CFP last date
22 April 2024
Reseach Article

DNA Computing based Elliptic Curve Cryptography

by P. Vijayakumar, V. Vijayalakshmi, G. Zayaraz
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 36 - Number 4
Year of Publication: 2011
Authors: P. Vijayakumar, V. Vijayalakshmi, G. Zayaraz
10.5120/4481-6304

P. Vijayakumar, V. Vijayalakshmi, G. Zayaraz . DNA Computing based Elliptic Curve Cryptography. International Journal of Computer Applications. 36, 4 ( December 2011), 18-21. DOI=10.5120/4481-6304

@article{ 10.5120/4481-6304,
author = { P. Vijayakumar, V. Vijayalakshmi, G. Zayaraz },
title = { DNA Computing based Elliptic Curve Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 36 },
number = { 4 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume36/number4/4481-6304/ },
doi = { 10.5120/4481-6304 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:22:16.588707+05:30
%A P. Vijayakumar
%A V. Vijayalakshmi
%A G. Zayaraz
%T DNA Computing based Elliptic Curve Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 36
%N 4
%P 18-21
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is the science of using mathematics to encrypt and decrypt the data for secure communication. It enables the user to transmit the data in insecure network so that it cannot be read by anyone except the intended recipient. RSA and Elliptic Curve Cryptography are the existing public key cryptography technique which is used to provide secure data transmission. Existing DNA based cryptography technique need more computational power and more processing time with larger key sizes to provide higher level of security. This imposes a limitation on public key cryptography scheme. In order to overcome this limitation, a new cryptographic scheme is proposed which provides first level of security with smaller key size and less computation overhead using DNA Computing technique. The second level of security is provided by using low computation ECC encryption and decryption algorithm. The novelty of this proposed scheme is advantages of both ECC and DNA computation is exploited in providing a high level of data security. Finally, the performance of cryptography scheme is compared with the existing cryptographic schemes.

References
  1. N.Koblitz, “Elliptic Curve Cryptosystems, Mathematics of Computation”, Vol A8, 1987, pp.203 -209.
  2. Amara. M , Siad. A, “Elliptic Curve Cryptography and Its Applications”, in the IEEE proceeding of International workshop on Systems, Signal Processing and their Applications, May-2011, pp: 247-250.
  3. Sadeg, S. Gougache, M. Mansouri, N. Drias, H., “An encryption algorithm inspired from DNA”in the IEEE proceedings of International Conference on Machine and Web Intelligence (ICMWI), oct-2010,PP:344-349.
  4. G.Zayaraz, V.Vijayalakshmi et al, “Securing Biometric Authentication Using DNA Sequence and Naccache Stern Knapsack Cryptosystem” in the proceeding of International Conference On Control, Automation, Communication And Energy Conservation, June 2009, pp.1-4.
  5. Guangzhao Cui, Limin Qin et al, “An Encryption Scheme Using DNA Technology,” in the IEEE proceeding of Fourth International Conference on Bio-Inspired Computing, Sept 2009, pp. 37-41.
  6. Xing Wang , Qiang Zhang, “DNA computing based Cryptography, in the IEEE proceeding of Fourth International Conference on Bio-Inspired Computing, Nov 2009, pp.1-3.
  7. Liu Feng, Gao Dong-Mei, “DNA Algorithm of Verifiable Secret Sharing,” in IEEE Proc International Conference on Future Computer and Communication, June 2009, pp. 244-246.
  8. Li Xin-she, Zhang Lei,Hu Yu-pu, “ A novel generation key scheme based on DNA,” in the IEEE proceeding of International Conference on Computational Intelligence and Security, December 2008, pp. 264-266.
  9. Otirios A. Tsaftaris, and Aggelos K. Katsaggelos, “Retrieval Ef?ciency of DNA-Based Databases of Digital Signals, in the IEEE proceeding of Transactions on nanobioscience, vol. 8, no. 3, september 2009, pp. 259-270.
  10. Liu Chang, Yang Chi, “Factoring RSA modulo N with High Bits of P Known Revisited ”,in the proceedings of IEEE International Symposium on IT in Medicine & Education, Aug- 2009,pp:495-500.
  11. Qing Liu, Yunfei Li, Lin Hao, Hua Peng,” Two Efficient Variants Of The RSA Cryptosystem”, in the IEEE proceedings of international conference on computer design and applicaionm,June-2010,PP: V5-550 - V5-553.
  12. Padma .Bh, D.Chandravathi , P.Prapoorna Roja, “Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method,” in the proceeding of International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, pp. 1904-1907.
  13. S.Maria C. Vigila, K.Muneeswaran, “Implementation of Text based Cryptosystem Using ECC,” in the IEEE proceeding of ICAC’09, pp. 82-85.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptography (ECC) Rivest Shamir and Adleman (RSA) Deoxyribo Nucleic Acid (DNA) Koblitz’s Algorithm Public Key Cryptography