Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

A Review on Cryptography Techniques using DNA Computing

Pritesh Bhimani, , , ,
Computer Engineering, Diwaliba Polytechnic

Cryptography and steganography are one of the most critical and needed areas of computer and data security. A mixer of both can make more secure the data. Cryptography is the way to secure the transfer data from sender to receiver. Steganography is a way to ensure the data by the hiding it. One new term is added with the Cryptography for making data more secure is DNA. DNA cryptography is a new hopeful way in cryptography research. DNA can be used to store and transmit the information with the more secure method and most used to perform the computation. Combination of DNA and Cryptography make sure for the security in this world. Nowadays DNA cryptography is in the development phase, and it requires lots of work, efforts and research to reach a fully developed stage. This paper describes different DNA based cryptography techniques that increase the security of cryptography techniques.

Pritesh Bhimani (2018). A Review on Cryptography Techniques using DNA Computing . International Journal of Computer Engineering In Research Trends, 5(6), 187-191. Retrieved from

Keywords : DNA structure, Polymer Chain Reaction (PCR), Central Dogma of Molecular biology, DNA digital coding, DNA Cryptography, RSA, OTP, IDEA.

[1]	M Borda, T. Olga, “DNA Secret Writing Techniques”, Communications (COMM), 2010 8th International Conference. Pp. 451-456, IEEE 2010. 
[2]	C. Guangzhao, Q. Limin, W. Yanfeng, Z. Xuncai, “An Encryption Scheme Using DNA Technology ”, Bio-Inspired Computing: Theories and Applications, 2008. BICTA 2008. 3rd International Conference. Pp. 37-42, IEEE-2008. 
[3]	Crick Francis, "Molecular Structure of Nucleic acid: A Structure of Deoxyribose Nucleic Acid", April 25, 1953. Nature 171(April 25,1953): 737-738
[4]	Dhawan Sanjeev, Saini Alisha, “Secure Data Transmission Techniques Based on DNA Cryptography”, International Journal of Emerging Technologies in Computational and Applied Sciences, 2012.
[5]	Wang Xing, Zhang Qiang, “DNA computing-based cryptography", Bio-Inspired Computing, 2009. BIC-TA '09. Fourth International Conference. PP. 1-3, IEEE 2009
[6]	P. Rakheja, “Integrating DNA Computing in International Data Encryption Algorithm (IDEA)”, International Journal of Computer Applications, 2011, Volume 26 – no.-3, July 2011.

DOI Link :

Download :

Refbacks : Currently there are no refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal