A Novel DNA Encryption Technique Using Efficient Key Generation Method For Secure Data
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
Information innovation is creating orderly, meanwhile security of information is genuine concern. There are diverse customers and affiliations who need to keep their vital data from attackers and software engineers. Diverse cryptographic systems are made in past years. Another field of cryptography is ascending in perspective of DNA figuring on account of high stockpiling cut-off, limitless parallelism and phenomenal vitality capability of natural DNA. This field is in starting stage so an extensive measure of investigation must be done yet. In this we are showing a DNA encryption methodology in light of cross section control and secure key time arrangement.
Authors and Affiliations
Mrs. Ardhani Siva Sravanthi| Dept. of CSE, Kakinada Institute of Engineering and Technology for women, Kakinada, S. Sushma| Dept. of CSE, Kakinada Institute of Engineering and Technology for women, Kakinada
STUDY OF MECHANISM USED FOR AUTOMATING THE MECHANICAL SYSTEM
Automation will no longer be seen only as automatic production, but as a complex of technologies that guarantee reliability, flexibility, safety, for humans as well as for the environment. In a world of limited resou...
A Novel Attack Graph Approach For Attack Detection And Prevention Using Nice
DDoS attacks usually take up early stage actions such as multi-step exploitation, low frequency vulnerability scanning and compromising identified vulnerable virtual machines as zombies and lastly DDoS attacks throug...
We have considered the issue of best k high utility itemsets mining, where k is the coveted number of high utility itemsets to be mined. Two effective calculations TKU (mining Top-K Utility itemsets) and TKO (mining...
Deduplication Systems Using The Ramp Secret Sharing Scheme
Deduplication systems are ensured as far as the definitions specific in the security display, document level deduplication, which discover redundancies flanked by various records and take these redundancies to declin...
A NEW EXTENSIBLE KEY EXCHANGE SCHEME FOR WIRELESS SENSOR NETWORKS
A sensor network is confident of a large number of sensor nodes Sensor nodes are small, low-cost, low-power devices that have following performance communicate on short distances sense environmental data perform limi...