Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/6893
Title: A Review of DNA Cryptograhic Approaches
Authors: Iliyasu, M. A.
Abisoye, O. A.,
Bashir, S. A.
Ojeniyi, J. A
Keywords: Cryptography
DNA limitations
DNA cryptography
One Time Pad
DNA Cryptographic approaches,
Issue Date: 2021
Publisher: IEEE
Citation: Iliyasu, M. A., Abisoye, O. A., Bashir, S. A. and Ojeniyi, J. A. A Review of DNA Cryptograhic Approaches 2020 IEEE 2nd International Conference on Cyberspace (CYBER NIGERIA), 2021, pp. 66-72, doi: 10.1109/CYBERNIGERIA51635.2021.9428855.
Abstract: Cryptography is described as the encryption analysis of data or secret data writing using logical and mathematical data protection principles. It is an information technology for banking, medical systems, transportation and other Internet of things applications. Cryptography has become more important, and it is subjected to growing security concerns. Each system is built with its own strength in cryptography; symmetric encryption provides an economical data protection solution without compromise but it is important to share or distribute the secret key during encryption and decryption process. In comparison, the asymmetric encryption addresses the issue of secret key distribution; however, the stand-alone technique is slow and needs more computing resources than the symmetric encryption approach. In this context, a study of papers relating to DNA cryptographic approaches are presented and the research was centered from 2015 to 2020. The primary sources of information are Science Direct and Research Gate publication platforms. The existing shortcomings of DNA cryptographic approaches were established and analysis was performed on the most frequently used encryption technique based on the literature. The significant findings of this research reviewed that DNA digital coding is the most adopted cryptographic technique used to improve information security and the most common limitations of the DNA cryptographic approaches are high time complexity and algorithm complexity which is possible to infer from the literature.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/6893
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
A REVIEW OF DNA CRYPTOGRAHIC.pdf498.79 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.