Cryptography Based on DNA Using Random key Generation Scheme
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 7
Abstract
With the growth of technological advancements, the threats dealt by a user grow exponentially. The 21st century is a period of information explosion in which information has become a very important strategic resource, and so the task of information security has become increasingly important in data storage and transmission. As traditional cryptographic systems are now vulnerable to attacks, the concept of using DNA Cryptography has been identified as a possible technology that brings forward a new hope for unbreakable algorithms. A new field of cryptography is emerging based on DNA computing due to high storage capacity, vast parallelism and exceptional energy efficiency of biological DNA. This field is in initial stage so a lot of research has to be done yet. This paper analyzes the different approach on DNA Cryptography based on matrix manipulation and secure key generation scheme.
Authors and Affiliations
P. Surendra Varma| Department of Computer Science and Engineering Srinivasa Institute of Engineering and Technology, Cheyyeru, suren548@gmail.com, K. Govinda Raju| Department of Computer Science and Engineering Srinivasa Institute of Engineering and Technology, Cheyyeru, govindarajukynm@gmail.com
Privacy Policy Detection To Preserve The Confidentiality Of Shared Content In Social Media
Social media influences and control people’s lives where people use social media for various purposes, mainly to exchange information to another person. But, Exchanging information through this enhanced and upgrade...
An Efficient Intrusion-Detection Mechanisms To Protect Manet From Attacks
The self-configuring ability of nodes in MANET absolutes it admired among essential mission applications like military use or emergency recovery. The mobility and scalability carried by wireless network ended it poss...
The Trust and Reputation Systems towards Data for Cloud and Wireless Sensor Networks Integrity
Cloud Computing has powerful data storage and data processing capabilities as well as Wireless sensor network has capability of gathering large amount of data. Presented on by including ordering data storage besides...
Fusing Local Patterns Of Gabor Magnitue For Recognition System
Face recognition is a process of analyzing (or) comparing face with the previously stored face images. Training phase involves the collection of images and checking it for the presence of noise. A testing phase is a...
A Graph theory algorithmic approach to data clustering and its Application
Clustering is the unproven classification of data items, into groups known as clusters. The clustering problem has been discussed in many area of research in many disciplines; this reflects its huge usefulness in the...