Call for Paper - May 2021 Edition
IJCA solicits original research papers for the May 2021 Edition. Last date of manuscript submission is April 20, 2021. Read More

DNA Computing based Elliptic Curve Cryptography

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 36 - Number 4
Year of Publication: 2011
Authors:
P. Vijayakumar
V. Vijayalakshmi
G. Zayaraz
10.5120/4481-6304

P Vijayakumar, V Vijayalakshmi and G Zayaraz. Article: DNA Computing based Elliptic Curve Cryptography. International Journal of Computer Applications 36(4):18-21, December 2011. Full text available. BibTeX

@article{key:article,
	author = {P. Vijayakumar and V. Vijayalakshmi and G. Zayaraz},
	title = {Article: DNA Computing based Elliptic Curve Cryptography},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {36},
	number = {4},
	pages = {18-21},
	month = {December},
	note = {Full text available}
}

Abstract

Cryptography is the science of using mathematics to encrypt and decrypt the data for secure communication. It enables the user to transmit the data in insecure network so that it cannot be read by anyone except the intended recipient. RSA and Elliptic Curve Cryptography are the existing public key cryptography technique which is used to provide secure data transmission. Existing DNA based cryptography technique need more computational power and more processing time with larger key sizes to provide higher level of security. This imposes a limitation on public key cryptography scheme. In order to overcome this limitation, a new cryptographic scheme is proposed which provides first level of security with smaller key size and less computation overhead using DNA Computing technique. The second level of security is provided by using low computation ECC encryption and decryption algorithm. The novelty of this proposed scheme is advantages of both ECC and DNA computation is exploited in providing a high level of data security. Finally, the performance of cryptography scheme is compared with the existing cryptographic schemes.

References

  • N.Koblitz, “Elliptic Curve Cryptosystems, Mathematics of Computation”, Vol A8, 1987, pp.203 -209.
  • Amara. M , Siad. A, “Elliptic Curve Cryptography and Its Applications”, in the IEEE proceeding of International workshop on Systems, Signal Processing and their Applications, May-2011, pp: 247-250.
  • Sadeg, S. Gougache, M. Mansouri, N. Drias, H., “An encryption algorithm inspired from DNA”in the IEEE proceedings of International Conference on Machine and Web Intelligence (ICMWI), oct-2010,PP:344-349.
  • G.Zayaraz, V.Vijayalakshmi et al, “Securing Biometric Authentication Using DNA Sequence and Naccache Stern Knapsack Cryptosystem” in the proceeding of International Conference On Control, Automation, Communication And Energy Conservation, June 2009, pp.1-4.
  • Guangzhao Cui, Limin Qin et al, “An Encryption Scheme Using DNA Technology,” in the IEEE proceeding of Fourth International Conference on Bio-Inspired Computing, Sept 2009, pp. 37-41.
  • Xing Wang , Qiang Zhang, “DNA computing based Cryptography, in the IEEE proceeding of Fourth International Conference on Bio-Inspired Computing, Nov 2009, pp.1-3.
  • Liu Feng, Gao Dong-Mei, “DNA Algorithm of Verifiable Secret Sharing,” in IEEE Proc International Conference on Future Computer and Communication, June 2009, pp. 244-246.
  • Li Xin-she, Zhang Lei,Hu Yu-pu, “ A novel generation key scheme based on DNA,” in the IEEE proceeding of International Conference on Computational Intelligence and Security, December 2008, pp. 264-266.
  • Otirios A. Tsaftaris, and Aggelos K. Katsaggelos, “Retrieval Ef?ciency of DNA-Based Databases of Digital Signals, in the IEEE proceeding of Transactions on nanobioscience, vol. 8, no. 3, september 2009, pp. 259-270.
  • Liu Chang, Yang Chi, “Factoring RSA modulo N with High Bits of P Known Revisited ”,in the proceedings of IEEE International Symposium on IT in Medicine & Education, Aug- 2009,pp:495-500.
  • Qing Liu, Yunfei Li, Lin Hao, Hua Peng,” Two Efficient Variants Of The RSA Cryptosystem”, in the IEEE proceedings of international conference on computer design and applicaionm,June-2010,PP: V5-550 - V5-553.
  • Padma .Bh, D.Chandravathi , P.Prapoorna Roja, “Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method,” in the proceeding of International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, pp. 1904-1907.
  • S.Maria C. Vigila, K.Muneeswaran, “Implementation of Text based Cryptosystem Using ECC,” in the IEEE proceeding of ICAC’09, pp. 82-85.