Information Security-Based Nano- and Bio-Cryptography

Information Security-Based Nano- and Bio-Cryptography

W. K. Hamoudi, Nadia M. G. Al-Saidi
ISBN13: 9781522531586|ISBN10: 1522531580|EISBN13: 9781522531593
DOI: 10.4018/978-1-5225-3158-6.ch056
Cite Chapter Cite Chapter

MLA

Hamoudi, W. K., and Nadia M. G. Al-Saidi. "Information Security-Based Nano- and Bio-Cryptography." Biomedical Engineering: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 1316-1337. https://doi.org/10.4018/978-1-5225-3158-6.ch056

APA

Hamoudi, W. K. & Al-Saidi, N. M. (2018). Information Security-Based Nano- and Bio-Cryptography. In I. Management Association (Ed.), Biomedical Engineering: Concepts, Methodologies, Tools, and Applications (pp. 1316-1337). IGI Global. https://doi.org/10.4018/978-1-5225-3158-6.ch056

Chicago

Hamoudi, W. K., and Nadia M. G. Al-Saidi. "Information Security-Based Nano- and Bio-Cryptography." In Biomedical Engineering: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1316-1337. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3158-6.ch056

Export Reference

Mendeley
Favorite

Abstract

Information security can provide confidentiality, integrity, and availability for society to benefit efficiently from data storage and open networks. Free space communication networks suffer from adversaries who interfere with data on networked computers. Inventing new protection techniques has arisen to ensure integrity and authenticity of digital information. This chapter introduces Nano and Bio techniques in cryptography to enhance the information security systems. Tasks unfeasible on a classical computer can now be performed by quantum computers, yielding a big impact on online security. Threats of exponentially fast quantum algorithms on business transactions could be overcome by this new technology. Based on biological observations, the exploration of biometric cryptography and authentication to determine individuals' authenticity can be done through numeric measurements. This provides very reliable automated verification and strong protection against biometric system attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.