Publication: A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
dc.contributor.author | Nik Azura Nik Abdullah | en_US |
dc.contributor.author | Nur Hafiza Zakaria | en_US |
dc.contributor.author | Azni Haslizan Ab Halim | en_US |
dc.contributor.author | Farida Hazwani Mohd Ridzuan | en_US |
dc.contributor.author | Azuan Ahmad | en_US |
dc.contributor.author | Kamaruzzaman Seman | en_US |
dc.contributor.author | Suriyani Ariffin | en_US |
dc.date.accessioned | 2024-05-29T02:26:10Z | |
dc.date.available | 2024-05-29T02:26:10Z | |
dc.date.issued | 2022 | |
dc.date.submitted | 2023-1-27 | |
dc.description | Volume 17 Number 5 (page: 165-178) | en_US |
dc.description.abstract | Cryptography has been extensively employed in the information security field for the purpose of providing security for confidential data. The field of cryptography has recently considered a hybrid cryptographic implementation that combines conventional cryptographic techniques with the knowledge of DNA technologies to formulate what is known as DNA cryptography. DNA based cryptography is considered a branch of sustainability science as it combines transdisciplinary structures from natural sciences (biology) and technological sciences (information security). This paper discusses the various biological DNA techniques that have been implemented in recent DNA cryptographic algorithms. Among them are the Watson-Crick Complementary Rules, DNA Encoding/Decoding Rules, DNA Operation Rules, the Triplet Codon DNA Code, DNA Segmentation, DNA Hybridisation (DNA Annealing) and DNA Transcription and DNA Replication from the Central Dogma Molecular Biology process. A description of the algorithms and a theoretical comparative analysis of these DNA cryptographic algorithms is also presented in this research paper. Comparisons have also been made based on the following parameters: Conventional cryptographic techniques vis-a-vis the techniques used by DNA cryptographic algorithms, the application of these algorithms, their limitations and a security analysis to see how well DNA cryptography perform as against current conventional cryptography. | en_US |
dc.identifier.doi | http://doi.org/10.46754/jssm.2022.05.014 | |
dc.identifier.epage | 178 | |
dc.identifier.issn | 2672-7226 | |
dc.identifier.issue | 5 | |
dc.identifier.spage | 165 | |
dc.identifier.uri | https://jssm.umt.edu.my/wp-content/uploads/sites/51/2022/06/Article-14-JSSM-Volume-17-Number-5-May-2022.pdf | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/10574 | |
dc.identifier.volume | 17 | |
dc.language.iso | en_US | en_US |
dc.publisher | Penerbit UMT | en_US |
dc.relation.ispartof | Journal of Sustainability Science and Management | en_US |
dc.subject | Cryptography, DNA computing, comparative analysis. | en_US |
dc.title | A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography.pdf
- Size:
- 962.05 KB
- Format:
- Adobe Portable Document Format