DNA Cryptography Using Helix Scuttle Structures for Cloud Systems (Paperback)

DNA Cryptography Using Helix Scuttle Structures for Cloud Systems By Ansgar Mary N Cover Image

DNA Cryptography Using Helix Scuttle Structures for Cloud Systems (Paperback)


Not On Our Shelves—Ships in 1-5 Days
(This book cannot be returned.)

In this internet world, keeping information and data safe and secure on computers and other storage devices is a major challenge. Cryptography is a powerful tool for safeguarding sensitive data while it's stored on a hard drive being sent over an insecure network connection. Cryptography is used in various applications of technologically advanced societies, such as the security of ATM cards, electronic commerce and computer passwords. The goals of cryptography are data integrity, confidentiality, authentication and non-repudiation. Cryptography involves both encryption and decryption, maintaining the confidentiality of the keys. Another factor to consider is the strength of the key, which determines how difficult it is to break and retrieve the key. Deoxyribonucleic Acid (DNA) cryptography is a new and innovative branch of information security that can be used in integration with traditional cryptographic approaches to improve security.

Cryptography is the science of hiding the meaning of a message by putting it in a secret or code language. It is a technique for preventing unwanted people from accessing data. The encryption technique and key are the two most important components of cryptography. It is used in data communication for sending and receiving messages in a secret form while travelling through the network.

Cryptography is the area that uses arithmetic and logical operations to create powerful encryption methods to secure data and communication over the internet. In today's online business and e-commerce world, confidentiality, availability and integrity of stored and transferred data are crucial. Cryptography is used to protect the data from the third party as well as for user authentication. It is the art of utilising an encryption key to encode secret information in an illegible, concealed format. Decryption with the same secret key retrieves the data in its original form at the receiver end. The encrypted data and the ability to decrypt it are only available to the person who has the secret key. The most important components of any cryptography process are plain data, secret key, encryption algorithm, cipher data and decryption algorithm.

Product Details ISBN: 9798224600021
Publisher: Mohammed Abdul Sattar
Publication Date: January 5th, 2024
Pages: 152
Language: English