Cryptography and Information Protection in the Living World
نویسندگان
چکیده
This paper explores parallels between on epts de ned in ryptography and on epts of biology at di erent levels of organization. Cryptographi settings, in luding the presen e of an eavesdropper are extensive in the realm of plants and animals. It also turns out that priniples of information prote tion show strong similarities between the two dis iplines: omputer s ien e and mole ular biology. Biologi al information, as held by the DNA mole ule, and digital information, as used in digital ommuni ation systems, are subje t to analogous pro edures of prote tion and repair when damaged.
منابع مشابه
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملA Decentralized Online Sortition Protocol
We propose a new online sortition protocol which is decentralized. We argue that our protocol has safety, fairness, randomness, non-reputation and openness properties. Sortition is a process that makes random decision and it is used in competitions and lotteries to determine who is the winner. In the real world, sortition is simply done using a lottery machine and all the participa...
متن کاملNEW INFORMATION ON THE FORM-GENUS CYTOSPORA IN IRAN (I)
In order to study of the form-genus Cytospora, around 400 specimens were collected from all over the Iran during 2003-2005. In this paper, the first part of the obtained results, including seven form-species are presented. Cytospora atrocirrhata, C. carbonacea, C. gutnerae, C. nivea and C. rosarum are reported as new members for mycoflora of Iran. Also, Vitis vinifera for C. leucostoma and Celt...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملInvestigating Methods of Kleptography
Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the impo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJUC
دوره 12 شماره
صفحات -
تاریخ انتشار 2016