DNA Computing in security
Thread Rating:
  • 1 Vote(s) - 4 Average
  • 1
  • 2
  • 3
  • 4
  • 5
guptar2109
Active In SP
**

Posts: 1
Joined: Feb 2010
#1
03-02-2010, 04:54 PM


hi....
Reply
seminarbuddy
Active In SP
**

Posts: 261
Joined: Feb 2010
#2
03-02-2010, 07:28 PM

The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Mathematicians and physicists attempt to improve on encryption methods while staying within the confines of the technologies available.

Origins of DNA Computing
DNA computing or molecular computing are terms used to describe utilizing the inherent combinational properties of DNA for huge parallel computation. Adleman put his theory of DNA computing to the test on a problem called the Hamiltonian Path problem or sometimes referred to as the Traveling Salesman Problem known as the non deterministic polynomial time problem(NP).It was taken as the Adlemanâ„¢s DNA computing test as other conventional computers cannot solve it easily.

DNA CRYPTOGRAPHY
ËœDNA-based Cryptographyâ„¢ which puts an argument forward that the high level computational ability and incredibly compact information storage media of DNA computing has the possibility of DNA based cryptography based on one time pads. Public key encryption splits the key up into a public key for encryption and a secret key for decryption and the secret key cannot be found from the
public key. Anyone can use a person's public key to send him an encrypted message, but only the person knows the secret key to decrypt it. Injecting DNA cryptography into the common PKI scenario, the researchers from Duke argue that we have the ability to follow the same inherent pattern of PKI but using the inherent massively parallel computing properties of DNA bonding to perform the encryption and decryption of the public and private keys.
with a large enough key, one should be able to thwart any DNA computer that can be built.

DNA Steganography
The principles used in the DNA steganography experiment used a simple code to convert the letters of the alphabet into combinations of the four bases which make up DNA and create a strand of DNA based on that code. A piece of DNA spelling out the message to be hidden is synthetically created which contains the secret encrypted message in the middle plus short marker sequences at the ends of the message. microdots with each dot containing billions of strands of DNA having the encoded piece of DNA are produced. If we know which markers on each end of the DNA are the correct ones which mean there must be some sort of shared secret that is transmitted previously , we cam decrypt this message.

DNA Authentication
All Olympic merchandise from shirts and hats to pins and coffee mugs were tagged with special ink that contained DNA taken from an unnamed Australian athlete. A hand held scanner is then used to scan the inked area of the clothing to determine if a piece of merchandise is authentic or not.

full report:

.doc   DNA_COMPUTING_AND_SECURITY(2).doc (Size: 143 KB / Downloads: 551)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#3
28-10-2010, 02:18 PM


.pdf   DNA.pdf (Size: 412.48 KB / Downloads: 379)
DNA and DNA Computing in Security Practices – Is the
Future in Our Genes



Abstract


As modern encryption algorithms are broken, the world of information security looks in
new directions to protect the data it transmits. The concept of using DNA computing in
the fields of cryptography and steganography has been identified as a possible technology
that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of
DNA computing the next cornerstone in the world of information security or is our time
better spent following other paths for our data encryption algorithms of the future?
This paper will outline some of the basics of DNA and DNA computing and its use in the
areas of cryptography, steganography and authentication.
Research has been performed in both cryptographic and steganographic situations with
respect to DNA computing but researchers are still looking at much more theory than
practicality. The constraints of its high tech lab requirements and computational
limitations combined with the labour intensive extrapolation means, illustrate that the
field of DNA computing is far from any kind of efficient use in today’s security world.
DNA authentication on the other hand, has exhibited great promise with real world
examples already surfacing on the marketplace today.
DNA authentication practices will grow as the need for fool proof identification of
individuals and items grows as well. The use of DNA computing on the other hand is far
from a reality and the world of information security is better focused on other encryption
technology methods for its future development.


for more ::->

seminar and presentationproject and implimentationsattachment.php?aid=328
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#4
06-02-2012, 12:27 PM

to get information about the topic dna computing seminar and presentation full report ,ppt and related topic refer the link bellow

topicideashow-to-dna-computer-full-seminar and presentation-report-download

topicideashow-to-dna-computing-full-report

topicideashow-to-dna-computing

topicideashow-to-dna-computing-full-report?page=4

topicideashow-to-dna-computing-in-security--6866

topicideashow-to-dna-computing-full-report?page=2

topicideashow-to-dna-computing-full-report?page=3

topicideashow-to-dna-computing-a-seminar and presentation-report

topicideashow-to-dna-computing-full-report?pid=49366

topicideashow-to-dna-computing--4455

topicideashow-to-dna-based-computing

topicideashow-to-dna-computing-full-report?page=5

topicideashow-to-dna-computer-full-seminar and presentation-report-download?page=6
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#5
15-02-2012, 12:29 PM

to get information about the topic dna computing in security full report ,ppt and related topic refer the link bellow

topicideashow-to-dna-computing-in-security--6866

topicideashow-to-dna-computing-in-security

topicideashow-to-dna-computer-full-seminar and presentation-report-download
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#6
01-03-2012, 10:10 AM

to get information about the topic dna computing seminar and presentation full report ,ppt and related topic refer the link bellow

topicideashow-to-dna-computer-full-seminar and presentation-report-download

topicideashow-to-dna-computing-full-report

topicideashow-to-dna-computing

topicideashow-to-dna-computing-full-report?page=4

topicideashow-to-dna-computing-in-security--6866

topicideashow-to-dna-computing-full-report?page=2

topicideashow-to-dna-computing-full-report?page=3

topicideashow-to-dna-computing-a-seminar and presentation-report

topicideashow-to-dna-computing-full-report?pid=49366

topicideashow-to-dna-computing--4455

topicideashow-to-dna-based-computing

topicideashow-to-dna-computing-full-report?page=5

topicideashow-to-dna-computer-full-seminar and presentation-report-download?page=6
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 156 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,429 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 277 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 275 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 293 17-01-2015, 04:13 PM
Last Post: jaseelati
  difference between soc and aoc in mobile computing jaseelati 0 324 20-12-2014, 01:12 PM
Last Post: jaseelati
  Cloud Computing abstract seminar tips 4 5,257 20-06-2014, 03:40 PM
Last Post: s.vmurugan@yahoo.com
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,122 24-03-2014, 02:51 PM
Last Post: seminar project topic
  Introduction to Cloud Computing project uploader 4 4,648 22-03-2014, 05:27 PM
Last Post: navasfiroz
  Security Framework for Wireless Communications in Smart Distribution Grid seminar tips 2 1,019 28-10-2013, 10:56 AM
Last Post: purplepearls