Professional Documents
Culture Documents
Main
Main
Main
“DNA CRYPTOSYSTEM”
Submitted in partial fulfillment of the requirements
Master of Technology
In
Assistant Professor
(Approved by AICTE, New Delhi & Affiliated to JNTUK & Accredited by NBA, NAAC with
‘A’ Grade, Recognized by UGC under the section 2(f) & 12(B) of UGC Act 1956)
2015 - 2017
Department of Information Technology
(Approved by AICTE, New Delhi & Affiliated to JNTUK & Accredited by NBA, NAAC with
‘A’ Grade, Recognized by UGC under the section 2(f) & 12(B) of UGC Act 1956)
CERTIFICATE
This is to certify that the Technical Seminar report entitle “DNA CRYPTOSYSTEM” is being
requirements for the award of the M.Tech degree in Computer Science and Engineering for the
DNA computing is the back bone of the DNA cryptography. DNA cryptography is
becoming an alternative to the traditional cryptographic approach that exists in our day-today
life. In spite security breaches overwhelm the traditional security techniques that are provided to
a system. Thus, to increase the security feature with less cost and reduced computational time,
we go for techniques utilizing the properties of DNA molecules. The various properties and
methods that adopt DNA cryptography to provide security to the messages transmitted between a
sender and a receiver are explored.
This report having detailed explanation of DNA cryptography and various schemes of
DNA cryptosystem proposed by various researchers are discussed.
INDEX
1. INTRODUCTION ……………………………………………………………………… 1
1.1.POINEERING WORKS …………………………………………………………….. 1
1.2.BASICS OF DNA …………………………………………………………………… 2
2. Schemes of DNA Cryptosystem ………………………………………………………... 4
2.1. Symmetric key cryptography with DNA based strong cipher ……………………….. 4
2.2. DNA based security technique ……………………………………………………….. 5
2.3.Index based encryption ……………………………………………………………….. 7
2.4. Secrete data writing using DNA ……………………………………………………… 8
2.5. DNA Cryptography using one – time – pad key …………………………………….... 9
2.6. DNA indexing through substitution ………………………………………………….. 11
2.7. Bit based symmetric encryption ……………………………………………………… 11
2.8.Message Encryption ………………………………………………………………….. 12
2.9.Secure Storage of Records …………………………………………………………… 15
2.10. DNA based AES …………………………………………………………………….. 17
3. COMPARISIONS OF VARIOUS CRYPTOSYSTEMS ……………………………….. 18
4. CONCLUSION ………………………………………………………………………….. 19
5. REFERENCES …………………………………………………………………………... 20