DNA Cryptography

DNA Cryptography

Pradipta Roy, Debarati Dey, Debashis De, Swati Sinha
ISBN13: 9781522556343|ISBN10: 1522556346|EISBN13: 9781522556350
DOI: 10.4018/978-1-5225-5634-3.ch037
Cite Chapter Cite Chapter

MLA

Roy, Pradipta, et al. "DNA Cryptography." Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 703-728. https://doi.org/10.4018/978-1-5225-5634-3.ch037

APA

Roy, P., Dey, D., De, D., & Sinha, S. (2018). DNA Cryptography. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 703-728). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch037

Chicago

Roy, Pradipta, et al. "DNA Cryptography." In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 703-728. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5634-3.ch037

Export Reference

Mendeley
Favorite

Abstract

In today's world, sensitive information like secret message, financial transaction, medical report, personal information is transferred over public communication channel. Since the advancement of communication begins, data security becomes a massive problem. The increasing rate of eavesdropping over communication channel leads the introduction of cryptography algorithm for data transmission. Different traditional cryptographic technique is adopted worldwide for protected data transmission. The recent advancement on this field is DNA based cryptography. This chapter describes the application of DNA as computational tool after the exposure of its capability was discovered by Leonard M. Adleman in 1994. Its random nature also helps the cryptography algorithm to become unbreakable. Conventional cryptography methods are sometimes susceptible to attack by the intruder. Therefore the idea of using codon based DNA as a computational tool is used in this cryptography method as an alternative method that fetches new hope in communication technology.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.