New field of cryptography: DNA cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Number field cryptography

This paper gives an overview of the state of art in cryptography based on quadratic orders. It discusses the intractable problems in class groups and the infrastructure of quadratic orders, approaches to the solution to these problems, and the crypto-systems employing them as underlying problems.

متن کامل

1 DNA - Based Cryptography

Recent research has considered DNA as a medium for ultra-scale computation and for ultra-compact information storage. One potential key application is DNA-based, molecular cryptography systems. We present some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable. Practical applications of cryptographic systems based on one-time-pads are limited in conve...

متن کامل

DNA-based cryptography

Recent research has considered DNA as a medium for ultra-scale computation and for ultracompact information storage. One potential key application is DNA-based, molecular cryptography systems. We present some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable. Practical applications of cryptographic systems based on onetime-pads are limited in convent...

متن کامل

Asymmetric Cryptography: Hidden Field Equations

The most popular public key cryptosystems rely on assumptions from algebraic number theory, e.g., the difficulty of factorisation or the discrete logarithm. The set of problems on which secure public key systems can be based is therefore very small: e.g., a breakthrough in factorisation would make RSA insecure and hence affect our digital economy quite dramatically. This would be the case if qu...

متن کامل

New directions in cryptography

Two kinds of contemporary developments in crypcommunications over an insecure channel order to use cryptogtography are examined. Widening applications of teleprocessraphy to insure privacy, however, it currently necessary for the ing have given rise to a need for new types of cryptographic communicating parties to share a key which is known to no systems, which minimize the need for secure key ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science Bulletin

سال: 2006

ISSN: 2095-9273,2095-9281

DOI: 10.1007/s11434-006-2012-5