scholarly journals Advanced Symmetric Key Cryptography Algorithm: Application of Pseudo Biotic DNA Method(ASKCA VER-1.0)

Author(s):  
Asoke Nath ◽  
Ankita Kedia ◽  
Sunanda Pal ◽  
Moumita Sen

In today’s world with advancement in technologies as networking is growing at a fast pace providing security to data becomes the biggest concern. Hence, cryptography is the major area of concern when it comes to data security. DNA cryptography is a promising approach in encrypting, storing and transmitting data over a network. In our work we will be trying to design an encryption and corresponding decryption algorithm based on pseudo biotic DNA cryptography method. The algorithm will make use of basic concepts of DNA cryptography, crossover, mutation, transcription, splicing system for get spliced key, DNA Vigenere table and also a lot of steps to perform randomization of the plain texts in order to produce cipher texts which cannot be easily breakable. The encryption algorithm can be used in cellular and electronic communication.This document provides some minimal guidelines (and requirements) for writing a research paper. Issues related to the contents, originality, contributions, organization, bibliographic information, and writing style are briefly covered. Evaluation criteria and due dates for the research paper are also provided.

2013 ◽  
Vol 74 (20) ◽  
pp. 29-33 ◽  
Author(s):  
Krishna KumarPandey ◽  
Vikas Rangari ◽  
Sitesh Kumar Sinha

2018 ◽  
Vol Volume-2 (Issue-2) ◽  
pp. 586-589
Author(s):  
Tushar Anil Patil ◽  
Prof. Dr. Mrs. K. V. Kulhalli ◽  

2020 ◽  
Vol 8 (5) ◽  
pp. 4214-4218

Cloud computing is hosted technology used to deliver services over internet. These services are broadly classified based on type of hosting i.e. infrastructure, platform and software. Public environment and internet connectivity make it vulnerable and unsafe for communication and storage. Confidentiality is one of the major principles to keep data privacy and protection at high level. Cryptographic techniques are used to achieve confidentiality and integrity of information during unsafe communication. This research paper observes that various cryptographic algorithms known as symmetric key cryptography and asymmetric key cryptography can be used to protect information and make it unreadable for unauthorised users. This research paper implements different security algorithms and observe their performance based on computation time over different input sizes. The complete research work concludes a comparative study and recommends different security approaches for different situations.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2019 ◽  
Author(s):  
Ira Nath ◽  
Renesha Ghosh ◽  
Sourav Ghosh ◽  
Pranati Rakshit ◽  
Dharmpal Singh

2019 ◽  
Author(s):  
Ira Nath ◽  
Pranati Rakshit ◽  
Renesha Ghosh ◽  
Sourav Ghosh ◽  
Dharmpal Singh

Author(s):  
Sanjeev Kumar ◽  
Madhu Sharma Gaur ◽  
Prem Sagar Sharma ◽  
Deepkiran Munjal

Sign in / Sign up

Export Citation Format

Share Document