Advances of DNA Computing in Cryptography PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Advances of DNA Computing in Cryptography PDF full book. Access full book title Advances of DNA Computing in Cryptography by Suyel Namasudra. Download full books in PDF and EPUB format.

Advances of DNA Computing in Cryptography

Advances of DNA Computing in Cryptography PDF Author: Suyel Namasudra
Publisher: CRC Press
ISBN: 1351011405
Category : Computers
Languages : en
Pages : 181

Book Description
This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.

Advances of DNA Computing in Cryptography

Advances of DNA Computing in Cryptography PDF Author: Suyel Namasudra
Publisher: CRC Press
ISBN: 1351011405
Category : Computers
Languages : en
Pages : 181

Book Description
This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.

Advances of DNA Computing in Cryptography

Advances of DNA Computing in Cryptography PDF Author: Suyel Namasudra
Publisher: CRC Press
ISBN: 1351011391
Category : Computers
Languages : en
Pages : 186

Book Description
This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.

Perspective of DNA Computing in Computer Science

Perspective of DNA Computing in Computer Science PDF Author:
Publisher: Elsevier
ISBN: 0323855474
Category : Computers
Languages : en
Pages : 402

Book Description
DNA or Deoxyribonucleic Acid computing is an emerging branch of computing that uses DNA sequence, biochemistry, and hardware for encoding genetic information in computers. Here, information is represented by using the four genetic alphabets or DNA bases, namely A (Adenine), G (Guanine), C (Cytosine), and T (Thymine), instead of the binary representation (1 and 0) used by traditional computers. This is achieved because short DNA molecules of any arbitrary sequence of A, G, C, and T can be synthesized to order. DNA computing is mainly popular for three reasons: (i) speed (ii) minimal storage requirements, and (iii) minimal power requirements. There are many applications of DNA computing in the field of computer science. Nowadays, DNA computing is widely used in cryptography for achieving a strong security technique, so that unauthorized users are unable to retrieve the original data content. In DNA-based encryption, data are encrypted by using DNA bases (A, T, G, and C) instead of 0 and 1. As four DNA bases are used in the encryption process, DNA computing supports more randomness and makes it more complex for attackers or malicious users to hack the data. DNA computing is also used for data storage because a large number of data items can be stored inside the condensed volume. One gram of DNA holds approx DNA bases or approx 700 TB. However, it takes approx 233 hard disks to store the same data on 3 TB hard disks, and the weight of all these hard disks can be approx 151 kilos. In a cloud environment, the Data Owner (DO) stores their confidential encrypted data outside of their own domain, which attracts many attackers and hackers. DNA computing can be one of the best solutions to protect the data of a cloud server. Here, the DO can use DNA bases to encrypt the data by generating a long DNA sequence. Another application of DNA computing is in Wireless Sensor Network (WSN). Many researchers are trying to improve the security of WSN by using DNA computing. Here, DNA cryptography is used along with Secure Socket Layer (SSL) that supports a secure medium to exchange information. However, recent research shows some limitations of DNA computing. One of the critical issues is that DNA cryptography does not have a strong mathematical background like other cryptographic systems. This edited book is being planned to bring forth all the information of DNA computing. Along with the research gaps in the currently available books/literature, this edited book presents many applications of DNA computing in the fields of computer science. Moreover, research challenges and future work directions in DNA computing are also provided in this edited book. This edited book gives an overall detail of DNA computing and the fundamentals of cryptography Many applications of DNA computing in computer science fields, such as cryptography, cloud computing, big data storage, Wireless Sensor Network (WSN) security, and many more, are presented in different chapters of this edited book Research challenges along with many future work directions in DNA computing are presented in this edited book

Implementation of DNA Cryptography in Cloud Computing and Using Huffman Algorithm, Socket Programming and New Approach to Secure Cloud Data

Implementation of DNA Cryptography in Cloud Computing and Using Huffman Algorithm, Socket Programming and New Approach to Secure Cloud Data PDF Author: Gyan Prakash Pandey
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Book Description
The security matters would be still there in cloud organizations. Cryptography dwells of the encryption-decryption techniques. There are many programs, algorithms those can be needed for security purposes. DNA is now frequently a theoretical concept but if implemented in future would be giving most strong and secure system.It has been recommended that DNA cryptographic algorithms are accepted for the development of data security in cloud security. So that cloud system would be most secure from unauthorized organizations.DNA cryptography is a advanced encouraging field in cryptography which developed with the progress of DNA computing. The approach of enormous parallelism and considerable information closeness genetic in DNA molecule are used for cryptographic function. Presently, the main hindrances of DNA cryptography are the specification of high tech bio-molecular research laboratory and computational complexity.In this research paper, a modern parallel cryptography technique is recommended using DNA molecular structure, one-time-pad scheme and DNA assortment procedure which surely reduces the time complexity. The IoT is a network of internet-connected entity that are able to assemble and interchange data using fixed sensors. Internet of Things (IoT) and Cloud computing are the leading technologies achieving connotation in today's IT world. AS a result of their integrity and conformity in all computing devices their usage is more in modern tendency. These technologies are combined to form a platform called IoT cloud. By reason of these technologies are automatically used there is a demand for security of data collected from the devices linked through these technologies. There are various concept have been suggested for security of data.

Aspects of Molecular Computing

Aspects of Molecular Computing PDF Author: Thomas J. Head
Publisher: Springer Science & Business Media
ISBN: 3540207813
Category : Computers
Languages : en
Pages : 401

Book Description
Molecular computing is a rapidly growing subarea of natural computing. On the one hand, molecular computing is concerned with the use of bio-molecules for the purpose of actual computations while, on the other hand, it attempts to understand the computational nature of molecular processes going on in living cells. The book presents a unique and authorative state-of-the-art survey on current research in molecular computing: 30 papers by leading researchers in the area are drawn together on the occasion of the 70th birthday of Tom Head, a pioneer in molecular computing. Among the topics addressed are molecular tiling, DNA self-assembly, splicing systems, DNA-based cryptography, DNA word design, gene assembly, and membrane computing.

A Nature-Inspired Approach to Cryptology

A Nature-Inspired Approach to Cryptology PDF Author: Shishir Kumar Shandilya
Publisher: Springer Nature
ISBN: 9819970814
Category : Technology & Engineering
Languages : en
Pages : 325

Book Description
This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further.

DNA Computing Using Cryptographic and Steganographic Strategies

DNA Computing Using Cryptographic and Steganographic Strategies PDF Author: Adithya B.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 0

Book Description
Information protection and secrecy are major concerns, especially regarding the internet,Äôs rapid growth and widespread usage. Unauthorized database access is becoming more common and is being combated using a variety of encrypted communication methods, such as encryption and data hiding. DNA cryptography and steganography are used as carriers by utilizing the bio-molecular computing properties that have become more common in recent years. This study examines recently published DNA steganography algorithms, which use DNA to encrypt confidential data transmitted through an insecure communication channel. Several DNA-based steganography strategies will be addressed, with a focus on the algorithm,Äôs advantages and drawbacks. Probability cracking, blindness, double layer of security, and other considerations are used to compare steganography algorithms. This research would help and create more effective and accurate DNA steganography strategies in the future.

Quantum DNA Cryptography Advanced Security

Quantum DNA Cryptography Advanced Security PDF Author: Anisha Gupta
Publisher: Aakar Books
ISBN: 9781805271642
Category :
Languages : en
Pages : 0

Book Description
The prime concern in data communication over a transmission channel is the security of the data which is being exchanged amongst the sender and the receiver. Of late DNA based cryptography has emerged as an alternative to data encryption in the research of secure communications. In contrast, the axioms of quantum computation have greatly impacted the study of cryptoanalysis and network security according to recent trends. The idea of using quantum computing using DNA encoding to perform the quantum session key exchange is that each cipher-text pattern has its own unique properties and so, using a scheme that applies both is more secured than using any one alone. Message exchange amongst the two participants is established through quantum channels with non-orthogonal superposition states. The experimental setup is also discussed. Various encoding schemes, such as use of super-increasing Knapsack sequences, Fermat Number and Gödel Code have also been explored to protect the quantum key distribution procedure from different types of security concerns. The significant advantage of this technique lies in the ease of detection of any malicious intervention in the communication channel and how by computing the bit error rate which is a function of the noise on the communication network is discussed in my work.

DNA Computing: Quantum Computing Methods

DNA Computing: Quantum Computing Methods PDF Author: N.B. Singh
Publisher: N.B. Singh
ISBN:
Category : Computers
Languages : en
Pages : 158

Book Description
"DNA Computing: Quantum Computing Methods" explores the convergence of quantum computing with DNA-based technologies, unveiling how quantum principles amplify the computational capabilities inherent in DNA. This comprehensive work navigates through the transformative potential across healthcare, finance, and beyond, addressing challenges, innovations, and ethical considerations. From advancements in hardware and algorithms to biotechnological integration, this book forecasts a future where quantum DNA computing drives unprecedented scientific and societal advancements."

Advanced Computing and Systems for Security

Advanced Computing and Systems for Security PDF Author: Rituparna Chaki
Publisher: Springer
ISBN: 813222650X
Category : Technology & Engineering
Languages : en
Pages : 275

Book Description
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.