Online ISSN: 2515-8260

Keywords : cryptography


A refined Algorithm for using Pattern with Variable Length by using the existing pattern matching

Kuljinder Singh Bumrah; Himani Sivaraman; Dr. Sandeep Budhani

European Journal of Molecular & Clinical Medicine, 2021, Volume 8, Issue 3, Pages 1081-1084

It has been observe in past years that the academics have instigated string matching algorithms in several turfs to extract and find the undisclosed key RSA algorithm or any other encryption method for discovering the intruder or malicious pattern in imposition detection system , the DNA matching, carbon chain matching . This article has a signified aim to analyse ,suggest and attain an algorithm which is classified for discrete pattern matching in different mode and moreover more efficiently and effectively. It has been designed for any pattern or type of string whether a character string , decimal value , wild character or any special symbol using your ASCII value.

A REVIEW ARTICLE ON CRYPTOGRAPHY USING FUNCTIONAL PROGRAMMING:HASKELL

Dikchha Dwivedi; Hari Om Sharan

European Journal of Molecular & Clinical Medicine, 2021, Volume 8, Issue 2, Pages 2098-2110

A modern wave of programming technology has been at the frontline of functional languages, experiencing growing success as well as impact. Hughes published an article entitled 'Why Functional Programming Matters', that has now been one of the most recent references in the field.Safe programming defines the method used by software engineers to include multiple safety mechanism for their system.Secure programming can be broken down into two subgroups to analyse its correlation with software design: access control, secure programme initialization, input validation, cryptography, secure networking, secure random number generation, and anti-tampering. In this paper we provide a review of various functional programming in Haskell for encryption. The inkling of functional programming is to make programming more closely related to mathematics. We describe crucial features and trade-offs that has to be well-thought-out while selecting the right method for secure computation

Data Hiding Using Deoxyribonucleic Acid (DNA) Computing With Morse Code Cryptosystem

B. Adithya; G. Santhi

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 10, Pages 1719-1725

In this paper, DNA computing with Morse code encoding is proposed to bulwark the delicate information within the challenging environment. The plaintext is changed over to DNA sequences utilizing encoding table. Presently, the encoded information is transcript and translated by the RNA arrangements. Translated RNA is stego by the standard genetic code utilizing organic compounds, and the stego DNA is ciphered by Morse code pattern. The designed bio analysis and results show that the hiding capacity is high, and the execution time is less when compared to the current techniques like AES, RSA, DNA based Playfair cipher and Vigenere cipher.

A SURVEY ON CRYPTOGRAPHIC ALGORITHM FOR DATA SECURITY IN CLOUD STORAGE ENVIRONMENT

B. UMAPATHY; DR. G. KALPANA

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 9, Pages 1602-1620

People are using lot of cloud storage service (CSs) to store documents. The cloud storage
services are used to conserve people personal data and facilitate data transferable. The
computer which connected via internet is adequate to access the data anywhere without
carrying any physical drives like Pen drive, CD, etc. In existing techniques like, CSs providers
are using 256-bit Advanced Encryption Standard (AES) and 128-bit (AES) encryption
algorithm. This is one of the best techniques to secure data, but once the intruder gets
encrypted data, there is possibility for data insecurity by means of applying brute force
attacking technique in future increasing the speed performance of computer. The objective of
this paper to analysis cryptographic algorithm which perfume on various data formats and
data security attacks and threads in cloud storage environment. The aim to overcome this kind
of attacks and key tampering technique, the key generation and maintain process handover to
user’s itself. It makes cloud storage service provider to maintain data only, with high efficientencryption technique that provides strong protection for data.

Enhancement of Big Data Security in Cloud Environment

Anshi Singh; Anjani Rai

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 59-63

In this research, the advanced encryption mechanism is discussed to secure big data in cloud computing. The services of Cloud computing are used on broad level because these services are Platform independent. Cloud computing eliminates the need to set specific software on system of user. To improve the security of cloud, the concept of Advanced Encryption Standard (AES) with Intrusion Detection System (IDS) method is integrated here. It is capable to offer the protection according to demands. It also enlarges the overall time period of the network. It is made to decrease the power utilization by the node. For optimum the local node network is differentiated into little zones. In addition, the algorithm for encoding is mentioned which is used to make encryption with Advanced Encryption Standard (AES).

Prediction of Crypto Currency by Multiple Linear Regressions using Anaconda Software

Anshey Singh; Narendra Mohan

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 76-81

Financial instruments traded in the stock markets attract various categories of investors across the world. The major objective of investment strategy is to minimize the risk and maximize the return and this can be achieved by choosing the right security at an appropriate time will result in loss reduction. The modern day investment alternative across the globe is crypto currency. A crypto currency is digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets. However, cryptocurrency are highly volatile due to their supply and demand factors as they are been designed to have a high degree of non availability. Hence, it is important to have a bitcoins price prediction model that can predict the bitcoins total supply value. In this paper, a multiple linear regression model for predicting the bitcoins total supply is proposed. The change in bitcoins total supply for definite time intervals like total supply per an hour, a day and a week were input for developing the linear regression model using the software package ANACONDA. This is significant improvement in comparison to traditional models. In the present scenario there is no such method of predicting the price of bitcoins. The proposed model can be used a decision making technique during the intense situations of bitcoins trading, where human predictions will not make appropriate price predictions. This paper comprises of various sections where the first section describes the introduction to Bitcoins, their importance followed by methodology and the strategy of algorithm applied. The third section describes the processing steps and implementation of algorithm and followed by validation of the project accuracy and efficiency checker.

ASCII KM Discrete Matcher: Enhancement of ASCII KS Discrete Matcher using Pattern with Variable Length

Kuljinder Singh Bumrah, Himani Sivaraman, Dr. Sandeep Budhani

European Journal of Molecular & Clinical Medicine, 2019, Volume 6, Issue 1, Pages 77-80

It has been observe in past years that the academics have instigated string
matching algorithms in several turfs to extract and find the undisclosed key RSA
algorithm or any other encryption method for discovering the intruder or malicious
pattern in imposition detection system , the DNA matching, carbon chain matching .
This article has a signified aim to analyse ,suggest and attain an algorithm which is
classified for discrete pattern matching in different mode and moreover more efficiently
and effectively. It has been designed for any pattern or type of string whether a
character string , decimal value , wild character or any special symbol using your
ASCII value.