Call for Paper - March 2020 Edition
IJCA solicits original research papers for the March 2020 Edition. Last date of manuscript submission is February 20, 2020. Read More

A Symmetric Encryption Algorithm based on DNA Computing

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 97 - Number 16
Year of Publication: 2014
Authors:
Fatma E. Ibrahim
M. I. Moussa
H. M. Abdalkader
10.5120/17094-7634

Fatma E Ibrahim, M I Moussa and H M Abdalkader. Article: A Symmetric Encryption Algorithm based on DNA Computing. International Journal of Computer Applications 97(16):41-45, July 2014. Full text available. BibTeX

@article{key:article,
	author = {Fatma E. Ibrahim and M. I. Moussa and H. M. Abdalkader},
	title = {Article: A Symmetric Encryption Algorithm based on DNA Computing},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {97},
	number = {16},
	pages = {41-45},
	month = {July},
	note = {Full text available}
}

Abstract

Deoxyribo Nucleic Acid (DNA) computing is a new method of simulating the bimolecular structure of DNA and computing by means of molecular biology. DNA cryptography is a new field which has been explored worldwide. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology, which may bring forward a new hope for unbreakable algorithms. This paper proposed a new DNA cryptographic algorithm which used the key features of DNA and amino acid coding to overcome limitations of the classical One Time Pad (OTP) cipher. A significant feature of the proposed algorithm is that; it is considered an encryption and hiding algorithm at the same time. The proposed algorithm also enhances the security level of OTP cipher. An evaluation for the proposed algorithm is performed according to randomness testing by using the National Institute of Standards and Technology (NIST) test. The study showed that the proposed algorithm had better performance with respect to time, capacity and robustness compared to previous studies.

References

  • Leonard Adleman,"Molecular Computation of Solutions to Combinatorial Problems", Science, 266:1021-1024, November 1994.
  • Sherif T. Amin, , Magdy Saeb and Salah El-Gindi, "A DNA based Implementation of YAEA Encryption Algorithm", International Conference on Computational Intelligence (CI 2006), San Francisco, Nov. 20, 2006.
  • Mona Sabry et al. ,"A DNA and Amino Acids-Based Implementation of Playfair Cipher", International Journal of Computer Science and Information Security (IJCSIS), Vol. 8 No. 3, 2010.
  • TAYLOR Clelland Catherine, Viviana Risca and Carter Bancroft,"Hiding Messages in DNA Microdots", Nature Magazine Vol. 399, June 10, 1999.
  • H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee and C. H. Huang, "Data hiding methods based upon DNA sequences", Information Sciences,vol. 180, no. 11, pp. 2196-2208, 2010.
  • Hongjun Liua, Da Lin and Abdurahman Kadir, "A novel data hiding method based on deoxyribonucleic acid coding", Computers and Electrical Engineering, vol. 39, pp. 1164–1173, 2013.
  • Ying-Hsuan Huang, Chin-Chen Chang and Chun-Yu Wu, "A DNA-based data hiding technique with low modification rates", Multimedia Tools and applications. Springer Science+Business Media, LLC 2012.
  • Dominik Heider, Angelika Barnekow,"DNA-based watermarks using the DNA-Crypt algorithm", BMC Bioinformatics , Heider and Barnekow; licensee BioMed Central Ltd 2007.
  • A. Gehani, T. LaBean and J. Reif," DNA-Based Cryptography", In: Jonoska, N. , P?aun, G. , Rozenberg, G. (eds. ) Aspects of Molecular Computing. LNCS, vol. 2950, pp. 167–188. Springer, Heidelberg 2003.
  • J. Chen, "A DNA-Based Biomolecular Cryptography Design". In: 2003 IEEE International Symposium on Circuits and Systems, vol. 3, pp. 822–825 (2003).
  • Miki Hirabayashi, Hiroaki Kojima and Kazuhiro Oiwa, "Design of True Random One-Time Pads in DNA XOR Cryptosystem", F. Peper et al. (Eds. ): IWNC 2009, PICT 2, pp. 174–183, Springer 2010.
  • Sonia Dhull, Vinod Saroha, "Enhancing Security of One Time Pad Cipher by Double Columnar Transposition Method", International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 3, March 2013.
  • William Stallings. "Cryptography and Network Security", Third Edition, Prentice Hall International, 2003.
  • A. Atito, A. Khalifa and S. Z. Reda, "DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques", Journal of Communications and Computer Engineering, Volume 2, Issue 3, pages 44: 49, 2012.
  • Website, NCBI Database: .