News

CALL FOR PAPERS JULY 2024

IJSAR going to launch new issue Volume 05, Issue 07, July 2024; Open Access; Peer Reviewed Journal; Fast Publication. Please feel free to contact us if you have any questions or comments send email to: editor@scienceijsar.com

IMPACT FACTOR: 6.673

Submission last date: 15th July 2024

An analysis of the use of DNA computing in cryptographic encryption methods

×

Error message

  • Notice: Trying to access array offset on value of type int in element_children() (line 6609 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6609 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home1/sciensrd/public_html/scienceijsar.com/includes/common.inc).
Author: 
Karan Chawla
Page No: 
5756-5760

In the newly growing discipline of DNA computing, DNA is employed as a data store medium and biological computation is used to answer problems. The study of DNA transcription and replication is where the idea originated. DNA computing is one type of biological computing. In the field of computer science, the use of DNA molecules as a data storage and processing medium is a relatively new concept. The interests and security of humanity have recently been significantly challenged by regular network assaults. Multiple detection techniques have been researched to counter this hazard, some of which have had promising outcomes but due to the advancing nature of network connectivity technology, enormous volumes of network data and a great deal of redundant data have been generated. The sample sizes for each attack type in the dataset are severely out of balance due to the difficulties in gathering samples due to the regularly changing forms of assaults. The robustness of current detection techniques is significantly decreased by these two issues, and current research techniques do not offer a satisfactory answer. Similarly, Electronic health records (EHRs) are being exchanged across the open network in historic numbers in this developing era where encryption is a trusted method to safeguard data in EHRs but the issue is that they are vulnerable to a variety of security risks. This paper addresses the application of dna computing in cryptographic encryption methods for NSGA3, Medical Imaging and Cloud Computing.

Download PDF: