2009
DOI: 10.1007/978-3-642-04292-8_49
|View full text |Cite
|
Sign up to set email alerts
|

DNA Cryptographic Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…In decryption process OTP is used to extract the encryption key by the user. Self-assembling of the tiles used for encryption in reverse order results in giving the plain text [ 36 38 ].…”
Section: Methodsmentioning
confidence: 99%
“…In decryption process OTP is used to extract the encryption key by the user. Self-assembling of the tiles used for encryption in reverse order results in giving the plain text [ 36 38 ].…”
Section: Methodsmentioning
confidence: 99%
“…In recent days of IT, various techniques, methods and approaches are used for secured data transmission. One of the cryptographic methods used for secured communication & data transmission for protecting the information is Deoxyribonucleic acid (DNA) cryptography [11][12]. DNA cryptography is introduced by author in [10].…”
Section: Figure-2 Taxonomy Of Security Application Algorithmsmentioning
confidence: 99%
“…By converting the binary system of 0's and 1's used by computers into the four-letter genetic code (A-C-G-T), encryption algorithms have been developed to store the content of a book, an operating system, and even a movie in synthetic DNA [5,17]. Computer scientists working in the field of DNA computing have also proposed developing asymmetric encryption schemes using DNA sequences [18]. These pioneering projects demonstrate that DNA synthesis and DNA sequencing technologies are able to translate between DNA molecules and digital information.…”
Section: Related Workmentioning
confidence: 99%