6th Conference of Biomathematics, 2008-07-25 to 2008-07-28.
In this paper, we study two DNA-based encryption methods, the insertion method and the substitution method. For each method, we point out the security problem that could be utilized by intruders. We conclude that the two-encryption methods cannot resist the active attack.
DNA sequence; cryptography; encryption; decryption; active attack