Anti-attacks encryption algorithm based on DNA computing and data encryption standard
Data Encryption Standard (DES) is the first 56-bits secret-key standard that is widely used as a symmetric-key 64-bits block encryption/decryption algorithm. Unfortunately, the rapid increase in computing power makes it possible to find the required bits combination of the secret-key in a short time...
| Published in: | Alexandria Engineering Journal |
|---|---|
| Main Authors: | Tarek Hagras, Doaa Salama, Hassan Youness |
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2022-12-01
|
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S1110016822003519 |
Similar Items
Comparative Analysis of Symmetric Cryptographic Algorithms and Cryptanalysis Methods Through a Practical Software Tool for Educational Purposes
by: Diyan Dinev, et al.
Published: (2025-08-01)
by: Diyan Dinev, et al.
Published: (2025-08-01)
Evaluation of Rijndael Algorithm for Audio Encryption by Brute Force Attack
by: Sajaa G. Mohammed, et al.
Published: (2024-11-01)
by: Sajaa G. Mohammed, et al.
Published: (2024-11-01)
Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher
by: Parveiz Nazir Lone, et al.
Published: (2022-10-01)
by: Parveiz Nazir Lone, et al.
Published: (2022-10-01)
A novel Cosine-Cosine chaotic map-based video encryption scheme
by: Sweta Kumari, et al.
Published: (2024-02-01)
by: Sweta Kumari, et al.
Published: (2024-02-01)
Quantum‐resistant anonymous identity‐based encryption with trable identities
by: Zi‐Yuan Liu, et al.
Published: (2022-03-01)
by: Zi‐Yuan Liu, et al.
Published: (2022-03-01)
A Lightweight Symmetric DNA Encryption Algorithm Inspired by Protein Synthesis (SDEAP) for IoT Devices
by: DJAA, D., et al.
Published: (2025-02-01)
by: DJAA, D., et al.
Published: (2025-02-01)
A New Symmetric Digital Video Encryption Model
by: Kordov Krasimir, et al.
Published: (2021-03-01)
by: Kordov Krasimir, et al.
Published: (2021-03-01)
Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis
by: Kamil Dworak, et al.
Published: (2021-12-01)
by: Kamil Dworak, et al.
Published: (2021-12-01)
IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS
by: Nataliia Lada, et al.
Published: (2022-06-01)
by: Nataliia Lada, et al.
Published: (2022-06-01)
Arabic Text Encryption Using Artificial Neural Networks
by: Oday Kamil Hamid
Published: (2016-05-01)
by: Oday Kamil Hamid
Published: (2016-05-01)
Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm
by: Bart Preneel, et al.
Published: (2005-07-01)
by: Bart Preneel, et al.
Published: (2005-07-01)
COMPARATIVE STUDY OF CHAOTIC SYSTEM FOR ENCRYPTION
by: Doaa S. Salman, et al.
Published: (2023-12-01)
by: Doaa S. Salman, et al.
Published: (2023-12-01)
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification
by: Jiakai Hao, et al.
Published: (2025-04-01)
by: Jiakai Hao, et al.
Published: (2025-04-01)
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures
by: S. Nandhini, et al.
Published: (2024-12-01)
by: S. Nandhini, et al.
Published: (2024-12-01)
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
by: Guillaume Endignoux, et al.
Published: (2017-02-01)
by: Guillaume Endignoux, et al.
Published: (2017-02-01)
Honey Encryption Security Techniques: A Review Paper
by: Ammar Gharbi, et al.
Published: (2022-06-01)
by: Ammar Gharbi, et al.
Published: (2022-06-01)
An optimized novel lightweight block cipher for image encryption
by: R. Mohanapriya, et al.
Published: (2025-10-01)
by: R. Mohanapriya, et al.
Published: (2025-10-01)
Quantum Automated Tools for Finding Impossible Differentials
by: Huiqin Xie, et al.
Published: (2024-08-01)
by: Huiqin Xie, et al.
Published: (2024-08-01)
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
by: salim Qadir Mohammed
Published: (2022-03-01)
by: salim Qadir Mohammed
Published: (2022-03-01)
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
by: salim Qadir Mohammed
Published: (2022-03-01)
by: salim Qadir Mohammed
Published: (2022-03-01)
Revocable identity‐based matchmaking encryption in the standard model
by: Zhe Jiang, et al.
Published: (2023-07-01)
by: Zhe Jiang, et al.
Published: (2023-07-01)
Cryptanalysis and Improvement of the Hyper-Chaotic Image Encryption Scheme Based on DNA Encoding and Scrambling
by: Wei Feng, et al.
Published: (2018-01-01)
by: Wei Feng, et al.
Published: (2018-01-01)
Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard
by: Kanshi Avaneesh, et al.
Published: (2023-11-01)
by: Kanshi Avaneesh, et al.
Published: (2023-11-01)
Attacking Pairing-Free Attribute-Based Encryption Schemes
by: Javier Herranz
Published: (2020-01-01)
by: Javier Herranz
Published: (2020-01-01)
Fault attacks on authenticated encryption modes for GIFT
by: Shuai Liu, et al.
Published: (2022-01-01)
by: Shuai Liu, et al.
Published: (2022-01-01)
Development and Study of an Encryption Algorithm
by: Nursulu Kapalova, et al.
Published: (2022-11-01)
by: Nursulu Kapalova, et al.
Published: (2022-11-01)
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
by: Enas Tariq Khudair, et al.
Published: (2022-12-01)
by: Enas Tariq Khudair, et al.
Published: (2022-12-01)
An attack on disguised elliptic curves
by: Morales David J. Mireles
Published: (2008-04-01)
by: Morales David J. Mireles
Published: (2008-04-01)
Quantum Image Encryption Using a Self-Adaptive Hash Function-Controlled Chaotic Map (SAHF-CCM)
by: Roayat Ismail Abdelfatah
Published: (2022-01-01)
by: Roayat Ismail Abdelfatah
Published: (2022-01-01)
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
by: Melissa Azouaoui, et al.
Published: (2022-08-01)
by: Melissa Azouaoui, et al.
Published: (2022-08-01)
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
by: Melissa Azouaoui, et al.
Published: (2022-08-01)
by: Melissa Azouaoui, et al.
Published: (2022-08-01)
A Comparative Study Between Two Cybersecurity Attacks: Brute Force and Dictionary Attacks
by: Nabaa Alaa, et al.
Published: (2024-08-01)
by: Nabaa Alaa, et al.
Published: (2024-08-01)
Medical Image Encryption Through Chaotic Asymmetric Cryptosystem
by: Tutu Raja Ningthoukhongjam, et al.
Published: (2024-01-01)
by: Tutu Raja Ningthoukhongjam, et al.
Published: (2024-01-01)
The signal to noise ratio in the differential cryptanalysis of 9 rounds of data encryption standard
by: Michał Misztal
Published: (2006-09-01)
by: Michał Misztal
Published: (2006-09-01)
USING WEBPAGES AS CRYPTOGRAPHIC KEYS IN A ONE-TIME PAD SYSTEM
by: Farman MAMMADOV, et al.
Published: (2023-04-01)
by: Farman MAMMADOV, et al.
Published: (2023-04-01)
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
by: Prasanna Ravi, et al.
Published: (2024-03-01)
by: Prasanna Ravi, et al.
Published: (2024-03-01)
Authenticated encryption mode with blocks skipping
by: A. V. Sokolov, et al.
Published: (2021-10-01)
by: A. V. Sokolov, et al.
Published: (2021-10-01)
Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications
by: Basel Halak, et al.
Published: (2022-01-01)
by: Basel Halak, et al.
Published: (2022-01-01)
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
by: Mostafizar Rahman, et al.
Published: (2021-09-01)
by: Mostafizar Rahman, et al.
Published: (2021-09-01)
Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity
by: Igor Baranov
Published: (2025-03-01)
by: Igor Baranov
Published: (2025-03-01)
Similar Items
-
Comparative Analysis of Symmetric Cryptographic Algorithms and Cryptanalysis Methods Through a Practical Software Tool for Educational Purposes
by: Diyan Dinev, et al.
Published: (2025-08-01) -
Evaluation of Rijndael Algorithm for Audio Encryption by Brute Force Attack
by: Sajaa G. Mohammed, et al.
Published: (2024-11-01) -
Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher
by: Parveiz Nazir Lone, et al.
Published: (2022-10-01) -
A novel Cosine-Cosine chaotic map-based video encryption scheme
by: Sweta Kumari, et al.
Published: (2024-02-01) -
Quantum‐resistant anonymous identity‐based encryption with trable identities
by: Zi‐Yuan Liu, et al.
Published: (2022-03-01)
