Publication:
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography

dc.contributor.authorNik Azura Nik Abdullahen_US
dc.contributor.authorNur Hafiza Zakariaen_US
dc.contributor.authorAzni Haslizan Ab Halimen_US
dc.contributor.authorFarida Hazwani Mohd Ridzuanen_US
dc.contributor.authorAzuan Ahmaden_US
dc.contributor.authorKamaruzzaman Semanen_US
dc.contributor.authorSuriyani Ariffinen_US
dc.date.accessioned2024-05-29T02:26:10Z
dc.date.available2024-05-29T02:26:10Z
dc.date.issued2022
dc.date.submitted2023-1-27
dc.descriptionVolume 17 Number 5 (page: 165-178)en_US
dc.description.abstractCryptography has been extensively employed in the information security field for the purpose of providing security for confidential data. The field of cryptography has recently considered a hybrid cryptographic implementation that combines conventional cryptographic techniques with the knowledge of DNA technologies to formulate what is known as DNA cryptography. DNA based cryptography is considered a branch of sustainability science as it combines transdisciplinary structures from natural sciences (biology) and technological sciences (information security). This paper discusses the various biological DNA techniques that have been implemented in recent DNA cryptographic algorithms. Among them are the Watson-Crick Complementary Rules, DNA Encoding/Decoding Rules, DNA Operation Rules, the Triplet Codon DNA Code, DNA Segmentation, DNA Hybridisation (DNA Annealing) and DNA Transcription and DNA Replication from the Central Dogma Molecular Biology process. A description of the algorithms and a theoretical comparative analysis of these DNA cryptographic algorithms is also presented in this research paper. Comparisons have also been made based on the following parameters: Conventional cryptographic techniques vis-a-vis the techniques used by DNA cryptographic algorithms, the application of these algorithms, their limitations and a security analysis to see how well DNA cryptography perform as against current conventional cryptography.en_US
dc.identifier.doihttp://doi.org/10.46754/jssm.2022.05.014
dc.identifier.epage178
dc.identifier.issn2672-7226
dc.identifier.issue5
dc.identifier.spage165
dc.identifier.urihttps://jssm.umt.edu.my/wp-content/uploads/sites/51/2022/06/Article-14-JSSM-Volume-17-Number-5-May-2022.pdf
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/10574
dc.identifier.volume17
dc.language.isoen_USen_US
dc.publisherPenerbit UMTen_US
dc.relation.ispartofJournal of Sustainability Science and Managementen_US
dc.subjectCryptography, DNA computing, comparative analysis.en_US
dc.titleA Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptographyen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography.pdf
Size:
962.05 KB
Format:
Adobe Portable Document Format

Collections