2024
DOI: 10.4236/jcc.2024.122012
|View full text |Cite
|
Sign up to set email alerts
|

Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange

Pawan Kumar,
Vipin Saxena

Abstract: Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an exponential manner. Hybrid cryptography provides a better solution than a single type of cryptographical technique. In this paper, nested levels of hybrid cryptographical techniques are investigated with the help of Deoxyribonucleic Acid (DNA) and Paillier cryptographical techniques. In the first level,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 20 publications
3
3
0
Order By: Relevance
“…Thus, the voltage drop in the information transmission channel Δu will be higher than the threshold value when the information transmission voltage u changes in the presence of data leakage. This conclusion is confirmed by the results obtained (calculations using formula (6) and data in Fig. 2), which allows to assert the presence of a data leak in the information transmission channel.…”
Section: Discussion Of the Results Of Developing A Methods For Synthe...supporting
confidence: 81%
See 4 more Smart Citations
“…Thus, the voltage drop in the information transmission channel Δu will be higher than the threshold value when the information transmission voltage u changes in the presence of data leakage. This conclusion is confirmed by the results obtained (calculations using formula (6) and data in Fig. 2), which allows to assert the presence of a data leak in the information transmission channel.…”
Section: Discussion Of the Results Of Developing A Methods For Synthe...supporting
confidence: 81%
“…The identified relationship between the control signs characterizes the presence of a data leak in the information transmission channel. This conclusion is confirmed by the result of applying formula (6) and condition (5) of the proposed method. The obtained result can be explained physically: the presence of data leakage in the information transmission channel leads to a change (decrease) in the voltage (or power) of the information channel.…”
Section: Discussion Of the Results Of Developing A Methods For Synthe...supporting
confidence: 75%
See 3 more Smart Citations