Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/530140
Title: A DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences
Researcher: Akiwate, Bahubali M
Guide(s): Parthiban, Latha
Keywords: Computer Science
Computer Science Software Engineering
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2022
Abstract: We live in a world that is digitalized and the adoption of the digital route even for newlinefields that were reluctant to move out of the traditional way have widened boundaries and newlinehas made quality service available for a larger community of people. Today, we can newlinereside from India and take medical guidance from a doctor from any part of the world and newlinelarge part of this is due to the digitalization of our lives. We are happy to share our most newlineconfidential work such as intellectual property or an academic project or a copyrighted newlinephotograph or a motion picture via mail or through other mediums and digital signatures newlinehave made even signing of key documents, digital. Can we imagine, buying a property or newlineany other valuable with a digital signature, 10 years ago? newlineAs life has moved on to the digital space and most of us have a mobile gadget or a newlinecomputing device as our best partner, concerns related to the safety of our digital newlinecommunications have also increased multifold. A breakaway into a clinical database can newlineexpose the personal clinical data of millions of patients. A cracking of banking or an newlineinsurance system can leak millions of user financial data. Wiki leaks as we all are aware newlineof, has exposed some of the top communications of political leaders worldwide and has newlinethreaten to shake the equilibrium of powerful countries. As the stakes have got higher and newlinehigher and heads have rolled on account of data leaks, at the heart of this tsunami of newlinedigital activity is cryptography. newlineCryptography is not a recent phenomenon. In fact, Cryptography is as old as newlinewireless communications go or beyond. But cryptography continues to be torchbearer of newlinesecure digital transaction or communication. Various cryptographic techniques have been newlinedeveloped in the past to offer encryption and decryption of digital data. Traditional newlinecryptographic algorithms such as Data Encryption Standard (DES), Advanced Encryption newlineStandard (AES), Rivest, Shamir and Adleman (RSA), and others are based on the newlinemathematical algorithms and require a lot of computing po
Pagination: 113
URI: http://hdl.handle.net/10603/530140
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File168.59 kBAdobe PDFView/Open
02_prelim pages.pdf701.7 kBAdobe PDFView/Open
03_content.pdf85.89 kBAdobe PDFView/Open
04_abstract.pdf79.84 kBAdobe PDFView/Open
05_chapter 1.pdf180.95 kBAdobe PDFView/Open
06_chapter 2.pdf371.29 kBAdobe PDFView/Open
07_chapter 3.pdf1.85 MBAdobe PDFView/Open
08_chapter 4.pdf289.71 kBAdobe PDFView/Open
09_chapter 5.pdf294.31 kBAdobe PDFView/Open
10_annexures.pdf149 kBAdobe PDFView/Open
80_recommendation.pdf100.25 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: