Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Post: #1

As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future? This paper will outline some of the basics of DNA and DNA computing and its use in the areas of cryptography, steganography and authentication.

Research has been performed in both cryptographic and steganographic situations with respect to DNA computing but researchers are still looking at much more theory than practicality. The constraints of its high tech lab requirements and computational limitations combined with the labour intensive extrapolation means, illustrate that the field of DNA computing is far from any kind of efficient use in today?s security world. DNA authentication on the other hand has exhibited great promise with real world examples already surfacing on the marketplace today.
Post: #2
plsss send me ppt...Wink
Post: #3
can any one help me in getting the ppt...... plz.......

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: how to reset mtnl modem dna a213**, dna animation, dna based cryptography java source code, recombinant dna technology in plants, dna computing and molecular programming, it projects based on windows dna, biology project for class 12 on dna fingerprinting,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 7,862 09-03-2015 04:48 PM
Last Post: iyjwtfxgj
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 17,222 07-08-2014 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,683 30-03-2014 04:40 AM
Last Post: Guest
  Soft Computing seminar surveyer 2 3,873 29-10-2013 03:50 PM
Last Post:
  Modular Computing seminar report computer science crazy 4 7,619 08-10-2013 04:32 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 2,361 12-08-2013 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 4,014 27-07-2013 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 5,472 24-06-2013 11:44 AM
Last Post: Guest
  self managing computing system full report computer science technology 5 6,766 18-05-2013 09:48 AM
Last Post: computer topic
  Unicode And Multilingual Computing computer science crazy 2 1,215 06-05-2013 11:18 AM
Last Post: computer topic