Presentation DNA Cryptography
Presentation DNA Cryptography
Cryptography
Constanza Lampasona
2. Cryptography
3. DNA Computing
5. Conclusions
Secret writing
2. Cryptography
3. DNA Computing
5. Conclusions
Protecting information
Ensure privacy
Reverse of Encryption
Encryption Decryption
Secret KEY
d e f g h i j k l m n o p q r s t u v w x y z a b c
• 64-bit key.
IP
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7
• 16 iterations.
IP-1
40 8 48 16 56 24 64 32
39 7 47 15 55 23 63 31
Plain-text
38 6 46 14 54 22 Cipher-text
62 30
37 5 45 13 53 21 61 29
36 4 44 12
Key 52 20 60 28
35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26
33 1 41 9 49 17 57 25
2. Cryptography
3. DNA Computing
5. Conclusions
“Solution”
“Solution”
2. Cryptography
3. DNA Computing
5. Conclusions
Break DES!!!
2. Cryptography
3. DNA Computing
5. Conclusions
Cryptography
DES
Breaking DES