Securing data means taking protective digital privacy measures that are implemented to prevent unauthorized access to any kind of digital information’s shared over the communication network. In this paper, we have proposed a technique, how an individual user can protect their data’s which is shared over the communication network. One of the principal challenges of data sharing on the data communication network is its security. This is revolving around the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. Cryptography provides functionality for the encryption of data, and authentication of other users. The cryptographic methodologies are one of the popular ways of achieving data security by encrypting the messages to make them nonreadable. There are many cryptographic techniques available and it is an essential information security tool. It provides the four most basic benefits – Confidentiality, Authentication, Data Integrity and Non-repudiation. Nowadays the security of communication is a crucial issue over the internet and cryptography has come up as a saviour of this problem. In modern cryptography, it operates on binary bit sequences and it secures communication to possess the secret key only.
Prasanna satheesh (2021). DNA crytography with encoding and decoding text message (https://www.mathworks.com/matlabcentral/fileexchange/68817-dna-crytography-with-encoding-and-decoding-text-message), MATLAB Central File Exchange. Retrieved .
Hi Mariya Jomet, Thank you for your appreciation. I am giving you the base paper details here. Please go through it, Thank you.
A Novel Encryption Model for Text Messages using Delayed Chaotic Neural Network and DNA Cryptography
1Sudipta Singha Roy, 2Shaikh Akib Shahriyar, 2Md. Asaf-Uddowla, 2Kazi Md. Rokibul Alam, 3Yasuhiko Morimoto 1Institute of Information and Communication Technology, Khulna University of Engineering & Technology [e-mail: firstname.lastname@example.org] 2Department of Computer Science and Engineering, Khulna University of Engineering & Technology [e-mail: email@example.com, firstname.lastname@example.org, email@example.com] 3Graduate School of Engineering, Hiroshima University, Higashi-Hiroshima 739-8521, Japan [e-mail: firstname.lastname@example.org]
Hi Prasanna satheesh, Good work. Thank you for sharing this. can I get some details about the codes? I am doing a project on data security field. it would be really helpful if you share the base paper link here so that anyone can acquire idea about the code you prepared. Thank you
Find the treasures in MATLAB Central and discover how the community can help you!Start Hunting!