DNA AND DNA COMPUTING IN SECURITY
#1

DNA AND DNA COMPUTING IN SECURITY
Abstract
As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future? This paper will outline some of the basics of DNA and DNA computing and its use in the areas of cryptography, steganography and authentication. Research has been performed in both cryptographic and steganographic situations with respect to DNA computing but researchers are still looking at much more theory than practicality. The constraints of its high tech lab requirements and computational limitations combined with the labour intensive extrapolation means, illustrate that the field of DNA computing is far from any kind of efficient use in today€„¢s security world. DNA authentication on the other hand has exhibited great promise with real world examples already surfacing on the marketplace today
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dna computing topics, mtnl dna 1051 firmware, dna computing in security powerpoint, dna working model with wire and thermocol, high capacity dna based stegnography, dna based nanostructures, dna animation,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,615 24-11-2018, 01:19 AM
Last Post:
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,250 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,289 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,995 30-03-2014, 04:40 AM
Last Post: Guest
  Soft Computing seminar surveyer 2 11,166 29-10-2013, 03:50 PM
Last Post: kavitaswami93gmail.com
  Modular Computing seminars report computer science crazy 4 21,597 08-10-2013, 04:32 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 9,993 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 11,921 27-07-2013, 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,696 24-06-2013, 11:44 AM
Last Post: Guest
  self managing computing system full report computer science technology 5 14,153 18-05-2013, 09:48 AM
Last Post: computer topic

Forum Jump: