About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sis 24(5):

Editorial

A Realizable Data Encryption Strategy

Download70 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eetsis.5230,
        author={Pranjali  and Srividya Ramisetty and Vani B Telagade and S Disha Adiga},
        title={A Realizable Data Encryption Strategy},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={11},
        number={5},
        publisher={EAI},
        journal_a={SIS},
        year={2024},
        month={2},
        keywords={Cryptography, DNA, RDES, Encryption, Decryption},
        doi={10.4108/eetsis.5230}
    }
    
  • Pranjali
    Srividya Ramisetty
    Vani B Telagade
    S Disha Adiga
    Year: 2024
    A Realizable Data Encryption Strategy
    SIS
    EAI
    DOI: 10.4108/eetsis.5230
Pranjali 1, Srividya Ramisetty1,*, Vani B Telagade1, S Disha Adiga1
  • 1: CMR Institute of Technology
*Contact email: srividya.ramisetty@gmail.com

Abstract

As technology continues to advance, data has become an increasingly important element in the sphere of Information Technology. However, enormous data generated by devices presents a major challenge in handling it in real time. Data encryption is a crucial component in ensuring data security and privacy during its transmission in network. Unfortunately, many applications disregard data encryption in order to achieve higher performance. The work proposes a solution to this problem by introducing a data encryption process that is, the Realizable Data Encryption Strategy (RDES) and Deoxyribonucleic Acid (DNA) computing, a revolutionary cryptographic method that improves information security by preventing authorized access to sensitive data, being used. Information security is improved by DNA symmetric cryptography being suggested. The outcomes show that plain-text encryption is a very secure procedure. The RDES approach is designed to improve privacy protection within the constraints of real-time processing. By implementing the RDES approach, data privacy and security can be significantly enhanced without compromising performance.

Keywords
Cryptography, DNA, RDES, Encryption, Decryption
Received
2023-12-05
Accepted
2024-02-22
Published
2024-02-28
Publisher
EAI
http://dx.doi.org/10.4108/eetsis.5230

Copyright © 2024 Pranjali et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL