KryptosChain—A Blockchain-Inspired, AI-Combined, DNA-Encrypted Secure Information Exchange Scheme

نویسندگان

چکیده

Today’s digital world necessitates the adoption of encryption techniques to ensure secure peer-to-peer communication. The sole purpose this paper is conglomerate fundamentals Blockchain, AI (Artificial Intelligence) and DNA (Deoxyribonucleic Acid) into one proposed scheme, KryptosChain, which capable providing a information exchange between sender his intended receiver. scheme firstly suggests DNA-based Huffman coding alternatively allocates purines—Adenine (A) Guanine (G), pyrimidines—Thymine (T) Cytosine (C) values, while following complementary rule higher lower branches resultant tree. Inculcation concepts makes eight times stronger than traditional counterpart based on binary—0 1 values. After ciphertext obtained, methodology next provides Blockchain-inspired message that achieves all principles security proves be immune common cryptographic attacks even without deployment any smart contract, or possessing cryptocurrency arriving at consensus. Lastly, different classifiers were engaged check intrusion detection capability KryptosChain NSL-KDD dataset fundamentals. detailed analysis validates its capacity fulfill goals stands attacks. possibility curbing concludes J84 classifier highest accuracy 95.84% among several others as discussed in paper.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Encrypted key exchange: password-based protocols secure against dictionary attacks

Classical cryptographic protocols based on user chosen keys allow an attacker to mount password guessing attacks We introduce a novel combination of asymmetric public key and symmetric secret key cryptography that allow two parties sharing a common password to exchange con dential and authenticated information over an insecure network These proto cols are secure against active attacks and have ...

متن کامل

Provable Secure Encrypted Key Exchange Protocol Under Standard Model

Encrypted key exchange protocol’s goal is to establish a high secure key used for further encryption and authentication through a low secure password. Most existing encrypted key exchange protocols either lack security proofs or rely on the Random Oracle model. Compared with those protocols based on the Random Oracle model, provable secure EKE (encrypted key exchange) protocols have heavier com...

متن کامل

DNA-Inspired Information Concealing

Protection of the sensitive content is crucial for extensive information sharing. We present a technique of information concealing, based on introduction and maintenance of families of repeats. Repeats in DNA constitute a basic obstacle for its reconstruction by hybridisation. Information concealing in DNA by repeats is considered in [1].

متن کامل

Secure Key Exchange Scheme for IPTV Broadcasting

In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to descramble the scrambled program. This paper presents a secure...

متن کامل

Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols

This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12030493