Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Private Key Cryptography

Handbook of Research on Natural Computing for Optimization Problems
Private key cryptography is a cryptographic technique where only one key is used to encrypt the plain text and the same key is used to decrypt the corresponding cipher text. This technique is also known as Symmetric key cryptography or Secret key cryptography. Both sender and receiver are agreed upon sharing the same key for encryption and decryption process prior to the commencement of the secure data transmission. The fundamental problem of this technology is key distribution strategy.
Published in Chapter:
DNA Cryptography
Pradipta Roy (West Bengal University of Technology, India), Debarati Dey (West Bengal University of Technology, India), Debashis De (West Bengal University of Technology, India), and Swati Sinha (University of Calcutta, India & West Bengal University of Technology, India)
DOI: 10.4018/978-1-5225-0058-2.ch031
Abstract
In today's world, sensitive information like secret message, financial transaction, medical report, personal information is transferred over public communication channel. Since the advancement of communication begins, data security becomes a massive problem. The increasing rate of eavesdropping over communication channel leads the introduction of cryptography algorithm for data transmission. Different traditional cryptographic technique is adopted worldwide for protected data transmission. The recent advancement on this field is DNA based cryptography. This chapter describes the application of DNA as computational tool after the exposure of its capability was discovered by Leonard M. Adleman in 1994. Its random nature also helps the cryptography algorithm to become unbreakable. Conventional cryptography methods are sometimes susceptible to attack by the intruder. Therefore the idea of using codon based DNA as a computational tool is used in this cryptography method as an alternative method that fetches new hope in communication technology.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR