A Novel DNA Encryption Technique Using Efficient Key Generation Method For Secure Data
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
Information innovation is creating orderly, meanwhile security of information is genuine concern. There are diverse customers and affiliations who need to keep their vital data from attackers and software engineers. Diverse cryptographic systems are made in past years. Another field of cryptography is ascending in perspective of DNA figuring on account of high stockpiling cut-off, limitless parallelism and phenomenal vitality capability of natural DNA. This field is in starting stage so an extensive measure of investigation must be done yet. In this we are showing a DNA encryption methodology in light of cross section control and secure key time arrangement.
Authors and Affiliations
Mrs. Ardhani Siva Sravanthi| Dept. of CSE, Kakinada Institute of Engineering and Technology for women, Kakinada, S. Sushma| Dept. of CSE, Kakinada Institute of Engineering and Technology for women, Kakinada
Green Approach To Corrosion Inhibition Of Aluminium By Senna Auriculata Leaves Extract In 1 N NaOH Solution
Corrosion inhibition of aluminium in 1N NaOH by leaves extract of Senna auriculata (SL) was studied using chemical and electrochemical techniques at 30-60ï‚°C. It was found that the leaves of Senna auriculata inhibit...
A Novel Image Annotation Method Using Tag Ranking System
Number of mechanized images are growing which are open in online media for picture matching and recuperation picture clarification applications are having influence. Yet existing strategies like substance based pictu...
A Secure Protocol for M-commerce Secure SMS Mobile Payment
The worldwide utilization of the Internet has profoundly supplied the development of e-commerce. Technological advancement in mobile phones (e.g. Mobile phones) has likewise added to doing ecommerce by means of mobile...
Study on Remote File Attacking – Inclusion & Detection
Presently applications of web are increasing exponentially. We are almost totally dependent on Internet and associated technologies. Huge applications in all walk of lives are inviting attacks on them. Their usage are...
A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice
DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks throug...