Secure Data Transfer through DNA Cryptography using Symmetric Algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis on AES Algorithm using symmetric cryptography

In this paper we present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in two different based, i.e. RSA and elliptic curve cryptography both are modular based arithm...

متن کامل

A Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm

The modern era has seen ample number of cryptographic and stenographic techniques to transmit and receive data in a secure and confidential manner. In our paper we use a multi resolution wavelet domain by collaborating the concepts of steganography and cryptography. Initially we use a modified blowfish algorithm and will embed the encrypted message into an image. At the later part of the techni...

متن کامل

Secure Symmetric Encryption Scheme Using Genetic Algorithm

Ensuring the security of sensitive and confidential data during transmission and storage is one of the greatest challenges faced by digital world. The most common technique used to protect data is encryption. Different encryption algorithms are available and they are used in security protocols to provide confidentiality, integrity and authentication. In spite of having strong encryption algorit...

متن کامل

A Secure Framework for User Data Storage in Public Cloud Systems using Symmetric Cryptography

Cloud computing is a paradigm shift over the Internet which provides instant access to software, hardware and computing information resources for use when they needed. Cloud Computing is the access of data, software applications and computer processing power through a “cloud” of online resources. Cloud computing involves storage of user data in the cloud. Cloud architectures will constitute cos...

متن کامل

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016907719