Bit Based Symmetric Encryption Method Using DNA Sequence and Quantum Technique to Generate Encrypted Key
Abstract
Keywords
Full Text:
PDFReferences
Gilles Brassard “Brief History of Quantum Cryptography: A Personal Perspective” in the Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, Awaji Island, Japan, 17 October 2005.
Richard J. Hughes, George L. Morgan and C. Glen Peterson “Practical quantum key distribution over a 48-km optical fiber network” Physics Division Los Alamos National Laboratory, Los Alamos, NM 87545, LA-UR-99-1593.
N.Srilatha G.Murali “Fast Three Level DNA Cryptographic Technique to Provide Better Security” 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) 978 -1-5090-2399-8/16/$31.00 ©2016 IEEE Pno:428-432.
E Suresh Babu, C Nagaraju, MHM Krishna Prasad “Analysis of SecureRouting Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism” published in Procedia Computer Science dec-. Vol-70Pno:341-347 , 2015.
Lelde Lace, Oksana Scegulnaja-Dubrovska, RamunsUsovs, AgneseZalcmane, “Quantum Cryptographic Key Distribution Protocols”, the European Social Fund (ESF), 2008.
R Pradeep Kumar Reddy, C Nagaraju, N Subramanyam ”Text encryption through level based privacy using dna steganography” published in International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2014,vol:3 issue:3
Lin, H.S., Cryptography and Public Policy, Journal of Government Information, PP135–148 . April1998.
Alia, M.A., Yahya,A., Public–Key Steganography Based on Matching Method, European Journal of Scientific Research PP223-231 Aug (2010).
G. Cui, L. Qin, Y. Wang and X. Zhang, “An encryption scheme using DNA technology”, Bio Inspired Computing: Theories and Applications, pp. 37-42, 2008.
Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," Bio-Inspired Computing: Theories andApplications, 2008, pp.23-30.
Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," Bio-Inspired Computing: Theories andApplications, 2008, pp.23-30.
Biological Alphabets and DNA-based Cryptography Qinghai Gao Department of Security Systems, Farmingdale State College, SUNY
Implementing Modern Cryptographic Protocols Using DNA and RNA Information Processing ArashKarimi Iran University of Science and Technology (IUST), Narmak, Tehran, Iran, VOL.11 No.11, November 2011.
auday h. saeed al-wattar, ramlan
mahmod, zuriatiahmadzukarnain&nurizuraudzir university putramalaysia, faculty of computer science & information technolgy, selangor-serdang, malaysia
DOI: https://doi.org/10.26483/ijarcs.v9i2.5860
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 International Journal of Advanced Research in Computer Science

