scholarly journals Software Implementation and Design of Information Encryption Algorithm Based on DNA Nano Self-Assembled Sensor Array

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Caixia Li

In the field of information security, DNA cryptography based on DNA molecular configuration and special recognition mechanism between molecules has developed rapidly. DNA molecules have great development potential in the field of information security technology such as information encryption, hiding and authentication, which provides a new way for the development of modern cryptography. The nodes of traditional sensor networks are mostly distributed in the form of a net with strong openness. In the process of node data transmission, the information is likely to be stolen, tampered with, and destroyed at any time. In this paper, an information encryption method based on DNA nano self-assembled sensor technology is proposed, and the encryption software based on DNA nano self-assembled sensor array is designed. The information encryption algorithm is designed, tested, simulated and analysed, and compared with other designs. The simulation results show that the encryption algorithm system based on DNA nano self-assembled sensor array has good function and excellent performance, can fully meet the requirements of network real-time encryption, has good feasibility and security, and reveals the great application potential of DNA molecules in the field of information security.

Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Xuncai Zhang ◽  
Lingfei Wang ◽  
Ying Niu ◽  
Guangzhao Cui ◽  
Shengtao Geng

In this paper, an image encryption algorithm based on the H-fractal and dynamic self-invertible matrix is proposed. The H-fractal diffusion encryption method is firstly used in this encryption algorithm. This method crosses the pixels at both ends of the H-fractal, and it can enrich the means of pixel diffusion. The encryption algorithm we propose uses the Lorenz hyperchaotic system to generate pseudorandom sequences for pixel location scrambling and self-invertible matrix construction to scramble and diffuse images. To link the cipher image with the original image, the initial values of the Lorenz hyperchaotic system are determined using the original image, and it can enhance the security of the encryption algorithm. The security analysis shows that this algorithm is easy to implement. It has a large key space and strong key sensitivity and can effectively resist plaintext attacks.


Sign in / Sign up

Export Citation Format

Share Document