DNA AND DNA COMPUTING IN SECURITY
#1

As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future? This paper will outline some of the basics of DNA and DNA computing and its use in the areas of cryptography, steganography and authentication.

Research has been performed in both cryptographic and steganographic situations with respect to DNA computing but researchers are still looking at much more theory than practicality. The constraints of its high tech lab requirements and computational limitations combined with the labour intensive extrapolation means, illustrate that the field of DNA computing is far from any kind of efficient use in today?s security world. DNA authentication on the other hand has exhibited great promise with real world examples already surfacing on the marketplace today.
Reply
#2
plsss send me ppt...Wink
Reply
#3

can any one help me in getting the ppt...... plz.......
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: how connect laptop on wireless mtnl dna a213, windows dna based project, ancestry, dna structure model with thermocol, seminar based on dna finger printing, seminar on dna computing by cochinn cpdtion, dna computing usc,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,507 24-11-2018, 01:19 AM
Last Post:
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,242 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,209 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,923 30-03-2014, 04:40 AM
Last Post: Guest
  Soft Computing seminar surveyer 2 11,156 29-10-2013, 03:50 PM
Last Post: kavitaswami93gmail.com
  Modular Computing seminars report computer science crazy 4 21,526 08-10-2013, 04:32 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 9,926 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 11,851 27-07-2013, 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,624 24-06-2013, 11:44 AM
Last Post: Guest
  self managing computing system full report computer science technology 5 14,147 18-05-2013, 09:48 AM
Last Post: computer topic

Forum Jump: