tailieunhanh - A review of DNA based block cipher
To counteract the advantages and the weaknesses of DNA-Based cryptographic, we are to discuss and provide a thorough description of the cryptography algorithm of DNA-Based cryptographic, the uniqueness of the algorithm, the safety of algorithms and also a review of analysis on the performance of DNA-based algorithms with DNA characteristics. | International Journal of Computer Networks and Communications Security C VOL. 6, NO. 9, SEPTEMBER 2018, 196–200 Available online at: E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) N C S A Review of DNA-Based Block Cipher Chng Chern Wei1, Sharifah Md. Yasin2, Mohd. Taufik Abdullah3 and Nur Izura Udzir4 1, 2, 3, 4 Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, 43400 UPM, Serdang, Selangor, Malaysia 1 cwchng2u@, 2ifah@, 3taufik@, 4izura@ ABSTRACT Nowadays, e-commerce growing rapidly such as online banking, government affairs through online and business transactions over the internet has become a popular trend and is considered important aspect for society of life in the world. Security in the world of communication through the network is an important aspect of the content in the communication that can be kept confidential for both senders and receivers. To counteract the advantages and the weaknesses of DNA-Based cryptographic, we are to discuss and provide a thorough description of the cryptography algorithm of DNA-Based cryptographic, the uniqueness of the algorithm, the safety of algorithms and also a review of analysis on the performance of DNA-based algorithms with DNA characteristics. Keywords: Cryptography, Security, Block Cipher, DNA, DNA-Based. 1 INTRODUCTION The growing development of computer systems and interconnection between computer worlds through computer networks such as the internet has led to the satisfying comfort of communication in sharing information. To reinforce the beliefs of societies on the effectiveness of online transactions, security in the network should be considered. Therefore, the security of current data in network communication should be emphasized [15]. Variety of techniques and network security algorithms have been widely used to maintain current transaction content in network communication, examples of .
đang nạp các trang xem trước