Anefficient 2-Step DNA symmetric cryptography algorithm based on dynamic data structures
نویسندگان
چکیده
منابع مشابه
DNA Cryptography Based on Symmetric Key Exchange
DNA cryptography is a technology of bio science to encrypt large message in compact volume. Now a day, researchers are going to research in the field of secure data transmission. Hiding the encrypted message is important part of Cryptography. Hidden message is in the form of DNA sequence, image, audio and video, which is used to prevent important data from the intruders. In this paper, a new cr...
متن کاملDynamic Replication based on Firefly Algorithm in Data Grid
In data grid, using reservation is accepted to provide scheduling and service quality. Users need to have an access to the stored data in geographical environment, which can be solved by using replication, and an action taken to reach certainty. As a result, users are directed toward the nearest version to access information. The most important point is to know in which sites and distributed sy...
متن کاملAnalysis on AES Algorithm using symmetric cryptography
In this paper we present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in two different based, i.e. RSA and elliptic curve cryptography both are modular based arithm...
متن کاملAn Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security
This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...
متن کاملA Unique Approach to Multimedia Based Dynamic Symmetric Key Cryptography
In the past decades, Most of the cryptography and steganography based techniques emphasized on securing text or images only. They made use of traditional approaches like transpositions or substitutions for text security and image transformation techniques for image security. None of them completely ensures the safety of data from bruit-force methods, applied by spy-bots. To provide more securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i2.6.10140