3318.0789s319
Subject(s) - computer science , public key cryptography , cryptography , elliptic curve cryptography , id based cryptography , symmetric key algorithm , certificate authority , computer security , computer network , wireless ad hoc network , vehicular ad hoc network , revocation list , key (lock) , pseudonym , mobile ad hoc network , algorithm , encryption , wireless , key distribution , telecommunications , political science , law , network packet
Vehicular Ad Hoc Networks (VANETs) are the newest for of Ad Hoc Networks in which moving vehicles act as routers and nodes to form a network. VANETs use many cryptographic approaches like symmetric key approaches, public key approaches, certificate revocation, pseudonym based approaches, identity-based cryptography, identity-based signature, Elliptical Curve Cryptography (ECC) etc. for secure communication. These techniques use public and private keys for enhancing the security of messages and all these keys are stored on hardware devices like TPDs (Temper Proof Devices) in VANETs. TPDs are protected by the cryptographic algorithms. In this present era of technology these algorithms and their online simulators are freely available on internet and can be easily intruded. There is a potential need to enhance the security of these keys. In this paper we worked on enhancing the security of ECC keys stored in TPDs of VANETs using a specific network of Artificial Neural Networks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here