Dna Computing In Security
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
22-09-2008, 09:23 AM


As modern encryption algorithms are broken, the world of information security looks in new directions to protect the data it transmits. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology that may bring forward a new hope for unbreakable algorithms. Is the fledgling field of DNA computing the next cornerstone in the world of information security or is our time better spent following other paths for our data encryption algorithms of the future? This paper will outline some of the basics of DNA and DNA computing and its use in the areas of cryptography, steganography and authentication.

Research has been performed in both cryptographic and steganographic situations with respect to DNA computing but researchers are still looking at much more theory than practicality. The constraints of its high tech lab requirements and computational limitations combined with the labour intensive extrapolation means, illustrate that the field of DNA computing is far from any kind of efficient use in today?s security world. DNA authentication on the other hand has exhibited great promise with real world examples already surfacing on the marketplace today
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
Emmtoyl
Active In SP
**

Posts: 1
Joined: May 2010
#2
21-10-2010, 05:56 PM

Nice ,but u got to improve on ur terms.
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#3
15-02-2012, 12:29 PM

to get information about the topic dna computing in security full report ,ppt and related topic refer the link bellow

topicideashow-to-dna-computing-in-security--6866

topicideashow-to-dna-computing-in-security

topicideashow-to-dna-computer-full-seminar and presentation-report-download
Reply
Guest
Thinking To Register

 
#4
24-01-2013, 12:21 PM

Can You please send me information about this at my Email Id : sumegha137@gmail.com
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 170 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,451 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 289 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 292 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 304 17-01-2015, 04:13 PM
Last Post: jaseelati
  difference between soc and aoc in mobile computing jaseelati 0 341 20-12-2014, 01:12 PM
Last Post: jaseelati
  Cloud Computing abstract seminar tips 4 5,294 20-06-2014, 03:40 PM
Last Post: s.vmurugan@yahoo.com
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,152 24-03-2014, 02:51 PM
Last Post: seminar project topic
  Introduction to Cloud Computing project uploader 4 4,678 22-03-2014, 05:27 PM
Last Post: navasfiroz
  Security Framework for Wireless Communications in Smart Distribution Grid seminar tips 2 1,030 28-10-2013, 10:56 AM
Last Post: purplepearls