ENHANCING INFORMATION ENCRYPTION WITH BIOMOLECULAR SEQUENCES USING NDES ALGORITHM
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Leuenberger, M. N. 2001. Quantum computing in molecular magnets.
Adleman, L. M. 1994. Molecular computation of solutions to combinatorial problems.
Watson, J. D. 1953. The structure of DNA.
Lovgren, Stefan (2003-02-24). "Computer Made from DNA and Enzymes". National Geographic. Retrieved 2009-11-26.
M.X. Lu, “Symmetric-key cryptosystem with DNA technology,†Science in China Series F: Information Sciences, vol.3, pp. 324-333, 2007.
Hossain, E. M. 2016. A DNA cryptographic technique based on dynamic DNA sequence table.
Chen, J.2003. A DNA-based, bio molecular cryptography design. Circuits and Systems.
Mohammad Reza Abbasy, Azizah Abdul Manaf, and M.A. Shahidan, “Data Hiding Method Based on DNA Basic Characteristicsâ€, International Conference on Digital Enterpriseand Information Systems, July 20-22, (2011), London, UK,pp. 53–62.
K. Menaka, "Message Encryption Using DNA Sequences", World Congress on Computing and Communication Technologies (WCCCT) 2014, IEEE Xplore Digital Library, pp. 182-184, Feb. 27 2014.
K. Meena and K. Menaka, A New Approach to DNA Cryptography Using 8x8 Playfair Cipher and Ramanujam Square Matrix , International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391 Volume 5 Issue 8, August 2016.
Amal Khalifa and Ahmed Atito. (2012). High-Capacity DNA-based Steganography. In the 8th International Conference and informatics and Systems (INFOS2012).IEEE.
.Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi, Mohammad Reza Najaf Torkaman. (2012). DNA Base Data Hiding Algorithm. In International Journal on New Computer Architectures and their Applications.
Bibhash Roy, Atanu Majumder. (2012). An Improved Concept of Cryptography Based on DNA Sequencing. In International Journal of Electronics Communication and Computer Engineering. Vol. 3, Issue-6.
DES Encryption, www.kioskeas.net, 2014
.