Dna Computing In Security
#1

As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future? This paper will outline some of the basics of DNA and DNA computing and its use in the areas of cryptography, steganography and authentication.

Research has been performed in both cryptographic and steganographic situations with respect to DNA computing but researchers are still looking at much more theory than practicality. The constraints of its high tech lab requirements and computational limitations combined with the labour intensive extrapolation means, illustrate that the field of DNA computing is far from any kind of efficient use in today?s security world. DNA authentication on the other hand has exhibited great promise with real world examples already surfacing on the marketplace today
Reply
#2
Nice ,but u got to improve on ur terms.
Reply
#3

to get information about the topic dna computing in security full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-dna-computi...rity--6866

http://studentbank.in/report-dna-computing-in-security

http://studentbank.in/report-dna-compute...t-download
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar on dna computig, biometrics from reel to real dna, keywords security, research center for dna, dna computing ppt, dna computing presentation, dna communications,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,382 24-11-2018, 01:19 AM
Last Post:
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,207 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,049 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,786 30-03-2014, 04:40 AM
Last Post: Guest
  Soft Computing seminar surveyer 2 11,146 29-10-2013, 03:50 PM
Last Post: kavitaswami93gmail.com
  Modular Computing seminars report computer science crazy 4 21,443 08-10-2013, 04:32 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 9,836 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 11,748 27-07-2013, 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,520 24-06-2013, 11:44 AM
Last Post: Guest
  self managing computing system full report computer science technology 5 14,135 18-05-2013, 09:48 AM
Last Post: computer topic

Forum Jump: