A Bio-Inspired Algorithm for Symmetric Encryption

Author(s):  
Kadda Benyahia ◽  
Meftah Mustapha ◽  
Latreche Abdelkrim

The exploits of the structure of the DNA to realize the cryptographic systems is a new direction. The security of data transfer is an important factor for data transmission. Cryptography is one of the methods that ensures this constraint by techniques for sending data confidentially. Harnessing the benefits of DNA to secure information content makes cryptography more efficient. In this article, the authors propose a symmetric cryptography system based on DNA called Stegano-DNA- which operates under two main modules: scrambling and encryption. In its scrambling phase, Stegano-DNA eliminates the logical order of the letters in the clear text by the use of boxes of substitutions, and in its encryption phase, looks for the short sequence DNA in the chromosome sequence and memorizes only the number of positions needed to optimize the encryption time than when memorizing all positions.

Author(s):  
Kadda Benyahia ◽  
Meftah Mustapha ◽  
Latreche Abdelkrim

The exploits of the structure of the DNA to realize the cryptographic systems is a new direction. The security of data transfer is an important factor for data transmission. Cryptography is one of the methods that ensures this constraint by techniques for sending data confidentially. Harnessing the benefits of DNA to secure information content makes cryptography more efficient. In this article, the authors propose a symmetric cryptography system based on DNA called Stegano-DNA- which operates under two main modules: scrambling and encryption. In its scrambling phase, Stegano-DNA eliminates the logical order of the letters in the clear text by the use of boxes of substitutions, and in its encryption phase, looks for the short sequence DNA in the chromosome sequence and memorizes only the number of positions needed to optimize the encryption time than when memorizing all positions.


OP-Journal ◽  
2021 ◽  
Author(s):  
Genevieve Westacott ◽  
Kirsten Vallmurr ◽  
Michael Schütz

AbstractData transfer has been forced to evolve as digital technologies are implemented throughout various aspects of the healthcare system. Despite the uniqueness of both the geography and the population of Queensland, information exchange and data communication has continued to follow this evolutionary trend. There have been a number of different health reforms designed to integrate digital innovations and allow critical data and information to be shared with the appropriate health professionals when necessary. Strict healthcare legislation has been navigated and to provide newly upgraded technologies and processes while maintaining privacy, confidentiality and security standards. A large portion of the digital revolution has been the implementation of the national run project, the My Health Record and the state run project, the Integrated Electronic Medical Record. Both are platforms that allow secure information exchange allowing patients to have improved quality of care. To maintain the steady progress, both the state and federal governments have developed strategies and visions to help provide guidance and direct for ongoing and future digital projects. They also outline areas that require further advancements to ensure Queensland is delivering equitable, high quality healthcare.


2020 ◽  
Vol 41 (Supplement_2) ◽  
Author(s):  
S Mittal ◽  
D Brenner ◽  
S Oliveros ◽  
A Bhatt ◽  
M Preminger ◽  
...  

Abstract Background A “pill-in-the-pocket” anticoagulation strategy, guided by ECG data from an implantable loop recorder (ILR), has been advocated as a clinical strategy. However, a fundamental requirement is the ability to reliably obtain daily ECG data from patients. Objective To determine the reliability of daily ECG data transfer from ILRs. Methods We evaluated patients implanted with an ILR in whom we sought to withhold oral anticoagulation (OAC) unless atrial fibrillation (AF) was detected. The ILR transmits data nightly to a bedside monitor. Once received, the data are sent to a central server. Over the course of a month, we tracked for each patient whether ECG data were received by the server. Results The study included 170 AF patients with an ILR where we planned to withhold OAC unless AF was documented. Daily ECG data were automatically transmitted and retrievable in only 36 (21%) patients. Two (1%) pts had not a single day of connectivity, 6 (4%) pts were connected <7 days, and 16 (9%) pts were connected <14 days. Wireless connectivity was lost for >48 hours in 89 (52%) patients (Figure). Most patients experienced multiple reasons for data transmission failure within the month. Conclusions To determine whether an ILR guided OAC strategy is feasible, reliable daily transmission of ECG data is a fundamental prerequisite. Current technology facilitated daily ECG data transfer in only 1/5 of patients. In the remaining, there was either extended loss of connectivity or no connectivity at all. A “pill-in-the-pocket” anticoagulation approach is currently difficult given existing hardware limitations. Funding Acknowledgement Type of funding source: None


2012 ◽  
Vol 229-231 ◽  
pp. 1543-1546
Author(s):  
Xiao Bo Zhou ◽  
Min Xia ◽  
Hai Long Cheng

To improve data transmission performance of the data acquisition card, a design of high-speed data transmission system is proposed in the thesis. Using FPGA of programmable logic devices, adopting Verilog HDL of hardware description language, the design of modularization and DMA transmission method is implemented in FPGA. Eventually the design implements the data transmission with high-speed through PCI Express interface. Through simulation and verification based on hardware system, this design is proved to be feasible and can satisfy the performance requirements of data transmission in the high-speed data acquisition card applied in high-speed railway communication. The design also has some value of application and reference for a universal data acquisition card.


2018 ◽  
Vol 173 ◽  
pp. 03035
Author(s):  
Wei Jiang ◽  
Cuicui Ji ◽  
Yuntian Dai

The data transfer rate is the traditional criterion for evaluating the overall performance of a hard disk. In this paper, the data transmission performance of hard disk was characterized based on fractal theory. The traditional mechanical hard disks and solid state disks with different capacities and specifications were tested and the corresponding signal graph of data transfer was analysed for the calculation of fractal dimension D. The results indicate that the process of hard disk data transfer has fractal characteristics; the fractal dimension D increases with the increase of the average transfer rate and the rotating speed of mechanical hard disk. However, there seems no direct correspondence between the fractal dimension D and the capacity of the hard disk; the larger the floating range of data transmission, the greater value of fractal dimension D.


Author(s):  
Musa. M. Yahaya ◽  
Aminat Ajibola

Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.


2020 ◽  
Vol 6 (1) ◽  
pp. 100-108
Author(s):  
I. Kaisina

This paper investigates the process of multi-stream data transmission from several unmanned aerial vehicles (UAV) to a ground station. We can observe a mathematical model of the data transfer process at the application level of the OSI model (from flying nodes to a ground station). The Poisson – Pareto packet process is used to describe the multi-stream data traffic. The results of simulation are obtained using the network simulator NS-3. It is considered a system for emulating the process of multi-stream data transmission from UAV to a ground station. Acording to the results of studies for multi-stream data transmission it is clear that the increase of the UAV source nodes which simultaneously transmit data to a ground station needs higher requirements for Goodput.


Many researches have been proposed for efficiency of data transmission from sensor nodes to sink node for energy efficiency in wireless sensor networks. Among them, cluster-based methods have been preferred In this study, we used the angle formed with the sink node and the distance of the cluster members to calculate the probability of cluster head. Each sensor node sends measurement values to header candidates, and the header candidate node measures the probability value of the header with the value received from its candidate member nodes. To construct the cluster members, the data transfer direction is considered. We consider angle, distance, and direction as cluster header possibility value. Experimental results show that data transmission is proceeding in the direction of going to the sink node. We calculated and displayed the header possibility value of the neighbor nodes of the sensor node and confirmed the candidates of the cluster header for data transfer as the value. In this study, residual energy amount of each sensor node is not considered. In the next study, we calculate the value considering the residual energy amount of the node when measuring the header possibility value of the cluster.


The deployment of Internet-of-Things (IoT) enables an even richer variety of sensors at a much larger scale. Where offloading both the evaluation and the polling of IoT sensor data to the cloud would improve energy efficiency and data transfer costs for the mobile. We build an energy efficient framework for Combining Sensors and IoT to help developers easily builds applications that evaluate sensor data on the server via data transmission. We built a advanced framework to compress data i.e Novel Data Compression Approach that helps the user to know the regular movement of particular person with the sensor within the limited premises and the location surveillance of the host will be saving the location data with some security measures We also implement our protocol and compare it with the certificate-based scheme to illustrate its feasibility.


Sign in / Sign up

Export Citation Format

Share Document