A Novel Hybrid Encryption Method Based on Honey Encryption and Advanced DNA Encoding Scheme in Key Generation

نویسندگان

چکیده

Nowadays, increased information capacity and transmission processes make security a difficult problem. As result, most researchers employ encryption decryption algorithms to enhance domains. it progresses, new methods are being used for security. In this paper, hybrid algorithm that combines the honey an advanced DNA encoding scheme in key generation is presented. Deoxyribonucleic Acid (DNA) achieves maximal protection powerful with high low modification rate, currently investigated as potential carrier Honey Encryption (HE) important method systems can strongly prevent brute force attacks. However, traditional honeyword has message space limitation problem distribution process. Therefore, we use improved our proposed system. By combining benefits of DNA-based algorithm, created five different lookup tables generation. The based on discussed detail. passwords generated keys by using tables, disease names input messages encoded This reduce storage overhead applying time complexity existing

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Encryption Scheme based on DNA Computing

A novel method to encrypt data by applying DNA based computing technology is discussed. Binary data may be encoded in DNA strands by use of an alphabet of short oligonucleotide sequence. The encryption of natural DNA and the encryption of DNA encoding binary data are discussed.A pure XOR based DNA computing scheme is also discussed and the limitations of the proposed scheme are observed. Index ...

متن کامل

a cca2-secure incomparable public key encryption scheme

in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...

متن کامل

A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme

In this paper, firstly we propose two new concepts concerning the notion of key escrow encryption schemes: provable partiality and independency. Roughly speaking we say that a scheme has provable partiality if existing polynomial time algorithm for recovering the secret knowing escrowed information implies a polynomial time algorithm that can solve a well-known intractable problem. In addition,...

متن کامل

Key Generation of Attribute Based Broadcast Encryption

Broadcast Encryption (BE) scheme is allows the sender to securely distribute a data to a dynamically changing set of users over a unsecure channel. Attribute based Broadcast Encryption (ABBE) is a excellent approach for broadcasting. Existing BE classical BE approach required an explicitly specified decrypter list. In ABBE differentiate groups of users by their attribute. In ABBE encrypter enfo...

متن کامل

A hybrid scheme for encryption and watermarking

Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encryption techniques. In this paper, we present a hybrid image protection scheme to establish a relation between the data encryption key and the watermark. Prepositioned secret sharing allows the reconstruction of differe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of computer and communications

سال: 2022

ISSN: ['2327-5219', '2327-5227']

DOI: https://doi.org/10.4236/jcc.2022.109002