27
Views
0
CrossRef citations to date
0
Altmetric
Abstract

Performance analysis of NTRU algorithm with non-post-quantum algorithms

&
 

Abstract

In opportunistic networks, the nodes connect to each other wirelessly and use the store-carry-forward technique to transmit the data from one node to another node. The nodes in opportunistic networks are heterogeneous, having high mobility, limited power, low density, short radio range, and numerous security threats to unauthorized nodes. The fundamental challenge in an opportunistic network is to secure and protect the information during communication in networks to achieve the user’s confidence. This issue is technically resolved by incorporating the cryptography algorithms that make both the virtual and modern world in a safer position. Asymmetric Cryptography makes information unintelligible to an unauthorized user and provides confidentiality to genuine users. Encryption and decryption technology are solutions to protect data from unauthorized users. There are many opportunistic network algorithms in the existing literature that provide optimal performance. However, in this research work, we propose the NTRU post-quantum algorithm because of its high performance, low cost, and fast execution during encryption and decryption of the data over the network. We also implemented and analyzed the performance of the proposed NTRU algorithm and compared its results with the Elliptic Curve Cryptography and ElGamal algorithm. After the result analysis, we conclude that our proposed technique is highly effective and secure.

Subject Classification:

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.