Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT) 2015
DOI: 10.1109/c3it.2015.7060130
|View full text |Cite
|
Sign up to set email alerts
|

Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie hellman key sharing technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Moreover, it conceals data and encrypts them before uploading them to the cloud. Sohal et al [48] presented a new cryptographic method that used client-side encryption to protect the information. This technique uses multifold symmetric keys and is based on DNA cryptography.…”
Section: Parametersmentioning
confidence: 99%
“…Moreover, it conceals data and encrypts them before uploading them to the cloud. Sohal et al [48] presented a new cryptographic method that used client-side encryption to protect the information. This technique uses multifold symmetric keys and is based on DNA cryptography.…”
Section: Parametersmentioning
confidence: 99%
“…The use of the Diffie-Hellman trading key scheme using DNA was proposed in [2]. In this scheme, each of the original data symbols are replaced by a sequence formed of Adenine (A), Thymine (T ), Cytosine (C), and Guanine (G).…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, DNA computing requires less computational power compared to other techniques. Some of the techniques used in DNA computing are gel electrophoresis, polymerase chain reaction (PCR), and DNA Chip technology [2,22,32]. For these reasons DNA computing presents serious challenges to traditional cryptography based on math primitives, since the reverse is easy to calculate.…”
Section: Introductionmentioning
confidence: 99%
“…The most widely implemented methods in the communication and computer security fields are cryptography and data hiding. Encryption and data hiding approaches are used to investigate and improve individual privacy [4,5]. The main goal of cryptography is to protect the message from attackers by replacing the original plaintext message with an unintelligible format called a cipher message.…”
Section: Introductionmentioning
confidence: 99%