New field of cryptography: DNA cryptography
نویسندگان
چکیده
منابع مشابه
Number field cryptography
This paper gives an overview of the state of art in cryptography based on quadratic orders. It discusses the intractable problems in class groups and the infrastructure of quadratic orders, approaches to the solution to these problems, and the crypto-systems employing them as underlying problems.
متن کامل1 DNA - Based Cryptography
Recent research has considered DNA as a medium for ultra-scale computation and for ultra-compact information storage. One potential key application is DNA-based, molecular cryptography systems. We present some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable. Practical applications of cryptographic systems based on one-time-pads are limited in conve...
متن کاملDNA-based cryptography
Recent research has considered DNA as a medium for ultra-scale computation and for ultracompact information storage. One potential key application is DNA-based, molecular cryptography systems. We present some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable. Practical applications of cryptographic systems based on onetime-pads are limited in convent...
متن کاملAsymmetric Cryptography: Hidden Field Equations
The most popular public key cryptosystems rely on assumptions from algebraic number theory, e.g., the difficulty of factorisation or the discrete logarithm. The set of problems on which secure public key systems can be based is therefore very small: e.g., a breakthrough in factorisation would make RSA insecure and hence affect our digital economy quite dramatically. This would be the case if qu...
متن کاملNew directions in cryptography
Two kinds of contemporary developments in crypcommunications over an insecure channel order to use cryptogtography are examined. Widening applications of teleprocessraphy to insure privacy, however, it currently necessary for the ing have given rise to a need for new types of cryptographic communicating parties to share a key which is known to no systems, which minimize the need for secure key ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science Bulletin
سال: 2006
ISSN: 2095-9273,2095-9281
DOI: 10.1007/s11434-006-2012-5