"New Two-Step Algorithm Could Prove 'a Paradigm Shift' in Cloud Data Confidentiality"
Although cloud computing provides fast, easy-to-use computing and inexpensive data storage services, the cloud environment does come with data confidentiality risks. Cryptography is a mathematical technique that strengthens cloud computing security by encrypting stored or transmitted data. There is a variety of encryption techniques to apply, but none are 100 percent secure. A team of researchers from Yemen and India described a novel, two-step cryptography technique in a recent study shared in KeAi's International Journal of Intelligent Networks. This technique is said to be the first to combine genetic technology with mathematical techniques. According to the researchers, their proposed algorithm creates a complex cryptographic environment with a high level of security and flexibility, which could lead to a paradigm shift in data confidentiality. The researchers evaluated their algorithm's robustness by measuring encryption time, decryption time, throughput, and cipher-text length. In comparison with other genetic encryption techniques and existing symmetric key encryption techniques, the new proposed algorithm has high security strength and better flexibility. Their algorithm requires relatively less time than other techniques. The algorithm's clear structure, which includes two layers of encryption containing only four coding rounds, also reduces computational and processing strength complexity. This article continues to discuss the proposed two-step cryptography method that combines genetic technology with mathematical techniques.
KeAi reports "New Two-Step Algorithm Could Prove 'a Paradigm Shift' in Cloud Data Confidentiality"