I need material on DNA in security, it's introduction, applications, advantages, disadvantages, problems and solutions
Posts: 8,059
Threads: 1
Joined: Mar 2014
dna computing security wikipedia
DNA computing is a branch of computing which uses DNA, biochemistry and molecular biology hardware, instead of the traditional silicon-based computer technologies. DNA computing, or, more generally, biomolecular computing, is a fast-developing interdisciplinary area. Research and development in this area concerns theory, experiments, and applications of DNA computing. The term "molectronics" has sometimes been used, but this term had already been used for an earlier technology, a then-unsuccessful rival of the first integrated circuits; this term has also been used more generally, for molecular-scale technology.
As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future? This paper will outline some of the basics of DNA and DNA computing and its use in the
areas of cryptography, steganography and authentication. Research has been performed in both cryptographic and steganographic situations with
respect to DNA computing but researchers are still looking at much more theory than practicality. The constraints of its high tech lab requirements and computational limitations combined with the labour intensive extrapolation means, illustrate that the field of DNA computing is far from any kind of efficient use in today’s security world. DNA authentication on the other hand, has exhibited great promise with real world examples already surfacing on the marketplace today. DNA authentication practices will grow as the need for fool proof identification of individuals and items grows as well. The use of DNA computing on the other hand is far from a reality and the world of information security is better focused on other encryption technology methods for its future development.