SlideShare a Scribd company logo
A New Dna Encryption Technique For Secure
Data Transmission With Authentication And
Confidentiality
Supervised by Presented by
Shyla Afroz Md. Sajedul karim
Lecturer Roll:083008
Dept. of CSE, RUET RUET
Outline

Objective

Background Study

Importance of DNA cryptography

Algorithm & Implementation

Proposed Model

Future work

References
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
2/20
Objective

Encrypt the plain text into DNA sequence(cipher
text ) using new DNA encryption technique.

Decrypt this cipher text using DNA decryption
technique.

Detect the limitation of this technique.

Propose a new model to solve this limitation.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
3/20
Background Study
 Nucleic Acid 2 types: DNA & RNA
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
4/20
Background Study
 Genetic Code: Information encoded within genetic
material (DNA or mRNA base) .
 DNA sequence : Order of nucleotide bases in
the DNA molecule.
ATTAGCCTTATGCATGAACC
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
5/20
Background Study
 Cryptography: The art of protecting information by
transforming Plain Text into an unreadable format.
 Those who possess the secret key can decrypt the
message .
 Encrypted messages can sometimes broken by
Cryptanalysis .
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
6/20
Symmetric Cipher Model
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
7/20
DNA Cryptography
First introduced by L. Adleman in 1990s.
Plaintext message Encoded into DNA
sequences.
Related fields are : information storage , massive
parallel processing , highly secured data
transmission and more.
Based on one-time-pads .
8/2011/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Importance of DNA Cryptography
Weakness of traditional cryptology.
Existing algorithms are no longer secure.
1995 , Bonech break the DES
Weng - Long Chang have designed integer
factorization which can break RSA.
Offer all feature of secure data transmission .
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
9/20
New DNA Encryption Technique

Introduce by R.S. Dhawan and Alice in 2012.

It is symmetric Algorithm.

Has three secret key.

Few mathematical computation is needed.

Encrypted data are DNA sequences.

Support all ASCII character.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
10/20
New DNA Encryption Technique

Key={Starting_Number,Modulus,Hyphen_Indices_ Array[ ] }

Starting_Number: Used to generate some sequential integer .

Substitution_Array: Contains sequential integer .It’s size is the
length of Plain text.
Substitution_Array[ i ]=Substitution_Array[i-1]+Modulus;

Modulus: Difference between each sequential integer in
Substitution_Array[ ]

Hyphen_Indices_ Array[ ] :Used to separate number from
sequence.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
11/20
StartStart
Set START_NUMBER , MODULO ;
SUBSTITUTION_ARRAY[0]=START_NUMBER;
FOR( i=1 TO (MSG_LENGTH-1) )
SUBSTITUTION_ARRAY[i]=SUBSTITUTION_ARR
AY[i-1]+ MODULO ;
Calculate Quotient and Remainder
FOR (i =1 TO (MSG_LENGTH-1) ) {
Quotient[i]= SUBSTITUTION_ARRAY[i]/ASCII[i]
Remind [i]= SUBSTITUTION_ARRAY[i]%ASCII[i] }
Total_ARRAY[]=Quotient[] followed
by Remind[];
Convert 10- Base number to 4-base
from TOTAL_ARRAY[]
to CONVERT_ARRAY[]
Calculate HYPHEN_INDICES[];
Replace:
0------ A 1------T
2-------C 3-----G
Cipher Text
Flow Chart Of Encryption Technique
STOPSTOP
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Input : Plain text;
Perform ASCII conversion into ASCII_ARRAY[]
12/20
Data Sheet And Output Of Encryption Technique
Character ASCII [ ] SUBSTITUTION
ARRAY [ ]
DIVISION Quotient[ ] Remainder[ ]
M 77 877 877/77 11 30
E 69 902 902/69 13 5
S 83 927 927/83 11 14
U 85 952 952/85 11 11
K 75 977 977/75 13 2
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
13/20
StartStart
Separate 4-base number Using
Hyphen_Indices Array
Calculate ASCII value:
For(i=0 to CIPHER_TEXT_LENGTH/2-1)
D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/
QUOTIENT[i]
Mapped ASCII value to CHARACTER
Convert 4- Base number to 10-base
from FOUR_BASE
_ARRAY[] to
TEN_BASE_ARRAY[]
Input : Cipher Text
Mapping:
A------ 0 T------1
C-------2 G-----3
Plain Text
Flow Chart Of Decryption Technique
STOPSTOP
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Make SUBSTITUTION_ARRAY[ ]
Separate REMIND[ ] and QUOTIENT[ ]
14/20
Table And Output Of Decryption Technique
QUOTIENT REMAINDER For(i=0 to cipher_text_length/2)
D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/
QUOTIENT[i]
Character
11 30 (877-30)/11= 77 M
13 5 (902-5)/13= 69 E
11 14 (927-14)/11= 83 S
11 11 (952-11)/11= 85 U
13 2 (977-2)/13 = 75 K
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Cipher Text:TTTCCTTGGCATAAGTTGAC
15/20
Result Analysis

Can Encrypt and Decrypt all ASCII character.

Provide Avalanche effect.

Provide Confidentiality.

Limitations:

Can not provide Authentication property.

Can not detect Modification of message.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
16/20
Proposed Model
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
M ||
H
E D
M
C(K1,M)
H
Compare
K1
K2 K2
E(K2,[M||H(K1,M)]E
17/20
M=Plain Text
H=Hash
function
E=Encryption
D=Decryption
K1 , K2=Key
D
K1
Future Work

Provide Authentication property using Digital
Signature .

Add function that will detect Modification of
message.

Compare performance with Existing one.

Implement this approach in Programming
Language.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
18/20
REFERENCES
[1] RS Dhawan and Alice(2012). A new DNA
Encryption technique for secure data transmission.
Research Scholar , Kurukshetera University,
Haryana, India.
[2] Guangzhao Cui , Cuiling Li , Haobin Li ,
Xiaoguang Li (2009). DNA computing and its
application to information security field. Research
ScholarHenan key Lab of information-based
Electrical Application , Zhengzhou 450002.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
19/20
REFERENCES
[3] Pankaj Rakheja(2012). Integrating DNA
computing in international data encryption
Algorithm(IDEA). Deep Institute of Engineering and
Technology, Haryana, India.
[4] Abdullah Al Mueen & Md. Nurul Amin
Applications of Graphs in Bioinformatics pp.16-50,
2006
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
20/20

More Related Content

PDF
Dna cryptography
PPTX
DNA based Cryptography_Final_Review
PPTX
Cryptography
PPTX
Cryptography
PPTX
Lightweight cryptography
PPTX
Cryptography and applications
PDF
Computer Security Lecture 7: RSA
PPT
Cryptography
Dna cryptography
DNA based Cryptography_Final_Review
Cryptography
Cryptography
Lightweight cryptography
Cryptography and applications
Computer Security Lecture 7: RSA
Cryptography

What's hot (20)

PPT
Image Steganography
PDF
SSL Secure socket layer
PPT
Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography and network security
PPT
sharing the data using audio and image Steganography-
PPT
Data hiding - Steganography
PPTX
Cryptography and Information Security
PPTX
Applications of-linear-algebra-hill-cipher
PDF
Encryption & Decryption of Sound in image format on Matlab
PPT
Ch03 block-cipher-and-data-encryption-standard
PDF
Depth Fusion from RGB and Depth Sensors by Deep Learning
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Kerberos : An Authentication Application
PPTX
Public Key Cryptography
PPTX
ElGamal Encryption Algoritham.pptx
PPTX
WLAN:VPN Security
PPT
Network Security and Cryptography
Image Steganography
SSL Secure socket layer
Cryptography
Cryptography
Cryptography
Cryptography
Cryptography and network security
sharing the data using audio and image Steganography-
Data hiding - Steganography
Cryptography and Information Security
Applications of-linear-algebra-hill-cipher
Encryption & Decryption of Sound in image format on Matlab
Ch03 block-cipher-and-data-encryption-standard
Depth Fusion from RGB and Depth Sensors by Deep Learning
Cryptography - Block cipher & stream cipher
Kerberos : An Authentication Application
Public Key Cryptography
ElGamal Encryption Algoritham.pptx
WLAN:VPN Security
Network Security and Cryptography
Ad

Viewers also liked (20)

PPT
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
PPTX
DNA secret writing project first review
PDF
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
PPTX
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
PPT
Data communications
PPTX
03 data transmission
PPTX
10.data transmission
PPTX
Frequency Modulation In Data Transmission
DOCX
Transmission modes
PPTX
Transmission modes
PDF
DNA Kriptografi
PDF
Acm aictc2016
PDF
Vanet titles
PDF
Jonathan Eisen talk on 1$ Genome
PDF
The Digital DNA - Rosario Sica, Emanuele Scotti
PPTX
The DNA Era: Why DNA is important in your life.
PPT
Information ethics & intro to information security
PPT
Viruses, Biometrics, Encryption
PDF
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
DNA secret writing project first review
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Data communications
03 data transmission
10.data transmission
Frequency Modulation In Data Transmission
Transmission modes
Transmission modes
DNA Kriptografi
Acm aictc2016
Vanet titles
Jonathan Eisen talk on 1$ Genome
The Digital DNA - Rosario Sica, Emanuele Scotti
The DNA Era: Why DNA is important in your life.
Information ethics & intro to information security
Viruses, Biometrics, Encryption
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Ad

Similar to A new DNA encryption technique for secure data transmission with authentication and confidentiality (20)

PDF
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
PDF
A new DNA Encryption Technique
PDF
Ijcnc050208
PDF
Hn2513581359
PDF
Hn2513581359
PPTX
Data security using rsa
PPTX
A NETWORK SECURITY APPROACH USING RSA.
PDF
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
PDF
A Modified Technique For Performing Data Encryption & Data Decryption
PDF
D017433134
PDF
A comparative review on symmetric and asymmetric DNA-based cryptography
PDF
Ijetcas14 355
PDF
Jj3616251628
PDF
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
PDF
B03302007012
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PDF
Data Encryption Standard
PDF
A Novel DNA Encryption System Using Cellular Automata
PDF
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
PDF
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A new DNA Encryption Technique
Ijcnc050208
Hn2513581359
Hn2513581359
Data security using rsa
A NETWORK SECURITY APPROACH USING RSA.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
A Modified Technique For Performing Data Encryption & Data Decryption
D017433134
A comparative review on symmetric and asymmetric DNA-based cryptography
Ijetcas14 355
Jj3616251628
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
B03302007012
A Survey on Generation and Evolution of Various Cryptographic Techniques
Data Encryption Standard
A Novel DNA Encryption System Using Cellular Automata
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Presentation on HIE in infants and its manifestations
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Complications of Minimal Access Surgery at WLH
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Lesson notes of climatology university.
PDF
RMMM.pdf make it easy to upload and study
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
O7-L3 Supply Chain Operations - ICLT Program
Presentation on HIE in infants and its manifestations
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
A systematic review of self-coping strategies used by university students to ...
Chinmaya Tiranga quiz Grand Finale.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Complications of Minimal Access Surgery at WLH
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
GDM (1) (1).pptx small presentation for students
human mycosis Human fungal infections are called human mycosis..pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Lesson notes of climatology university.
RMMM.pdf make it easy to upload and study
Abdominal Access Techniques with Prof. Dr. R K Mishra
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF

A new DNA encryption technique for secure data transmission with authentication and confidentiality

  • 1. A New Dna Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Supervised by Presented by Shyla Afroz Md. Sajedul karim Lecturer Roll:083008 Dept. of CSE, RUET RUET
  • 2. Outline  Objective  Background Study  Importance of DNA cryptography  Algorithm & Implementation  Proposed Model  Future work  References 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 2/20
  • 3. Objective  Encrypt the plain text into DNA sequence(cipher text ) using new DNA encryption technique.  Decrypt this cipher text using DNA decryption technique.  Detect the limitation of this technique.  Propose a new model to solve this limitation. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 3/20
  • 4. Background Study  Nucleic Acid 2 types: DNA & RNA 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 4/20
  • 5. Background Study  Genetic Code: Information encoded within genetic material (DNA or mRNA base) .  DNA sequence : Order of nucleotide bases in the DNA molecule. ATTAGCCTTATGCATGAACC 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 5/20
  • 6. Background Study  Cryptography: The art of protecting information by transforming Plain Text into an unreadable format.  Those who possess the secret key can decrypt the message .  Encrypted messages can sometimes broken by Cryptanalysis . 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 6/20
  • 7. Symmetric Cipher Model 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 7/20
  • 8. DNA Cryptography First introduced by L. Adleman in 1990s. Plaintext message Encoded into DNA sequences. Related fields are : information storage , massive parallel processing , highly secured data transmission and more. Based on one-time-pads . 8/2011/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality
  • 9. Importance of DNA Cryptography Weakness of traditional cryptology. Existing algorithms are no longer secure. 1995 , Bonech break the DES Weng - Long Chang have designed integer factorization which can break RSA. Offer all feature of secure data transmission . 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 9/20
  • 10. New DNA Encryption Technique  Introduce by R.S. Dhawan and Alice in 2012.  It is symmetric Algorithm.  Has three secret key.  Few mathematical computation is needed.  Encrypted data are DNA sequences.  Support all ASCII character. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 10/20
  • 11. New DNA Encryption Technique  Key={Starting_Number,Modulus,Hyphen_Indices_ Array[ ] }  Starting_Number: Used to generate some sequential integer .  Substitution_Array: Contains sequential integer .It’s size is the length of Plain text. Substitution_Array[ i ]=Substitution_Array[i-1]+Modulus;  Modulus: Difference between each sequential integer in Substitution_Array[ ]  Hyphen_Indices_ Array[ ] :Used to separate number from sequence. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 11/20
  • 12. StartStart Set START_NUMBER , MODULO ; SUBSTITUTION_ARRAY[0]=START_NUMBER; FOR( i=1 TO (MSG_LENGTH-1) ) SUBSTITUTION_ARRAY[i]=SUBSTITUTION_ARR AY[i-1]+ MODULO ; Calculate Quotient and Remainder FOR (i =1 TO (MSG_LENGTH-1) ) { Quotient[i]= SUBSTITUTION_ARRAY[i]/ASCII[i] Remind [i]= SUBSTITUTION_ARRAY[i]%ASCII[i] } Total_ARRAY[]=Quotient[] followed by Remind[]; Convert 10- Base number to 4-base from TOTAL_ARRAY[] to CONVERT_ARRAY[] Calculate HYPHEN_INDICES[]; Replace: 0------ A 1------T 2-------C 3-----G Cipher Text Flow Chart Of Encryption Technique STOPSTOP 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Input : Plain text; Perform ASCII conversion into ASCII_ARRAY[] 12/20
  • 13. Data Sheet And Output Of Encryption Technique Character ASCII [ ] SUBSTITUTION ARRAY [ ] DIVISION Quotient[ ] Remainder[ ] M 77 877 877/77 11 30 E 69 902 902/69 13 5 S 83 927 927/83 11 14 U 85 952 952/85 11 11 K 75 977 977/75 13 2 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 13/20
  • 14. StartStart Separate 4-base number Using Hyphen_Indices Array Calculate ASCII value: For(i=0 to CIPHER_TEXT_LENGTH/2-1) D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/ QUOTIENT[i] Mapped ASCII value to CHARACTER Convert 4- Base number to 10-base from FOUR_BASE _ARRAY[] to TEN_BASE_ARRAY[] Input : Cipher Text Mapping: A------ 0 T------1 C-------2 G-----3 Plain Text Flow Chart Of Decryption Technique STOPSTOP 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Make SUBSTITUTION_ARRAY[ ] Separate REMIND[ ] and QUOTIENT[ ] 14/20
  • 15. Table And Output Of Decryption Technique QUOTIENT REMAINDER For(i=0 to cipher_text_length/2) D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/ QUOTIENT[i] Character 11 30 (877-30)/11= 77 M 13 5 (902-5)/13= 69 E 11 14 (927-14)/11= 83 S 11 11 (952-11)/11= 85 U 13 2 (977-2)/13 = 75 K 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Cipher Text:TTTCCTTGGCATAAGTTGAC 15/20
  • 16. Result Analysis  Can Encrypt and Decrypt all ASCII character.  Provide Avalanche effect.  Provide Confidentiality.  Limitations:  Can not provide Authentication property.  Can not detect Modification of message. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 16/20
  • 17. Proposed Model 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality M || H E D M C(K1,M) H Compare K1 K2 K2 E(K2,[M||H(K1,M)]E 17/20 M=Plain Text H=Hash function E=Encryption D=Decryption K1 , K2=Key D K1
  • 18. Future Work  Provide Authentication property using Digital Signature .  Add function that will detect Modification of message.  Compare performance with Existing one.  Implement this approach in Programming Language. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 18/20
  • 19. REFERENCES [1] RS Dhawan and Alice(2012). A new DNA Encryption technique for secure data transmission. Research Scholar , Kurukshetera University, Haryana, India. [2] Guangzhao Cui , Cuiling Li , Haobin Li , Xiaoguang Li (2009). DNA computing and its application to information security field. Research ScholarHenan key Lab of information-based Electrical Application , Zhengzhou 450002. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 19/20
  • 20. REFERENCES [3] Pankaj Rakheja(2012). Integrating DNA computing in international data encryption Algorithm(IDEA). Deep Institute of Engineering and Technology, Haryana, India. [4] Abdullah Al Mueen & Md. Nurul Amin Applications of Graphs in Bioinformatics pp.16-50, 2006 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 20/20

Editor's Notes