Cloud computing aims to ensure rapid, convenient, and cost-effective computation and storage of data. However, data confidentiality problems arise in the cloud context.
Cryptography is the key method to enhance the security of cloud computing. By encrypting the stored or transferred data, this mathematical technique protects the data, so that only the desired beneficiaries may comprehend it. No encryption solutions are fully secure while a wide range of solutions are available and new technologies continue to be searched to address the increasing risks to privacy and security.
Understanding the Two-step Cryptography technique
A team of researchers from India and Yemen describing the new, two-step cryptography technique, which is the first to merge genetic technologies with mathematical techniques, in a recent report published in the KeAis International Journal of Intelligent Networks. The authors of the research suggest that it creates a very safe and flexible, yet complicated encryption environment that could induce a confidentiality shift.
The Feistel structure is used by some well-known ciphers to encode and decrypt it. The corresponding author, Fursan Thabit from Swami Ramanand Teerth Marathwada University in India, explains the paper, “ The SP network is also used by others (Substitution-Permutation). The first level of our encryption uses a function of logical mathematics inspired by a combination of both. It not only improves encryption difficulty but also improves energy efficiency through a reduction in the number of encryption rounds necessary.”
The second encryption layer of the researchers is inspired by genetic structures based on the central dogma of molecular biology (CDMB). It replicates the natural processes of genetic coding, (translation from binary to DNA bases), transcription (regeneration from DNA to mRNA), and translation (regeneration from mRNA to protein).
Thabit says: “We are the first to integrate genetic engraving technology with mathematics to build a complex key and the first to use DNA, RNA, and genetics procedures to achieve a cryptographic objective.”
Assessing the new algorithm for its robustness
By assessing the encryption time, decryption time, and performance of the cipher-text produced, the researchers evaluated the strength of their novel technique. They observed that their suggested algorithm has high safety strength and is extremely adaptable compared to other genetic encryption approaches and the existing symmetric key encryption techniques. It also takes less time than other approaches.
Furthermore, due to the obvious method structure – two encryption layers that contain just four coding rounds – the computing and processing strength complexity is minimized.
“This obvious framework means that each cycle will simply require simple math and a simulation technique of biology,” Thabit explains.
“We observed that our suggested cryptographic system is safe to use for brute forces, common-law attacks, encrypted text only, and assaults of differential cryptanalysis. Data, including whitespace and certain characters, have been tested and comply with the CIA principle (Confidentiality, Data Integrity, Availability).”
To read more, please check eScan Blog