Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Dna Computing In Security
Post: #1

As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future? This paper will outline some of the basics of DNA and DNA computing and its use in the areas of cryptography, steganography and authentication.

Research has been performed in both cryptographic and steganographic situations with respect to DNA computing but researchers are still looking at much more theory than practicality. The constraints of its high tech lab requirements and computational limitations combined with the labour intensive extrapolation means, illustrate that the field of DNA computing is far from any kind of efficient use in today?s security world. DNA authentication on the other hand has exhibited great promise with real world examples already surfacing on the marketplace today
Post: #2
Nice ,but u got to improve on ur terms.
Post: #3
to get information about the topic dna computing in security full report ,ppt and related topic refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dna anal, dna computing ge fanuc, dna computing documentation free download, biometrics from reel to real dna, dna computing in security ppt for free download, dna computer, dna program,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 7,873 09-03-2015 04:48 PM
Last Post: iyjwtfxgj
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 17,231 07-08-2014 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,689 30-03-2014 04:40 AM
Last Post: Guest
  Soft Computing seminar surveyer 2 3,875 29-10-2013 03:50 PM
Last Post:
  Modular Computing seminar report computer science crazy 4 7,623 08-10-2013 04:32 PM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 2,364 12-08-2013 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 4,024 27-07-2013 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 5,485 24-06-2013 11:44 AM
Last Post: Guest
  self managing computing system full report computer science technology 5 6,770 18-05-2013 09:48 AM
Last Post: computer topic
  Unicode And Multilingual Computing computer science crazy 2 1,215 06-05-2013 11:18 AM
Last Post: computer topic