Document Type : Research Paper

Authors

Mosul University - College of Computer Science and Mathematics

Abstract

Recent studies have shown the Deoxyribo nucleic acid (DNA) have several important features including the indiscriminate nature of the sequence of nitrogenous bases consisting the acid and large storage capability of the information that led to its adoption in the field of encryption where the appearance of a new branch which is encryption of DNA . The research aims to use the concept of DNA encryption to improve and increase the security of transposition cipher methods .

Keywords

Main Subjects

1. الجلبی قصی عبد القادر، " الأحماض النوویة "، دار الحکمة للطباعة والنشر، الموصل – العراق، (1991).
2. الحمامی علاء حسین، " تکنولوجیا أمنیة المعلومات وأنظمة حمایتها "، الطبعة الأولى، دار وائل للنشر، عمان – الاردن، (2007).
3. تاج الدین سعد جابر " " علم الوراثة "، الطبعة الثانیة، جامعة البصرة، البصرة – العراق، (2000).
4. شکارة مکرم ضیاء، " علم الوراثة "، الطبعة الاولى، دار المسیرة، عمان -  الاردن، (2000).
5. Beenish Anam, and et al, “Review on the Advancements of DNA Cryptography“, SKIMA Paro, Bhutan ,  2010.
6. Dan Boneh, Christopher Dunworth, and Richard J. Lipton, “Breaking DES using a molecular Computer", Discrete Mathematics and Theoretical Computer Science, American Mathematical Society, 1996.
7. G. Cui, Y. Liu, and X. Zhang , “New direction of data storage: DNA molecular storage technology,” Computer Engineering and Application, vol. 42, no. 26, pp. 29–32, 2006.
8. Guangzhao Cui , and et al., “An Encryption Scheme Using DNA Technology“ ,  IEEE 37 BIC-TA , 2008
9. Guy E. Blelloch, “ Introduction to Data Compression “ , Carnegie Mellon University, Guy Blelloch,  2010.
10. J. Chen, “A DNA-based, biomolecular cryptography design”, IEEE International Symposium on Circuits and Systems (ISCAS), 2003.
11. L. M. Adleman. Molecular computation of solutions to combinatorial problems. Science, 1994.
12. Monica BRDOA, Olga TORNEA, “ DNA Secret Writing Techniques “ , IEEE , 2010.
13. Xing Wang, Qiang Zhang, “ DNA computing-based cryptography “, 1EEE, 2009.