全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange

DOI: 10.4236/jcc.2024.122012, PP. 201-210

Keywords: Encryption, Decryption, DNA, Paillier Cryptography, Nested Levels, Hybrid Cryptography

Full-Text   Cite this paper   Add to My Lib

Abstract:

Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an exponential manner. Hybrid cryptography provides a better solution than a single type of cryptographical technique. In this paper, nested levels of hybrid cryptographical techniques are investigated with the help of Deoxyribonucleic Acid (DNA) and Paillier cryptographical techniques. In the first level, information will be encrypted by DNA and at the second level, the ciphertext of DNA will be encrypted by Paillier cryptography. At the decryption time, firstly Paillier cryptography will be processed, and then DAN cryptography will be processed to get the original text. The proposed algorithm follows the concept of Last Encryption First Decryption (LEFD) at the time of decryption. The computed results are depicted in terms of tables and graphs.

References

[1]  Kumar, P. and Saxena, V. (2023) Hybrid Cryptography for Security Exchange through AES and Paillier. European Chemical Bulletin, 12, 3913-3921.
[2]  Kumar, A.A. and Jagan, A. (2015, February) Two-Layer Security for Data Storage in Cloud. 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), Greater Noida, 25-27 February 2015, 471-474.
https://doi.org/10.1109/ABLAZE.2015.7155041
[3]  Saxena, R. and Dey, S. (2016) Cloud Audit: A Data Integrity Verification Approach for Cloud Computing. Procedia Computer Science, 89, 142-151.
https://doi.org/10.1016/j.procs.2016.06.024
[4]  Akomolafe, O.P. and Abodunrin, M.O. (2017) A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing. International Journal of Computer Network and Information Security, 9, 53-60.
https://doi.org/10.5815/ijcnis.2017.06.06
[5]  Gandara, R.B., Wang, G. and Utama, D.N. (2018, September) Hybrid Cryptography on Wireless Sensor Network: A Systematic Literature Review. 2018 International Conference on Information Management and Technology (ICIMTech), Jakarta, 3-5 September 2018, 241-245.
https://doi.org/10.1109/ICIMTech.2018.8528147
[6]  Kumar, J. and Saxena, V. (2020) Hybridization of Cryptography for Security of Cloud Data. International Journal of Future Generation Communication and Networking, 13, 4007-4014.
http://sersc.org/journals/index.php/IJFGCN/article/view/34754
[7]  El-Douh, A.A.R., Lu, S.F., Elkony, A. and Amein, A.S. (2022, March) A Systematic Literature Review: The Taxonomy of Hybrid Cryptography Models. In: Arai, K., Ed., Future of Information and Communication Conference: Advances in Information and Communication, Vol. 439, Springer, Cham, 714-721.
https://doi.org/10.1007/978-3-030-98015-3_49
[8]  Hazra, A., Ghosh, S. and Jash, S. (2018) A Review on DNA Based Cryptographic Techniques. International Journal of Network Security, 20, 1093-1104.
[9]  Abdullah, N.A.N., Zakaria, N.H., Ab Halim, A.H., Ridzuan, F.H.M., Ahmad, A., Seman, K. and Ariffin, S. (2022) A Theoretical Comparative Analysis of DNA Techniques Used in DNA Based Cryptography. Journal of Sustainability Science and Management, 17, 165-178.
https://doi.org/10.46754/jssm.2022.05.014
[10]  Hammad, B.T., Sagheer, A.M., Ahmed, I.T. and Jamil, N. (2020) A Comparative Review on Symmetric and Asymmetric DNA-Based Cryptography. Bulletin of Electrical Engineering and Informatics, 9, 2484-2491.
https://doi.org/10.11591/eei.v9i6.2470
[11]  Sohal, M. and Sharma, S. (2022) BDNA-A DNA Inspired Symmetric Key Cryptographic Technique to Secure Cloud Computing. Journal of King Saud University-Computer and Information Sciences, 34, 1417-1425.
https://doi.org/10.1016/j.jksuci.2018.09.024
[12]  Khobzaoui, A., Benyahia, K., Mansouri, B. and Boukli-Hacene, S. (2022) DNA-Based Cryptographic Method for the Internet of Things. International Journal of Organizational and Collective Intelligence (IJOCI), 12, 1-12.
https://doi.org/10.4018/IJOCI.2022010101
[13]  Mukherjee, P., Garg, H., Pradhan, C., Ghosh, S., Chowdhury, S. and Srivastava, G. (2022) Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach. Sensors, 22, Article 7332.
https://doi.org/10.3390/s22197332
[14]  Poriye, M. and Upadhyaya, S. (2023) A DNA Based Framework for Securing Information Using Asymmetric Encryption. Wireless Personal Communications, 129, 1717-1733.
https://doi.org/10.1007/s11277-023-10203-y
[15]  Seth, B., Dalal, S., Le, D.N., Jaglan, V., Dahiya, N., Agrawal, A., et al. (2021) Secure Cloud Data Storage System Using Hybrid Paillier-Blowfish Algorithm. Computers, Materials and Continua, 67, 779-798.
https://doi.org/10.32604/cmc.2021.014466
[16]  Koundinya, A.K. and SK, G. (2021) Two-Layer Encryption Based on Paillier and Elgamal Cryptosystem for Privacy Violation. International Journal of Wireless and Microwave Technologies, 11, 9-15.
https://doi.org/10.5815/ijwmt.2021.03.02
[17]  Munjal, K. and Bhatia, R. (2022) Analysing RSA and PAILLIER Homomorphic Property for Security in Cloud. Procedia Computer Science, 215, 240-246.
https://doi.org/10.1016/j.procs.2022.12.027
[18]  Kumar, P.S., Nikhil, N.G.S., Vikram, N.R. and Deepa, R. (2022) Improving Security in Cloud Data Using Paillier Homomorphic Encryption System. In Tiwari, S., Trivedi, M.C., Kolhe, M.L. and Singh, B.K., Eds., Advances in Data and Information Sciences, Springer, Singapore City, 59-69.
https://doi.org/10.1007/978-981-19-5292-0_6
[19]  Asiedu, D. and MuminSalifu, A. (2022) Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number System. International Journal on Cryptography and Information Security (IJCIS), 12, 1-13.
https://doi.org/10.5121/ijcis.2022.12101
[20]  Kumar, P., Saxena V. and Singh, K.V. (2023) Analysis of Hybrid Cryptography for Secure Exchange of Information. International Journal of Computer Applications, 185, 37-42.
https://doi.org/10.5120/ijca2023922701
[21]  Saxena, V. and Kumar, P. (2023) Secure Transaction of Digital Currency through Fuzzy Based Cryptography. Indian Journal of Science and Technology, 16, 3148-3158.
https://doi.org/10.17485/IJST/v16i37.1453
[22]  Yadav, V. and Kumar, M. (2023, January) A Hybrid Cryptography Approach Using Symmetric, Asymmetric and DNA Based Encryption. 2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT), Jaipur, 19-20 January 2023, 1-5.
https://doi.org/10.1109/ICCT56969.2023.10076124

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413