A Novel Hybrid Encryption Method Based on Honey Encryption and Advanced DNA Encoding Scheme in Key Generation
نویسندگان
چکیده
Nowadays, increased information capacity and transmission processes make security a difficult problem. As result, most researchers employ encryption decryption algorithms to enhance domains. it progresses, new methods are being used for security. In this paper, hybrid algorithm that combines the honey an advanced DNA encoding scheme in key generation is presented. Deoxyribonucleic Acid (DNA) achieves maximal protection powerful with high low modification rate, currently investigated as potential carrier Honey Encryption (HE) important method systems can strongly prevent brute force attacks. However, traditional honeyword has message space limitation problem distribution process. Therefore, we use improved our proposed system. By combining benefits of DNA-based algorithm, created five different lookup tables generation. The based on discussed detail. passwords generated keys by using tables, disease names input messages encoded This reduce storage overhead applying time complexity existing
منابع مشابه
A Novel Encryption Scheme based on DNA Computing
A novel method to encrypt data by applying DNA based computing technology is discussed. Binary data may be encoded in DNA strands by use of an alphabet of short oligonucleotide sequence. The encryption of natural DNA and the encryption of DNA encoding binary data are discussed.A pure XOR based DNA computing scheme is also discussed and the limitations of the proposed scheme are observed. Index ...
متن کاملa cca2-secure incomparable public key encryption scheme
in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...
متن کاملA Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
In this paper, firstly we propose two new concepts concerning the notion of key escrow encryption schemes: provable partiality and independency. Roughly speaking we say that a scheme has provable partiality if existing polynomial time algorithm for recovering the secret knowing escrowed information implies a polynomial time algorithm that can solve a well-known intractable problem. In addition,...
متن کاملKey Generation of Attribute Based Broadcast Encryption
Broadcast Encryption (BE) scheme is allows the sender to securely distribute a data to a dynamically changing set of users over a unsecure channel. Attribute based Broadcast Encryption (ABBE) is a excellent approach for broadcasting. Existing BE classical BE approach required an explicitly specified decrypter list. In ABBE differentiate groups of users by their attribute. In ABBE encrypter enfo...
متن کاملA hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encryption techniques. In this paper, we present a hybrid image protection scheme to establish a relation between the data encryption key and the watermark. Prepositioned secret sharing allows the reconstruction of differe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of computer and communications
سال: 2022
ISSN: ['2327-5219', '2327-5227']
DOI: https://doi.org/10.4236/jcc.2022.109002