Filters








3,806 Hits in 3.9 sec

On Applying Molecular Computation to the Data Encryption Standard

LEONARD M. ADLEMAN, PAUL W. K. ROTHEMUND, SAM ROWEIS, ERIK WINFREE
1999 Journal of Computational Biology  
Recently, B o n eh, Dunworth, and Lipton described the p o t ential use of molecular computation in attacking the UnitedStatesData Encryption Standard (DES).  ...  Here, we p r o vide a d escription of such a n attack u s i n g t he sticker model of molecular computation.  ...  Sam Roweis is supported in part by the Center for Neuromorphic  ... 
doi:10.1089/cmb.1999.6.53 pmid:10223664 fatcat:3tmoxdfinveibkwfozqzvrohuq

On applying molecular computation to the data encryption standard [chapter]

Leonard Adleman, Paul Rothemund, Sam Roweis, Erik Winfree
1998 DNA Based Computers II  
Dunworth, and Lipton described the p o t ential use of molecular computation in attacking the UnitedStatesData Encryption Standard DES.  ...  Here, we provide a d escription of such a n a t t ack u s i n g t h e sticker model of molecular computation.  ...  Sam Roweis is supported in part by the Center for Neuromorphic  ... 
doi:10.1090/dimacs/044/02 dblp:conf/dimacs/AdlemanRRW96 fatcat:go2c6c3fqfcyhpcbfg4uxlaeb4

Extending Feistel structure to DNA Cryptography

Ashish Kumar Kaundal, A. K. Verma
2015 Journal of Discrete Mathematical Sciences and Cryptography  
algorithm used for cryptographic purposes known as DES (Data Encryption Standard).  ...  Whole encryption and decryption process is secure enough that if adversary wants to apply brute force method in order to compute the key sequence from ciphertext then he has to compute 4 80 different ssDNA  ... 
doi:10.1080/09720529.2014.995975 fatcat:5xech7fkbjgxpj3nxn4ehgqegi

DNA Based Cryptography Techniques with Applications and Limitations

2019 International Journal of Engineering and Advanced Technology  
DNA cryptography is based on genetic information transfer from one generation to the next generation.  ...  So, this technique provides fast and secure data transfer from one end to another end with low power consumption.  ...  DNA COMPUTING In 1994, A.Adleman [2] suggested things similar to DNA based computing is growing to a "molecular revolution," which finally will have a theatrical effect on the world. A.  ... 
doi:10.35940/ijeat.f9285.088619 fatcat:etrqoc6nqbfwplioqnb7oenzby

ENHANCING INFORMATION ENCRYPTION WITH BIOMOLECULAR SEQUENCES USING NDES ALGORITHM

Menaka. K
2017 International Journal of Advanced Research in Computer Science  
The proposed technique which combines the features of DNA sequences and the Data Encryption Standard is thus named as NDES (Novel Data Encryption Standard) algorithm.  ...  To guarantee the privacy and validity of the furtive data, a variety of cryptographic techniques have been developed and researchers are continuously working on it to afford better technique towards information  ...  The next stage of this work proceeds with the effective use of the primary concept of the DES (Data Encryption Standard) algorithm which is one of the popular cryptography algorithms to protect data.  ... 
doi:10.26483/ijarcs.v8i9.5006 fatcat:xsato4j37vgw3ohoumkqanqcdi

Page 1 of Science Trends Vol. 40, Issue 7 [page]

1978 Science Trends  
DATA ENCRYPTION CONTROVERSY The National Security Agency did not tamper “in any way" with an algorithm developed by IBM for a National Bureau of Standards effort to develop a data encryption standard (  ...  (For further information regarding Involvement of NSA in the Development of the Data Encryption Standard, contact Select Committee on Intelligence, US Senate, Wash., DC 20510.) 5/1/78 -38-  ... 

A Review to an Invincible Cryptographic Approach: DNA Cryptography
IJARCCE - Computer and Communication Engineering

Kamaljit Kainth, Gurpreet Singh
2015 IJARCCE  
Cryptography is the oldest and effective way to provide security to computer networks and data. The very first cryptographic techniques were developed over 200 years ago.  ...  A thorough understanding of cryptography and encryption will help people develop better ways to protect valuable information.  ...  Molecular computation It is a collimate computation where data can be stored and processed inside objects of molecular size.  ... 
doi:10.17148/ijarcce.2015.4175 fatcat:asvhk6nnxvagll5yhijuai5k5i

A Hybrid DNA Algorithm for DES using Central Dogma of Molecular Biology (CDMB)

U.Noorul Hussain, T. Chithralekha, A.Naveen Raj, G.Sathish, A.Dharani A.Dharani, G.Sathish G.Sathish
2012 International Journal of Computer Applications  
To overcome this lacuna the present study proposed a fast and secured hybrid algorithm using DES (Data Encryption Standard) with biological concept CDMB (Central Dogma of Molecular biology) developed and  ...  This edifice has enabled to do computations digitally and gave the high level of security, effectiveness and applicability.  ...  As this hybrid algorithm involves the Data Encryption Standard (DES) [15] , as usual it involves the permutation with Fiestal Function, with it the Central Dogma of Molecular Biology also explained below  ... 
doi:10.5120/5813-8115 fatcat:uuel7vaqybd5royislaetfw2se

A Security Algorithm for Online Analytical Processing Data Cube

Narander Kumar, Vishal Verma, Vipin Saxena
2013 International Journal of Computer Applications  
Only mathematical data is used in E-communication, which provides the strong encryption key to hide the information.  ...  In present work, a Security Encryption Algorithm for On-Line Analytical Processing (SEAOLAP) data cube.  ...  Figure 1: Encryption and Decryption of Data The above algorithm has the time complexity for transfer of data from one machine to another machine and computed as O(log 2 N).  ... 
doi:10.5120/13807-1768 fatcat:anlowndvsfhs7ky5btwtlhfope

Secured therapeutic applications for drug repositioning on the cloud computing

M Padma, G Geetharamani
2018 Biomedical Research  
Computing is virtually invading all domains of businesses and the Pharmaceutical Industry is in fact the latest one to join this elite club that utilizes the cloud phenomenon to improve productivity and  ...  From the existing drug, discovering a new drug with the help of cloud computing makes the production of drug as cost effective and minimize time to develop.  ...  Triple DES is a symmetric-key block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block.  ... 
doi:10.4066/biomedicalresearch.29-17-255 fatcat:6n7cmtelczbpxbdhgcvfft62u4

Transmission of Data in Secure Manner With DNA Sequence

Ravinder Paspula, K. Chiranjeevi, S. Laxman Kumar
2020 APTIKOM Journal on Computer Science and Information Technologies  
A new-promising technology called DNA-Cryptography is emerged in the area of DNA- Computing field.DNA useful for store, sending the data and also to perform computation.  ...  The receiver will apply the process to identify the human made DNA sequence with M hidden in it and extract the original message M.  ...  Boneh et al and Adleman -et al, proposed a model to break a Data Encryption Standard as an alternative approach for data hiding technology.  ... 
doi:10.34306/csit.v5i2.142 fatcat:kehheadg7vdxdevitp4aaxgf5u

Analysis on DNA based Cryptography to Secure Data Transmission

Author S.Jeevidha, Dr.M.S.Saleem Basha, Author Dr.P.Dhavachelvan
2011 International Journal of Computer Applications  
the molecular computer can replace the existing silicon computer and it exploits the world smallest computer.  ...  data transmission.  ...  BACKGROUND WORK OF DNA CRYPTOGRAPHY Boneh [5] started his pioneer work on breaking Data Encryption Standard which leads to more difficulties and much cost for experiment.  ... 
doi:10.5120/3584-4964 fatcat:xeyxiu5wijhv3j34poego3sb5y

A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions

Fursan Thabit, Sharaf Alhomdy, Sudhir Jagtap
2021 International Journal of Intelligent Networks  
There are many techniques to enhance data security on cloud computing storage environment. Encryption is the most significant method for data protection.  ...  The experimental results enhanced data security that can be used to secure applications on cloud computing.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their comments and suggestions to enhance this manuscript's quality. Also, I need to thank my guide Prof. Dr Sudhir B.  ... 
doi:10.1016/j.ijin.2021.03.001 doaj:b55b97fbddc848da917a4e670ea8c951 fatcat:csksaiourbdanarami2kxbtcra

Multicomponent reactions provide key molecules for secret communication

Andreas C. Boukis, Kevin Reiter, Maximiliane Frölich, Dennis Hofheinz, Michael A. R. Meier
2018 Nature Communications  
A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular  ...  Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key.  ...  Boukis for the discussions and comments on early versions of this manuscript. A.B. is grateful for the Chemie Fonds fellowship from the VCI.  ... 
doi:10.1038/s41467-018-03784-x pmid:29651145 pmcid:PMC5897361 fatcat:3kmwxfbrbzc6vkiiaaydvp5ymy

Genetic Operators Applied to Symmetric Cryptography

Jefferson Rodríguez, Brayan Corredor, César Suárez
2019 International Journal of Interactive Multimedia and Artificial Intelligence  
Finally, a comparison is presented against the following cryptographic algorithms DES (Data Encryption Standard), RSA (Rivest, Shamir and Adleman) and AES (Advanced Encryption Standard), exposing factors  ...  The proposed algorithm is based on operators used in Genetic Algorithms (GA), adapted to encrypt and decrypt text.  ...  Encryption is based on intensively computed mathematical functions and deciphering is usually the reverse process using the key(s) [2] , for this DES (Data Encryption Standard) uses a 64-bit key, while  ... 
doi:10.9781/ijimai.2019.07.006 fatcat:sgapxzy2azgf3mwlg6bzzgnfiq
« Previous Showing results 1 — 15 out of 3,806 results