An Overview and Analysis of Private and Public Key DNA Cryptography
Journal Title: The International Journal of Technological Exploration and Learning - Year 2013, Vol 2, Issue 6
Abstract
with the growth of technological advancements, the threats dealt by a user grow exponentially. Hence security has become a critical issue in data storage and transmission. As traditional cryptographic systems are now vulnerable to attacks, the concept of using DNA Cryptography has been identified as a possible technology that brings forward a new hope for unbreakable algorithms. This paper analyzes the different approaches on DNA based Cryptography.
Authors and Affiliations
K. Sireesha| Assistant Professor Department of Computer Science & Engineering K L University, Green Fields, Vaddeswaram Guntur District, Andhra Pradesh, V. Srujana| Assistant Professor Department of Computer Science & Engineering K L University, Green Fields, Vaddeswaram Guntur District, Andhra Pradesh
Robust Face Recognition under Difficult Lighting Conditions
This paper addresses the problem of illumination effects on Face recognition and works for an approach to reduce their effect on recognition performance. More broadly, a simple and efficient preprocessing chain that e...
Ship Detection with Wireless Sensor Network
The main aim of this work is an Intrusion detection on the sea which is a critical surveillance problem for harbor protection, border security, and also the protection of business facilities, such as oil platforms and...
Design and FPGA implementation of Addressable Chip for Multiple Sensor Applications
This electronic document is a �live� template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document In recen...
Power Reduction in OFDM based Cognitive Radio Systems
The increasing demand for wireless communication introduces efficient spectrum utilization challenge. To address this challenge, cognitive radio has emerged as the key technology, which enables opportunistic access to...
9T SRAM Cell with Improved Self-Controllable Voltage Level Circuits
As the feature size of the transistor is scaled down, the threshold voltages of MOSFETs have been reduced thereby leakage power substantially increases. Furthermore, leakage is the only source of energy consumption in...