Cryptography and Information Protection in the Living World

نویسندگان

  • Naya Nagy
  • Marius Nagy
  • Paul Hodor
چکیده

This paper explores parallels between on epts de ned in ryptography and on epts of biology at di erent levels of organization. Cryptographi settings, in luding the presen e of an eavesdropper are extensive in the realm of plants and animals. It also turns out that priniples of information prote tion show strong similarities between the two dis iplines: omputer s ien e and mole ular biology. Biologi al information, as held by the DNA mole ule, and digital information, as used in digital ommuni ation systems, are subje t to analogous pro edures of prote tion and repair when damaged.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

A Decentralized Online Sortition Protocol

We propose a new online sortition protocol which is decentralized. We argue that our protocol has safety, fairness, randomness, non-reputation and openness properties. Sortition is a process that makes random decision and it is used in competitions and lotteries to determine who is the winner. In the real world, sortition is simply done using a lottery machine and all the participa...

متن کامل

NEW INFORMATION ON THE FORM-GENUS CYTOSPORA IN IRAN (I)

In order to study of the form-genus Cytospora, around 400 specimens were collected from all over the Iran during 2003-2005. In this paper, the first part of the obtained results, including seven form-species are presented. Cytospora atrocirrhata, C. carbonacea, C. gutnerae, C. nivea and C. rosarum are reported as new members for mycoflora of Iran. Also, Vitis vinifera for C. leucostoma and Celt...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

Investigating Methods of Kleptography

Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the impo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJUC

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2016