Skip to main content

The Advantages and Disadvantages of DNA Password in the Contrast to the Traditional Cryptography and Quantum Cryptography

  • Conference paper
  • First Online:
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 212))

Abstract

In recent years, DNA Password is a new cryptography field which appears with DNA calculation. This paper briefly introduces the DNA cryptography, Traditional cryptography and Quantum cryptography. From the basic concepts, theoretical foundations, concrete operation processes, safety basis and the current development achievements and shortcomings of the three fields, this paper obtains DNA cryptography’s advantages and disadvantages compared with traditional DNA cryptography and quantum cryptography and analyzes its causes. Then, this paper shows the achievements of DNA cryptography in practical application and its future development direction. Finally, it will make an outlook that a new mixed cryptography system can be created on the advantages of the three kinds of cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adleman L (1994) Molecular computation of solutions to combinational problems. Science 266:1021–1024

    Article  Google Scholar 

  2. Amo M, Paun G, Rozenbergd G (2002) Topics in the theory of DNA computing. Theoret Comput Sci 287:3–38

    Article  MathSciNet  Google Scholar 

  3. Karl L (1997) DNA computing: arrival of biological mathematics. Math Intell 19(2):9–22

    Article  MathSciNet  MATH  Google Scholar 

  4. Feng D, Pei D (1999) Cryptography guidance. Science Press (in Chinese), Beijing

    Google Scholar�

  5. Wang Y, Liu J (1999) Network security theory and technology. Xian university of electronic science and technology press

    Google Scholar�

  6. Zhang Z (2002) Quantum computing and communication encryption. Central China Normal University Press, Wuhan

    Google Scholar�

  7. Quantum computation and quantum information (2004) Tsinghua University Press, Beijing

    Google Scholar�

  8. Boneh D, Dunworth C, Lipton RJ (1996) Breaking DES using a molecular computer. DNA Based Computers. American Mathematical Society, Providence USA, pp 37–65

    Google Scholar 

  9. Lu M, Lai X, Xiao G et al (2007) Based on DNA technology symmetric encryption method. Sci China 37(2):175–182

    Google Scholar 

  10. Cui G, Qin L, Wang Y et al (2007) DNA in the calculation of the information security technology. Comput Eng Appl 43(20):139–142

    Google Scholar 

  11. Clelland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399(6736):533–534

    Google Scholar 

  12. Leier A et al (2000) Cryptography with DNA binary strands. Biosystems 57(1):13–22

    Article  Google Scholar 

  13. Gehani, A, LaBean T, Reif J (2004) DNA based cryptography. Aspects Mol Comput, pp 34–50

    Google Scholar 

  14. Xiao G et al (2006) New field of cryptography: DNA cryptography. Chin Sci Bull 51(12):1413–1420

    MathSciNet  MATH  Google Scholar 

  15. Lu M et al (2007) Symmetric-key cryptosystem with DNA technology. Sci China Ser F: Inf Sci 50(3):324–333

    Article  MATH  Google Scholar 

  16. Lai X et al (2010) Asymmetric encryption and signature method with DNA technology. Sci China Inf Sci 53(3):506–514

    Article  MathSciNet  Google Scholar 

  17. Leier A, Richter C, Banzhaf W et al (2000) Cryptography with DNA binary strands. Biosystems 57(1):13–22

    Article  Google Scholar 

Download references

Acknowledgments

This Project supported by CNSF (Grant number: 61170172, 60873144, 61073102, 60973050) and College youth talents foundation of Anhui Province (2012SQRL259).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhixiang Yin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

� 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, J., Yin, Z. (2013). The Advantages and Disadvantages of DNA Password in the Contrast to the Traditional Cryptography and Quantum Cryptography. In: Yin, Z., Pan, L., Fang, X. (eds) Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013. Advances in Intelligent Systems and Computing, vol 212. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37502-6_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37502-6_38

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37501-9

  • Online ISBN: 978-3-642-37502-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics