CFP last date
20 May 2024
Reseach Article

A New Cryptographic Model based on Residue Number System and Ribonucleic Acid Properties

by Abolore Muhamin Logunleko, Kolawole Bariu Logunleko, Kazeem Alagbe Gbolagade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 21
Year of Publication: 2020
Authors: Abolore Muhamin Logunleko, Kolawole Bariu Logunleko, Kazeem Alagbe Gbolagade
10.5120/ijca2020920703

Abolore Muhamin Logunleko, Kolawole Bariu Logunleko, Kazeem Alagbe Gbolagade . A New Cryptographic Model based on Residue Number System and Ribonucleic Acid Properties. International Journal of Computer Applications. 175, 21 ( Sep 2020), 36-41. DOI=10.5120/ijca2020920703

@article{ 10.5120/ijca2020920703,
author = { Abolore Muhamin Logunleko, Kolawole Bariu Logunleko, Kazeem Alagbe Gbolagade },
title = { A New Cryptographic Model based on Residue Number System and Ribonucleic Acid Properties },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2020 },
volume = { 175 },
number = { 21 },
month = { Sep },
year = { 2020 },
issn = { 0975-8887 },
pages = { 36-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number21/31579-2020920703/ },
doi = { 10.5120/ijca2020920703 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:25:42.257677+05:30
%A Abolore Muhamin Logunleko
%A Kolawole Bariu Logunleko
%A Kazeem Alagbe Gbolagade
%T A New Cryptographic Model based on Residue Number System and Ribonucleic Acid Properties
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 21
%P 36-41
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The presence of information technology has drastically transformed ways of communication with one another. This development has tremendously increased the usage and ways of communication leaving behind the security consideration of what is being transmitted through a communication channel. Cryptography plays a vital role in securing information. Therefore, this research reveals a technical model on computation of the cryptography algorithms. The aim to be considered is the enhanced security of the encrypted data and thus fills the gap of security. Additionally, this newly concept integrate residue number system, Chinese reminder theorem and the properties of ribonucleic acid to generate a symmetric key by shuffling the key with the textual data, making the transformation of each character of the data better each time it is shuffled and thus, making the final output stronger to be broken. Subsequently, the developed concept secures the data more adequately than the existing one because of the designed pattern and confusion created during the process.

References
  1. Saha, R. and Haque, R. (2017). A novel Rolling based DNA Cryptography. Journal of Bioinformatics and Genomics, Vol.1,No.3, pp.1-6.
  2. Karandeep, K. (2016). A Double Layer Encryption Algorithm based on DNA and RSA for Security on Cloud. International Research Journal of Engineering and Technology, Vol.03, No.03, pp.1742-1745.
  3. Zhang, Y. (2017). DNA based random key generation and management for OTP encryption. BioSystems, Vol.159, pp.51– 63.
  4. Logunleko, A.M. and Gbolagade, K.A. (2020). A Differential Computational Encryption Modeling Technique on Textual Data. International Journal of Scientific Research in Computer Science and Engineering. Vol.8, Issue.1, pp.81-86, E-ISSN: 2320-7639.
  5. Isnar, S., and Andysah, P.U.S. (2016). Base64 Character Encoding and Decoding Modeling. International Journal of Recent Trends in Engineering & Research (IJRTER), Volume 02, Issue 12, ISSN: 2455-1457.
  6. Poonkuzhali dan, S.M., and Therasa, M. (2015). Data Hiding Using Visual Cryptography for Secure Transmission. International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 4, pp. 440-441.
  7. Siahaan, A.P.U. (2016). A Three-Layer Visual Hash Function Using Adler-32. International Journal of Computer Science and Software Engineering, vol. 5, no. 7, pp. 142-147.
  8. Kalsi, S., Harleen, K. and Victor, C. (2018). DNA Cryptography and Deep Learning using Genetic Algorithm with New algorithm for Key Generation. Journal of medical systems, Vol. 42, No.1, pp.17.
  9. Aparna, A., Akshay, C.B. Juvin, V, and Kodakara, S. C. E. T. (2017). Video Piracy Detection Based on Audio Steganography, AES and DNA Cryptography. International Journal of Engineering Science, Vol. 7, No.3, pp. 5487-5489.
  10. Aremu, I.A., Gbolagade, K.A., (2017). An overview of Residue Number System. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 6, Issue 10, ISSN: 2278 – 1323 1618.
  11. Sharoun, A.O, (2013). Residue Number System (RNS). Poznan University of Technology Academic Journals, Zawia University, Libya. pp 265-270.
  12. Solanki, V. Vankani, P. Pukle dan S. Iyer, (2016). Multimedia Encryption Using Visual Cryptography. International Journal of Recent Trends in Engineering & Research, vol. 2, no. 9, pp. 261-264.
  13. Anton, H and Rorres, C. (2011). Elementary Linear Algebra, John Wiley & Sons.
  14. Bhanot, R and Hans, R (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security and Its Applications, vol. 9, no. 4, pp. 289-306.
  15. Youssef, M.I, Emam, A.E and Abd Elghany, M, (2012). Multi-Layer Data Encryption using Residue Number System in DNA Sequence, International Journal of Computer Applications (0975 – 8887) Volume 45– No.10.
  16. Karimi, M and Haider, W. (2017).Cryptography using DNA Nucleotides. International Journal of Computer Applications, vol. 168, no.7.
Index Terms

Computer Science
Information Sciences

Keywords

Residue Number System RNS Chinese Remainder Theorem CRT Deoxyribonucleic Acid DNA Ribonucleic Acid RNA RNA Binary Coded Scheme