Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data

View through CrossRef
With the increasing technological development that has led to the complexity of big data systems, the importance lies in the challenge that ensures the security of sensitive information. Encryption is one of the basic methods used to protect data, hence the importance of the encryption key and its sensitivity, which play a vital role in the strength of encryption. Encryption sensitivity is the simple change in the encryption key that produces a very different encrypted text. This study is concerned with methods of controlling the sensitivity of the encryption key and its effect on the strength of encryption of big data. This context is in line with the nature of cloud data and the focus on the attacks that this data suffers from, such as brute-force attacks and statistical attacks. The research discusses the components that make up the encryption key, logistics maps, and chaos. The results reached by the study proved the merit of the research in terms of accuracy 1015 and appropriate key sensitivity 2128. This study discussed future challenges and the possibility of using artificial intelligence algorithms and adaptive security algorithms and solving quantum encryption problems.
Title: Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
Description:
With the increasing technological development that has led to the complexity of big data systems, the importance lies in the challenge that ensures the security of sensitive information.
Encryption is one of the basic methods used to protect data, hence the importance of the encryption key and its sensitivity, which play a vital role in the strength of encryption.
Encryption sensitivity is the simple change in the encryption key that produces a very different encrypted text.
This study is concerned with methods of controlling the sensitivity of the encryption key and its effect on the strength of encryption of big data.
This context is in line with the nature of cloud data and the focus on the attacks that this data suffers from, such as brute-force attacks and statistical attacks.
The research discusses the components that make up the encryption key, logistics maps, and chaos.
The results reached by the study proved the merit of the research in terms of accuracy 1015 and appropriate key sensitivity 2128.
This study discussed future challenges and the possibility of using artificial intelligence algorithms and adaptive security algorithms and solving quantum encryption problems.

Related Results

RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Assuring encryption and security in cloud infrastructure
Assuring encryption and security in cloud infrastructure
The way organizations work has been totally changed by cloud computing, which gives versatile and reasonable arrangements for designing, implementing and overseeing applications. C...
Improved Structure of Data Encryption Standard Algorithm
Improved Structure of Data Encryption Standard Algorithm
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance...
6D Hyperchaotic Encryption Model for Ensuring Security to 3D Printed Models and Medical Images
6D Hyperchaotic Encryption Model for Ensuring Security to 3D Printed Models and Medical Images
In the 6G era, where ultra-fast and reliable communication is expected to be ubiquitous, encryption shall continue to play a crucial role in ensuring the security and privacy of da...
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve...
Securing Medical Data: The Integration of Advanced Encryption Standard and Blockchain
Securing Medical Data: The Integration of Advanced Encryption Standard and Blockchain
Objective: The research is to ensure the security of medical data and prevent data breaches. To achieve this objective, An efficient solution was proposed - the integration of bloc...

Back to Top