DNA Computing in security
#2
The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Mathematicians and physicists attempt to improve on encryption methods while staying within the confines of the technologies available.

Origins of DNA Computing
DNA computing or molecular computing are terms used to describe utilizing the inherent combinational properties of DNA for huge parallel computation. Adleman put his theory of DNA computing to the test on a problem called the Hamiltonian Path problem or sometimes referred to as the Traveling Salesman Problem known as the non deterministic polynomial time problem(NP).It was taken as the Adlemanâ„¢s DNA computing test as other conventional computers cannot solve it easily.

DNA CRYPTOGRAPHY
ËœDNA-based Cryptographyâ„¢ which puts an argument forward that the high level computational ability and incredibly compact information storage media of DNA computing has the possibility of DNA based cryptography based on one time pads. Public key encryption splits the key up into a public key for encryption and a secret key for decryption and the secret key cannot be found from the
public key. Anyone can use a person's public key to send him an encrypted message, but only the person knows the secret key to decrypt it. Injecting DNA cryptography into the common PKI scenario, the researchers from Duke argue that we have the ability to follow the same inherent pattern of PKI but using the inherent massively parallel computing properties of DNA bonding to perform the encryption and decryption of the public and private keys.
with a large enough key, one should be able to thwart any DNA computer that can be built.

DNA Steganography
The principles used in the DNA steganography experiment used a simple code to convert the letters of the alphabet into combinations of the four bases which make up DNA and create a strand of DNA based on that code. A piece of DNA spelling out the message to be hidden is synthetically created which contains the secret encrypted message in the middle plus short marker sequences at the ends of the message. microdots with each dot containing billions of strands of DNA having the encoded piece of DNA are produced. If we know which markers on each end of the DNA are the correct ones which mean there must be some sort of shared secret that is transmitted previously , we cam decrypt this message.

DNA Authentication
All Olympic merchandise from shirts and hats to pins and coffee mugs were tagged with special ink that contained DNA taken from an unnamed Australian athlete. A hand held scanner is then used to scan the inked area of the clothing to determine if a piece of merchandise is authentic or not.

full report:
[attachment=1704]
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dna computing in security ppt for free download, dna computing in security powerpoint, dna computing in security project, information security technology using dna computing, semainar on dna computing in security, dna computing in security presentations pdf, dna cmputing in security,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
DNA Computing in security - by guptar2109 - 03-02-2010, 04:54 PM
RE: DNA Computing in security - by seminarbuddy - 03-02-2010, 07:28 PM
RE: DNA Computing in security - by seminar addict - 06-02-2012, 12:27 PM
RE: DNA Computing in security - by seminar paper - 15-02-2012, 12:29 PM
RE: DNA Computing in security - by seminar paper - 01-03-2012, 10:10 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,745 24-11-2018, 01:19 AM
Last Post:
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,431 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 27,214 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,740 30-03-2014, 04:40 AM
Last Post: Guest
  Soft Computing seminar surveyer 2 11,302 29-10-2013, 03:50 PM
Last Post: kavitaswami93gmail.com
  Modular Computing seminars report computer science crazy 4 22,264 08-10-2013, 04:32 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 10,642 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 12,664 27-07-2013, 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 14,471 24-06-2013, 11:44 AM
Last Post: Guest
  self managing computing system full report computer science technology 5 14,286 18-05-2013, 09:48 AM
Last Post: computer topic

Forum Jump: