• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Saturday, May 24, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

New two-step algorithm could prove “a paradigm shift” in cloud data confidentiality

Bioengineer by Bioengineer
June 24, 2021
in Science News
Reading Time: 3 mins read
0
ADVERTISEMENT
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

IMAGE

Credit: The author, Fursan Thabit, from the conceptual security framework project.

The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data confidentiality risks attached.

Cryptography is the primary tool used to enhance the security of cloud computing. This mathematical technique protects the stored or transmitted data by encrypting it, so that it can only be understood by intended recipients. While there are many different encryption techniques, none are completely secure, and the search continues for new technologies that can counter the rising threats to data privacy and security.

In a recent study published in KeAi’s International Journal of Intelligent Networks, a team of researchers from India and Yemen describe a novel, two-step cryptography technique – the first to combine genetic technology with mathematical technique. According to the paper’s authors, it generates a complex cryptographic environment with high security and flexibility that could spark a paradigm shift in data confidentiality.

The paper’s corresponding author, Fursan Thabit of Swami Ramanand Teerth Marathwada University in India, explains: “Some existing famous ciphers use the Feistel structure for encryption and decryption. Others use the Network SP (Substitution-Permutation). The first level of our encryption uses a logical-mathematical function inspired by a combination of the two. Not only does it improve the complexity of the encryption, it also increases energy efficiency by reducing the number of encryption rounds required.”

The researchers’ second encryption layer is inspired by structures of genetics techniques based on the Central Dogma of Molecular Biology (CDMB). It simulates the natural processes of genetic coding (translation from binary to DNA bases), transcription (regeneration from DNA to mRNA), and translation (regeneration from mRNA to protein).

Thabit adds: “We are the first to mix the DNA, RNA and genetics techniques for a cryptographic purpose and the first to combine the technique of genetic encryption with mathematics to generate a complex key.”

The researchers evaluated the robustness of their new algorithm by measuring encryption time, decryption time, throughput and the length of the cipher-text produced. They found that compared with other genetics encryption techniques and existing symmetric key encryption techniques, their proposed algorithm has high-security strength and is very flexible. It also requires relatively less time than other techniques. In addition, computational and processing strength complexity is reduced due to the algorithm’s clear structure – two layers of encryption containing only four rounds of coding.

Thabit explains: “That clear structure means each round requires only simple math and a genetics simulation process.”

He adds: “We found our proposed encryption scheme is safe for brute force, known plain-text attacks, encrypted text only, and differential cryptanalysis attacks. It has been tested on various data, including whitespace and special characters and it meets the CIA’s principle (Confidentiality, Data integrity, Availability).”

###

Contact the corresponding author: Fursan Thabit, [email protected] (Twitter: https://twitter.com/FursanDr | LinkedIn: https://www.linkedin.com/in/fursan-thabit-709350196/)

The publisher KeAi was established by Elsevier and China Science Publishing & Media Ltd to unfold quality research globally. In 2013, our focus shifted to open access publishing. We now proudly publish more than 100 world-class, open access, English language journals, spanning all scientific disciplines. Many of these are titles we publish in partnership with prestigious societies and academic institutions, such as the National Natural Science Foundation of China (NSFC).

Media Contact
Cassie He
[email protected]

Related Journal Article

http://dx.doi.org/10.1016/j.ijin.2021.03.001

Tags: InternetMultimedia/Networking/Interface DesignResearch/DevelopmentSoftware EngineeringSystem Security/HackersTechnology/Engineering/Computer Science
Share12Tweet8Share2ShareShareShare2

Related Posts

JAK1/2 Inhibition Fights MPNs Without Blocking Oncogenes

JAK1/2 Inhibition Fights MPNs Without Blocking Oncogenes

May 24, 2025
blank

HSK21542 Eases Postoperative Pain: Two Phase 3 Trials

May 24, 2025

hnRNPL Drives PIK3CB Activation, Boosts Ovarian Cancer Glycolysis

May 24, 2025

Shaking Disrupts Stem Cell Clocks via TEAD Pathway

May 24, 2025
Please login to join discussion

POPULAR NEWS

  • Effects of a natural ingredients-based intervention targeting the hallmarks of aging on epigenetic clocks, physical function, and body composition: a single-arm clinical trial

    Natural Supplement Shows Potential to Slow Biological Aging and Enhance Muscle Strength

    92 shares
    Share 37 Tweet 23
  • Analysis of Research Grant Terminations at the National Institutes of Health

    79 shares
    Share 32 Tweet 20
  • Health Octo Tool Links Personalized Health, Aging Rate

    68 shares
    Share 27 Tweet 17
  • Universe Fades Faster Than Expected—Yet Still Over Vast Timescales

    55 shares
    Share 22 Tweet 14

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

JAK1/2 Inhibition Fights MPNs Without Blocking Oncogenes

HSK21542 Eases Postoperative Pain: Two Phase 3 Trials

hnRNPL Drives PIK3CB Activation, Boosts Ovarian Cancer Glycolysis

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.