KryptosChain—A Blockchain-Inspired, AI-Combined, DNA-Encrypted Secure Information Exchange Scheme
نویسندگان
چکیده
Today’s digital world necessitates the adoption of encryption techniques to ensure secure peer-to-peer communication. The sole purpose this paper is conglomerate fundamentals Blockchain, AI (Artificial Intelligence) and DNA (Deoxyribonucleic Acid) into one proposed scheme, KryptosChain, which capable providing a information exchange between sender his intended receiver. scheme firstly suggests DNA-based Huffman coding alternatively allocates purines—Adenine (A) Guanine (G), pyrimidines—Thymine (T) Cytosine (C) values, while following complementary rule higher lower branches resultant tree. Inculcation concepts makes eight times stronger than traditional counterpart based on binary—0 1 values. After ciphertext obtained, methodology next provides Blockchain-inspired message that achieves all principles security proves be immune common cryptographic attacks even without deployment any smart contract, or possessing cryptocurrency arriving at consensus. Lastly, different classifiers were engaged check intrusion detection capability KryptosChain NSL-KDD dataset fundamentals. detailed analysis validates its capacity fulfill goals stands attacks. possibility curbing concludes J84 classifier highest accuracy 95.84% among several others as discussed in paper.
منابع مشابه
Encrypted key exchange: password-based protocols secure against dictionary attacks
Classical cryptographic protocols based on user chosen keys allow an attacker to mount password guessing attacks We introduce a novel combination of asymmetric public key and symmetric secret key cryptography that allow two parties sharing a common password to exchange con dential and authenticated information over an insecure network These proto cols are secure against active attacks and have ...
متن کاملProvable Secure Encrypted Key Exchange Protocol Under Standard Model
Encrypted key exchange protocol’s goal is to establish a high secure key used for further encryption and authentication through a low secure password. Most existing encrypted key exchange protocols either lack security proofs or rely on the Random Oracle model. Compared with those protocols based on the Random Oracle model, provable secure EKE (encrypted key exchange) protocols have heavier com...
متن کاملDNA-Inspired Information Concealing
Protection of the sensitive content is crucial for extensive information sharing. We present a technique of information concealing, based on introduction and maintenance of families of repeats. Repeats in DNA constitute a basic obstacle for its reconstruction by hybridisation. Information concealing in DNA by repeats is considered in [1].
متن کاملSecure Key Exchange Scheme for IPTV Broadcasting
In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to descramble the scrambled program. This paper presents a secure...
متن کاملScheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12030493