Bit Based Symmetric Encryption Method Using DNA Sequence and Quantum Technique to Generate Encrypted Key
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Gilles Brassard “Brief History of Quantum Cryptography: A Personal Perspective†in the Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, Awaji Island, Japan, 17 October 2005.
Richard J. Hughes, George L. Morgan and C. Glen Peterson “Practical quantum key distribution over a 48-km optical fiber network†Physics Division Los Alamos National Laboratory, Los Alamos, NM 87545, LA-UR-99-1593.
N.Srilatha G.Murali “Fast Three Level DNA Cryptographic Technique to Provide Better Security†2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) 978 -1-5090-2399-8/16/$31.00 ©2016 IEEE Pno:428-432.
E Suresh Babu, C Nagaraju, MHM Krishna Prasad “Analysis of SecureRouting Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism†published in Procedia Computer Science dec-. Vol-70Pno:341-347 , 2015.
Lelde Lace, Oksana Scegulnaja-Dubrovska, RamunsUsovs, AgneseZalcmane, “Quantum Cryptographic Key Distribution Protocolsâ€, the European Social Fund (ESF), 2008.
R Pradeep Kumar Reddy, C Nagaraju, N Subramanyam â€Text encryption through level based privacy using dna steganography†published in International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2014,vol:3 issue:3
Lin, H.S., Cryptography and Public Policy, Journal of Government Information, PP135–148 . April1998.
Alia, M.A., Yahya,A., Public–Key Steganography Based on Matching Method, European Journal of Scientific Research PP223-231 Aug (2010).
G. Cui, L. Qin, Y. Wang and X. Zhang, “An encryption scheme using DNA technologyâ€, Bio Inspired Computing: Theories and Applications, pp. 37-42, 2008.
Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," Bio-Inspired Computing: Theories andApplications, 2008, pp.23-30.
Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," Bio-Inspired Computing: Theories andApplications, 2008, pp.23-30.
Biological Alphabets and DNA-based Cryptography Qinghai Gao Department of Security Systems, Farmingdale State College, SUNY
Implementing Modern Cryptographic Protocols Using DNA and RNA Information Processing ArashKarimi Iran University of Science and Technology (IUST), Narmak, Tehran, Iran, VOL.11 No.11, November 2011.
auday h. saeed al-wattar, ramlan
mahmod, zuriatiahmadzukarnain&nurizuraudzir university putramalaysia, faculty of computer science & information technolgy, selangor-serdang, malaysia