Security News > 2021 > July > Enhancing cloud security with a two-step cryptography technique
While there are many different encryption techniques, none are completely secure, and the search continues for new technologies that can counter the rising threats to data privacy and security.
In a recent study published in KeAi's International Journal of Intelligent Networks, a team of researchers from India and Yemen describe a novel, two-step cryptography technique - the first to combine genetic technology with mathematical technique.
The paper's corresponding author, Fursan Thabit of Swami Ramanand Teerth Marathwada University in India, explains: "Some existing famous ciphers use the Feistel structure for encryption and decryption. Others use the Network SP. The first level of our encryption uses a logical-mathematical function inspired by a combination of the two. Not only does it improve the complexity of the encryption, it also increases energy efficiency by reducing the number of encryption rounds required."
The researchers' second encryption layer is inspired by structures of genetics techniques based on the Central Dogma of Molecular Biology.
Thabit adds: "We are the first to mix the DNA, RNA and genetics techniques for a cryptographic purpose and the first to combine the technique of genetic encryption with mathematics to generate a complex key."
Computational and processing strength complexity is reduced due to the algorithm's clear structure - two layers of encryption containing only four rounds of coding.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/DTbRGsPF6eY/
Related news
- Reducing the cloud security overhead (source)
- Harnessing the Power of CTEM for Cloud Security (source)
- Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI (source)
- Exposing the top cloud security threats (source)
- The first steps of establishing your cloud security strategy (source)
- eBook: Cloud security skills (source)
- Leveraging AI and automation for enhanced cloud communication security (source)
- Breakthrough in Quantum Cloud Computing Ensures its Security and Privacy (source)
- Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity (source)