Advances of DNA computing in cryptography

Author: Suyel Namasudra and Ganesh Chandra Deka

Published in: CRC Press

ISBN: 978-0815-3-8532-5

File Type: pdf

File Size:  3 MB

Language: English


Secure data communication is a big challenge for information technology (IT) companies due to the increasing number of attackers and malicious users. The exponential increases in users or customers on the Internet makes the situation more critical. Cryptography is the technique of transmitting data or messages (files) between a sender and receiver over an entrusted medium in such a manner that an attacker or malicious user is unable to read the original data. It can also be used for the authentication of customers or users.
DNA can be used to store large chunks of data since large amounts of data can be stored inside the condensed volume of DNA. One gram of DNA can hold approximately 1021 bases (A, T, G, and C) of DNA, representing approximately 700 TB of data storage capacity. Therefore, a few grams of DNA can store all the data in the world. The processing speed of write and read operations in DNA computing is comparatively very high, which has already attracted many researchers to use DNA in computing, also known as DNA computing.
Many researchers have proposed many schemes for data security using DNA computing. Advances of DNA computing in cryptography book starts with a discussion on the technology used in DNA computing in Chapter 1 and gradually introduces the application of various aspects of DNA computing. Chapter 2 is about the applications of DNA computing in cryptography for data protection, while Chapter 3 deliberates upon the taxonomy of DNA based encryption models.

Chapter 4 is a case study on a data encryption scheme using DNA computing, which represents a data encryption scheme for improving data security. Nowadays, cloud computing is being used in many organizations. Chapter 5 of Advances of DNA computing in cryptography book deliberates upon the prospects of DNA computing in the cloud computing environment. Chapter 6 is an analytical study of the taxonomy of security attacks, which is further deliberated upon in Chapter 7. Chapter 8 is a comparative study on various DNA computing algorithms, while Chapter 9 concludes the book by discussing future research trends in DNA computing.
Similar Books