期刊文献+
共找到457篇文章
< 1 2 23 >
每页显示 20 50 100
Enhanced Euclid Algorithm for Modular Multiplicative Inverse and Its Application in Cryptographic Protocols
1
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2010年第12期901-906,共6页
Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorit... Numerous cryptographic algorithms (ElGamal, Rabin, RSA, NTRU etc) require multiple computations of modulo multiplicative inverses. This paper describes and validates a new algorithm, called the Enhanced Euclid Algorithm, for modular multiplicative inverse (MMI). Analysis of the proposed algorithm shows that it is more efficient than the Extended Euclid algorithm (XEA). In addition, if a MMI does not exist, then it is not necessary to use the Backtracking procedure in the proposed algorithm;this case requires fewer operations on every step (divisions, multiplications, additions, assignments and push operations on stack), than the XEA. Overall, XEA uses more multiplications, additions, assignments and twice as many variables than the proposed algorithm. 展开更多
关键词 Extended-Euclid algorithm MODULAR MULTIPLICATIVE INVERSE public-key cryptography RSA Cryptocol Rabin Information Hiding algorithm ELGAMAL ENCRYPTION/DECRYPTION NTRU Cryptosystem Computer Simulation Low Memory Devices
在线阅读 下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
2
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 cryptography symmetric algorithm ENCRYPTION DECRYPTION cipher text cloud security asymmetric algorithm
在线阅读 下载PDF
Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm
3
作者 Arkan Kh Shakr Sabonchi Zainab Hashim Obaid 《Journal of Information Hiding and Privacy Protection》 2023年第1期1-18,共18页
In the contemporary era,the abundant availability of health information through internet and mobile technology raises concerns.Safeguarding and maintaining the confidentiality of patients’medical data becomes paramou... In the contemporary era,the abundant availability of health information through internet and mobile technology raises concerns.Safeguarding and maintaining the confidentiality of patients’medical data becomes paramount when sharing such information with authorized healthcare providers.Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers,concerns persist regarding the security of the data.The security of Electronic Health Record Systems(EHRS)can be improved by employing the Cuckoo Search Algorithm(CS),the SHA-256 algorithm,and the Elliptic Curve Cryptography(ECC),as proposed in this study.The suggested approach involves usingCS to generate the ECCprivate key,thereby enhancing the security of data storage in EHR.The study evaluates the proposed design by comparing encoding and decoding times with alternative techniques like ECC-GA-SHA-256.The research findings indicate that the proposed design achieves faster encoding and decoding times,completing 125 and 175 iterations,respectively.Furthermore,the proposed design surpasses other encoding techniques by exhibiting encoding and decoding times that are more than 15.17%faster.These results imply that the proposed design can significantly enhance the security and performance of EHRs.Through the utilization of CS,SHA-256,and ECC,this study presents promising methods for addressing the security challenges associated with EHRs. 展开更多
关键词 Information security electronic health record system cryptography cuckoo search algorithms
在线阅读 下载PDF
OFD版式文档体系在智慧医疗中的创新应用与优化路径探讨
4
作者 张晓东 杨丰华 《中国数字医学》 2026年第2期66-71,共6页
探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出... 探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出优化策略,并展望未来发展前景。 展开更多
关键词 智慧医疗 OFD版式文档 国密算法
在线阅读 下载PDF
格上困难问题量子求解算法综述
5
作者 曹金政 罗向阳 +1 位作者 陈晓峰 程庆丰 《软件学报》 北大核心 2026年第1期398-424,共27页
随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐... 随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐步引起关注.围绕后量子密码研究中涉及的格上困难问题,对格上困难问题量子求解算法给出综述.首先,分类整了格上困难问题量子求解算法研究现状.其次,梳理各类格上困难问题量子求解算法的设计思路和应用的量子计算技术,并总结各类格上困难问题量子求解算法的复杂度.最后,展望格上困难问题量子求解算法的未来发展趋势. 展开更多
关键词 格公钥密码 格上困难问题 量子算法
在线阅读 下载PDF
A realizable quantum encryption algorithm for qubits 被引量:5
6
作者 周南润 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2164-2169,共6页
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext spa... A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements. 展开更多
关键词 quantum encryption algorithm quantum computation cryptography
原文传递
A NEW RSA CRYPTOSYSTEM HARDWARE IMPLEMENTATION BASED ON MONTGOMERY'S ALGORITHM 被引量:5
7
作者 LU Jun-ming(卢君明) +1 位作者 LIN Zheng-hui(林争辉) 《Journal of Shanghai Jiaotong university(Science)》 EI 2002年第1期46-49,共4页
RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was pres... RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was presented. Basically, a fast modular multiplication architecture based on Montgomery’s algorithm was proposed. Modular exponentiation algorithm scans encryption from right to left, so two modular multiplications can be processed parallel. The new architecture is also fit for an effective I/O interface. The time to calculate a modular exponentiation is about n 2 clock cycles. The proposed architecture has a data rate of 93.7 kb/s for 1 024 bit work with a 100 MHz clock. 展开更多
关键词 MONTGOMERY algorithm MODULAR MULTIPLICATION RSA public-key crytosystem
在线阅读 下载PDF
Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems 被引量:9
8
作者 Srinath Doss Jothi Paranthaman +5 位作者 Suseendran Gopalakrishnan Akila Duraisamy Souvik Pal Balaganesh Duraisamy Chung Le Van Dac-Nhuong Le 《Computers, Materials & Continua》 SCIE EI 2021年第2期1577-1594,共18页
In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medica... In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests.This datum is sensitive,and hence security is a must in transforming the sensational contents.In this paper,an Evolutionary Algorithm,namely the Memetic Algorithm is used for encrypting the text messages.The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels.The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the encoded letter.To show its precision,equivalent to five RGB images and five Grayscale images are used to test the proposed algorithm.The results of the proposed algorithm were analyzed using statistical methods,and the proposed algorithm showed the importance of data transfer in healthcare systems in a stable environment.In the future,to embed the privacy-preserving of medical data,it can be extended with blockchain technology. 展开更多
关键词 Internet of Things medical images cryptography memetic algorithm STEGANOGRAPHY
在线阅读 下载PDF
SLID: A Secure Lowest-ID Clustering Algorithm 被引量:2
9
作者 HUGuang-ming HUANGZun-guo HUHua-ping GONGZheng-hu 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期39-42,共4页
In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (... In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results. 展开更多
关键词 clustering algorithm secret sharing threshold cryptography
在线阅读 下载PDF
Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm 被引量:2
10
作者 LUO Wenjun LIU Guanli 《China Communications》 SCIE CSCD 2014年第9期104-111,共8页
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f... Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required. 展开更多
关键词 quantum cryptography asymmetrical encryption information-theoreticalsecurity quantum search algorithms
在线阅读 下载PDF
A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks:A Supervisory Approach to Pipelines 被引量:1
11
作者 Omid Mahdi Ebadati E. Farshad Eshghi Amin Zamani 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第1期323-349,共27页
Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network co... Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances,which monitors the physical and environmental conditions using sensors.Wireless sensor networks have many uses,including the built-in sensor on the outside of the pipeline or installed to support bridge structures,robotics,healthcare,environmental monitoring,etc.Wireless Sensor networks could be used to monitor the temperature,pressure,leak detection and sabotage of transmission lines.Wireless sensor networks are vulnerable to various attacks.Cryptographic algorithms have a good role in information security for wireless sensor networks.Now,various types of cryptographic algorithms provide security in networks,but there are still some problems.In this research,to improve the power of these algorithms,a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed.The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines.The proposed algorithm fulfills three principles of cryptography:integrity,confidentiality and authentication.The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational. 展开更多
关键词 Wireless sensor networks PIPELINE cryptography cryptography algorithm hybrid cryptography CONFIDENTIALITY INTEGRATION AUTHENTICATION
在线阅读 下载PDF
General Quantum Meet-in-the-Middle Search Algorithm Based on Target Solution of Fixed Weight 被引量:1
12
作者 Xiang-Qun Fu Wan-Su Bao +1 位作者 Xiang Wang Jian-Hong Shi 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第10期401-406,共6页
Similar to the classical meet-in-the-middle algorithm,the storage and computation complexity are the key factors that decide the efficiency of the quantum meet-in-the-middle algorithm.Aiming at the target vector of fi... Similar to the classical meet-in-the-middle algorithm,the storage and computation complexity are the key factors that decide the efficiency of the quantum meet-in-the-middle algorithm.Aiming at the target vector of fixed weight,based on the quantum meet-in-the-middle algorithm,the algorithm for searching all n-product vectors with the same weight is presented,whose complexity is better than the exhaustive search algorithm.And the algorithm can reduce the storage complexity of the quantum meet-in-the-middle search algorithm.Then based on the algorithm and the knapsack vector of the Chor-Rivest public-key crypto of fixed weight d,we present a general quantum meet-in-th√e-middle search algorithm based on the target solution of fixed weight,whose computational complexity is∑(d to j=0)(O((1/2)(C^(d-j)_(n-k+1))+O(C^j_klog C^j_k))with∑(d to i=0)C^i_k memory cost.And the optimal value of k is given.Compared to thequantum meet-in-the-middle search algorithm for knapsack problem and the quantum algorithm for searching a target solution of fixed weight,the computational complexity of the algorithm is lower.And its storage complexity is smaller than the quantum meet-in-the-middle-algorithm. 展开更多
关键词 quantum search algorithm meet-in-the-middle public-key crypto knapsack problem
原文传递
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
13
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers algorithm Post-Quantum cryptography
暂未订购
On the Selection of Random Numbers in the ElGamal Algorithm 被引量:4
14
作者 杨军 周贤伟 覃伯平 《Journal of Electronic Science and Technology of China》 2006年第1期55-58,共4页
The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are use... The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the EIGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated. 展开更多
关键词 EIGamal algorithm digital signature public-key encryption randomnumber coprimeness
在线阅读 下载PDF
A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
15
作者 康国栋 方卯发 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第2期239-243,共5页
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps... We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid. 展开更多
关键词 discrete algorithm under mod public-key cryptography SECURITY
在线阅读 下载PDF
A Message Digest Disposing Algorithm Based on RC4
16
作者 LIUYabin CHEN Jing DU Ruiying ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期251-254,共4页
The characteristics of the wireless network determine the requirement of lightweight cryptography. Towards the huge cost of an existing algorithm such as MD5, this paper proposes a message digest scheme based on the R... The characteristics of the wireless network determine the requirement of lightweight cryptography. Towards the huge cost of an existing algorithm such as MD5, this paper proposes a message digest scheme based on the RC4 algorithm which broadens the application area of the RC4 and decreases the requirement of resource or cost. To test the randomicity of the algorithm's di- gest, fifteen kinds of randomicity test to NIST randomicity test standard had been done, and the comparative analysis which compares the digest's randomicity of the algorithm with MD5 had been performed as well. The performance of the algorithm had been analyzed in aspects of mono-directivity, randomicity, practicality and complexness. Statistic tests and analysis results illustrated that our scheme was of low cost of computing, good statistic performance, high running speed and lightweight. 展开更多
关键词 RC4 message digest algorithm cryptography information security
原文传递
Applying Evolutionary Algorithm to Public Key Cryptosystems
17
作者 Tu Hang, Li Li, Wu Tao-jun, Li Yuan-xiangState Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, Hubei,China)School of Computer, Wuhan University, Wuhan 430072, Hubei,China 《Wuhan University Journal of Natural Sciences》 CAS 2003年第S1期287-293,共7页
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under diffe... A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too. 展开更多
关键词 prime generation RSA public key cryptography evolutionary algorithm
在线阅读 下载PDF
Optimal Adaptive Genetic Algorithm Based Hybrid Signcryption Algorithm for Information Security
18
作者 R.Sujatha M.Ramakrishnan +1 位作者 N.Duraipandian B.Ramakrishnan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2015年第5期47-68,共22页
The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption,which is a cryptographic primitive.To securely communicate very large messages,the cryptographic primitive call... The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption,which is a cryptographic primitive.To securely communicate very large messages,the cryptographic primitive called signcryption efficiently implements the same and while most of the public key based systems are suitable for small messages,hybrid encryption(KEM-DEM)provides a competent and practical way.In this paper,we develop a hybrid signcryption technique.The hybrid signcryption is based on the KEM and DEM technique.The KEM algorithm utilizes the KDF technique to encapsulate the symmetric key.The DEM algorithm utilizes the Adaptive Genetic Algorithm based Elliptic curve cryptography algorithm to encrypt the original message.Here,for the security purpose,we introduce the three games and we proved the attackers fail to find the security attributes of our proposed signcryption algorithm.The proposed algorithm is analyzed with Daniel of Service(DOS),Brute Force attack and Man In Middle(MIM)attacks to ensure the secure data transaction. 展开更多
关键词 HYBRID SIGNCRYPTION KEM DEM Adaptive GENETIC algorithm EllipticCurve cryptography
在线阅读 下载PDF
Hardware Architecture for RSA Cryptography Based on Residue Number System
19
作者 郭炜 刘亚灵 +2 位作者 白松辉 魏继增 孙达志 《Transactions of Tianjin University》 EI CAS 2012年第4期237-242,共6页
A parallel architecture for efficient hardware implementation of Rivest Shamir Adleman(RSA) cryptography is proposed.Residue number system(RNS) is introduced to realize high parallelism,thus all the elements under the... A parallel architecture for efficient hardware implementation of Rivest Shamir Adleman(RSA) cryptography is proposed.Residue number system(RNS) is introduced to realize high parallelism,thus all the elements under the same base are independent of each other and can be computed in parallel.Moreover,a simple and fast base transformation is used to achieve RNS Montgomery modular multiplication algorithm,which facilitates hardware implementation.Based on transport triggered architecture(TTA),the proposed architecture is designed to evaluate the performance and feasibility of the algorithm.With these optimizations,a decryption rate of 106 kbps can be achieved for 1 024-b RSA at the frequency of 100 MHz. 展开更多
关键词 residue number system RSA cryptography Montgomery algorithm computer architecture parallelalgorithm
在线阅读 下载PDF
Amino Acid Encryption Method Using Genetic Algorithm for Key Generation
20
作者 Ahmed S.Sakr M.Y.Shams +1 位作者 Amena Mahmoud Mohammed Zidan 《Computers, Materials & Continua》 SCIE EI 2022年第1期123-134,共12页
In this new information era,the transfer of data and information has become a very important matter.Transferred data must be kept secured from unauthorized persons using cryptography.The science of cryptography depend... In this new information era,the transfer of data and information has become a very important matter.Transferred data must be kept secured from unauthorized persons using cryptography.The science of cryptography depends not only on complex mathematical models but also on encryption keys.Amino acid encryption is a promising model for data security.In this paper,we propose an amino acid encryption model with two encryption keys.The first key is generated randomly using the genetic algorithm.The second key is called the protein key which is generated from converting DNA to a protein message.Then,the protein message and the first key are used in the modified Playfair matrix to generate the cypher message.The experimental results show that the proposed model survives against known attacks such as the Brute-force attack and the Ciphertext-only attack.In addition,the proposed model has been tested over different types of characters including white spaces and special characters,as all the data is encoded to 8-bit binary.The performance of the proposed model is compared with other models using encryption time and decryption time.The model also balances all three principles in the CIA triad. 展开更多
关键词 cryptography amino acid genetic algorithm playfair deep learning DNA computing
在线阅读 下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部