An Overview and Analysis of Private and Public Key DNA Cryptography
Journal Title: The International Journal of Technological Exploration and Learning - Year 2013, Vol 2, Issue 6
Abstract
with the growth of technological advancements, the threats dealt by a user grow exponentially. Hence security has become a critical issue in data storage and transmission. As traditional cryptographic systems are now vulnerable to attacks, the concept of using DNA Cryptography has been identified as a possible technology that brings forward a new hope for unbreakable algorithms. This paper analyzes the different approaches on DNA based Cryptography.
Authors and Affiliations
K. Sireesha| Assistant Professor Department of Computer Science & Engineering K L University, Green Fields, Vaddeswaram Guntur District, Andhra Pradesh, V. Srujana| Assistant Professor Department of Computer Science & Engineering K L University, Green Fields, Vaddeswaram Guntur District, Andhra Pradesh
Anonymity Protection in MANETs By Zone Partitioning
Anonymous routing protocols play a vital role in MANETs in order to provide secure communications by concealing the identity of the nodes and avoiding traffic analysis assail from exterior observers. So, my project f...
Anomaly Based Intrusion Detection using Feature Relevance and Negative Selection Algorithm
With the increase in the use of internet, the job of malicious people has been made easy to exploit vulnerabilities in existing system. Intrusion Detection System (IDS) plays a major role in computer/network security...
Implementation of a Capacitor Less Low Dropout Voltage Regulator on Chip (SOC)
In this paper we have implemented a linear voltage low drop out regulator for efficient power management considering the fact in mind that voltage regulators provide a constant voltage supply to the circuits. We repla...
A Suitable Framework for Quality Assurance in Distance Education in Developing Countries
Though the concept of Quality Assurance(QA) in Education is relatively new some guidelines are already in place. With the new concepts of education dissemination the need of newer effective QA methodologies are eviden...
Ship Detection with Wireless Sensor Network
The main aim of this work is an Intrusion detection on the sea which is a critical surveillance problem for harbor protection, border security, and also the protection of business facilities, such as oil platforms and...