What is it about?

This article has proposed an algorithm whose execution time is not dependent on data size as has been identified in other state of the art algorithms but dependent on the secret key generated. This makes NCS a non-deterministic scheme making it difficult for any hacker to predict the trend of the execution time.

Featured Image

Why is it important?

This is to make it difficult for any hacker to predict the execution time of any data to be transferred to the cloud as a result ensuring the confidentiality and privacy of data. This also helps to reduce tear and wear of devices at the client side and the providers end.

Perspectives

This is a novel and most efficient lightweight symmetric non linear algorithm. This is the only algorithm as of now with non-deterministic, unpredictable execution time.

JOHN KWAO DAWSON
Sunyani Technical University

Read the Original

This page is a summary of: Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme, PLoS ONE, February 2023, PLOS,
DOI: 10.1371/journal.pone.0274628.
You can read the full text:

Read
Open access logo

Resources

Contributors

The following have contributed to this page