A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Hybrid cryptography algorithms in cloud computing: A review

SA Ahmad, AB Garko - 2019 15th International conference on …, 2019 - ieeexplore.ieee.org
it's observed that most people and firms are migrating to the cloud, because the cloud is
much cheaper and convenient. For some computer owners, finding enough storage space to …

A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography

K Jain, P Krishnan, VV Rao - 2021 Fourth International …, 2021 - ieeexplore.ieee.org
Cryptography is the science of encryption and decryption of data using the techniques of
mathematics to achieve secure communication. This enables the user to send the data in an …

Information Theory, Living Systems, and Communication Engineering

D Bajić - Entropy, 2024 - mdpi.com
Mainstream research on information theory within the field of living systems involves the
application of analytical tools to understand a broad range of life processes. This paper is …

KryptosChain—a blockchain-inspired, AI-combined, DNA-encrypted secure information exchange scheme

P Mukherjee, C Pradhan, HK Tripathy, T Gaber - Electronics, 2023 - mdpi.com
Today's digital world necessitates the adoption of encryption techniques to ensure secure
peer-to-peer communication. The sole purpose of this paper is to conglomerate the …

Secure framework for IoT technology based on RSA and DNA cryptography

MM Elamir, MS Mabrouk, SY marzouk - Egyptian Journal of Medical …, 2022 - Springer
Abstract Background The Internet of things (IoT) is the network of different objects or “things”
containing sensors, software, and other technologies used to exchange data between …

[PDF][PDF] A theoretical comparative analysis of DNA techniques used in dna based cryptography

NAN Abdullah, NH Zakaria, AH Ab Halim… - Journal of …, 2022 - jssm.umt.edu.my
Cryptography has been extensively employed in the information security field for the
purpose of providing security for confidential data. The field of cryptography has recently …

An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET

R Chakravorty, J Prakash, A Srivastava - Soft Computing, 2024 - Springer
Today, more than ever, the necessity for remote availability, independent of a client's
location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a …

Hybrid encryption technique: Integrating the neural network with distortion techniques

R Abu Zitar, MJ Al-Muhammed - Plos one, 2022 - journals.plos.org
This paper proposes a hybrid technique for data security. The computational model of the
technique is grounded on both the non-linearity of neural network manipulations and the …

[PDF][PDF] Design and Implementation of a New DNA Based Stream Cipher Algorithm using Python.

KH Rahouma, FM AbdelGhany, LN Mahdy… - Egyptian Computer …, 2020 - ecsjournal.org
This paper proposes a design and implementation of a new DNA-Based stream cipher
algorithm. We implement this algorithm using python language and django framework. The …