Hybrid Encryption of Cloud Processing With IOT Devices Using DNA And RSA Cryptography

نویسندگان

چکیده

The research paper titled "Hybrid Data Encryption as well Decryption Using Hybrid RSA and DNA" develops a hybrid cryptosystem by combining the usefulness of such an asymmetric-key (public-key) with efficacy symmetric-key (private-key) cryptosystem. These two types cryptosystems use different keys. method addresses concerns regarding users' right to privacy, authentication, accuracy utilizing data encryption process that is secure in both directions. Both encrypting decrypting data, which are utilized system, methods. It has been suggested algorithm, combines DNA RSA, be used for file order address issues efficiency security. results testing show algorithm suitable use. In this particular project's decoding cloud processing IOT devices, algorithms were used.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RSA hybrid encryption schemes

This document compares the two published RSA-based hybrid encryption schemes having linear reduction in their security proof: RSA-KEM with DEM1 and RSA-REACT. While the performance of RSA-REACT is worse than the performance of RSA-KEM+DEM1, a complete proof of its security has already been published. This is indeed an advantage, because we show that the security result for RSAKEM+DEM1 has a sma...

متن کامل

Hybrid cryptography technique using modified Diffie-Hellman and RSA

Diffie-Hellman is public key based symmetric key algorithm used for secret key sharing between two parties over public communication channel. Diffie-Hellman is weak when there is man in middle attack done by eavesdropper. Diffie-Hellman algorithm is not provide authentication. Security of Diffie-Hellman cryptography system completely depends upon random prime number selected by user. Finding pr...

متن کامل

Hybrid Algorithm with DSA, RSA and MD5 Encryption Algorithm for wireless devices

Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching became a common issue in different form of networks. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. If you want to send data to some other persons through network then if you truly want to keep the in...

متن کامل

Encryption and Decryption of Text Data with Rsa Cryptography Using Matlab

The Research was under taken in order to develop better and faster algorithms for implementation of RSA system in Cryptography. Various types of Symmetrical and Asymmetrical Cryptography methods were studied. Faster implementations of public-key cryptography, and in particular of RSA are of utmost importance nowadays. Computer security is becoming increasingly important to companies and organiz...

متن کامل

synthesis and dna interaction studies of new cobalt (ii) complexes containing different dinitrogen aaromatic ligands with calf thymus dna using different spectroscopy methods

در این مطالعه بر هم کنش این چهار کمپلکس با dna تیموس گوساله توسط روش های اسپکتروفتومتری، فلوریمتری، دو رنگ نمائی دورانی، و ویسکوزیمتری بررسی شدند تا اثر استخلاف های متیل بر روی لیگاندهای فنانترولین بررسی گردد.

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Recent and Innovation Trends in Computing and Communication

سال: 2023

ISSN: ['2321-8169']

DOI: https://doi.org/10.17762/ijritcc.v11i6.6767