CFP last date
20 May 2024
Reseach Article

Secure Data communication and Cryptography based on DNA based Message Encoding

by Snehal Javheri, Rahul Kulkarni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 16
Year of Publication: 2014
Authors: Snehal Javheri, Rahul Kulkarni
10.5120/17271-7733

Snehal Javheri, Rahul Kulkarni . Secure Data communication and Cryptography based on DNA based Message Encoding. International Journal of Computer Applications. 98, 16 ( July 2014), 35-40. DOI=10.5120/17271-7733

@article{ 10.5120/17271-7733,
author = { Snehal Javheri, Rahul Kulkarni },
title = { Secure Data communication and Cryptography based on DNA based Message Encoding },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 16 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number16/17271-7733/ },
doi = { 10.5120/17271-7733 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:23.960343+05:30
%A Snehal Javheri
%A Rahul Kulkarni
%T Secure Data communication and Cryptography based on DNA based Message Encoding
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 16
%P 35-40
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information flows throughout the network that may be of local or of global scope. It is mandatory to secure that information to prevent from unauthorized access of it by any node in the path. There are various users and organizations who want to prevent their crucial data from attackers and hackers. Also we need to ensure privacy, integrity and confidentiality about data in the network for it to be a reliable. Thus to achieve security it is very necessary to encode the data before sending it through the various unreliable communication channels available to make it unreadable. This is where the Cryptography comes into picture. Various cryptographic systems were developed in the past year but now the latest development on this field is DNA Cryptography. This concept has emerged after the disclosure of computational ability of Deoxyribo Nucleic Acid (DNA). In this field of DNA Cryptography many research work is going on to make the computational process more complex to the unauthorized user. Well, presently it is in the development phase and requires a lot of work and research to reach an established stage. In this paper; a proposal is given where the concept of DNA is being used in encryption and decryption process. The theoretical analysis shows this method to be efficient in computation, storage and transmission; and it is very powerful in certain attacks. This paper also proposes a secured symmetric key generation scheme which generates primary cipher and this primary cipher is then converted into final cipher using DNA sequences, so as to make it again more complicated in reading. Finally, the implementation methodology and experimental results are presented. And then conclusion with future work is described in the last section.

References
  1. Ashish Gehani, T. LaBean and J. Reif, "DNA-based cryptography", DIMACS DNA Based Computers V, American Mathematical Society, 2000.
  2. Ashish Gehani et al , "DNA-based cryptography", Lecture Notes in Computer Science, vol. 2950, pp. 167-188, 2004.
  3. Atul Kahate, "Computer and Network Security", Third Edition,Tata McGraw Hill Publication Company Limited,2013.
  4. Beenish Anam,Kazi Sakib,Md. Alamgir Hossain,Keshav Dahal, "Review on the Advancements of DNA Cryptography" arXiv:1010. 0186v[cs. CR], 1st Oct 2010.
  5. Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta,"An improved Symmetric key cryptography with DNA Based strong cipher"-ICDeCom-2011, Feb' 24-25'2011, pp. 1-5.
  6. Bibhash Roy et al, "A DNA based Symmetric key Cryptography"-ICSSA- 2011, 24-25 Jan'11.
  7. Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta,"An Enhanced key Generation Scheme based cryptography with DNA Logic"-IJICT-2010-11, Volume 1 No. 8, Dec' 2011.
  8. DNA Structure, http://ijarovic. wordpress. com, 2012.
  9. Er. Ranu Soni Er. Vishakha Soni,Sandeep Kumar Mathariya, "Innovative field of cryptography: DNA cryptography",- DOI:10. 5121/csit. 2012. 2115,CSCP-2012.
  10. G. Cui, L. Qin, Y. Wang, and X. Zhang, "An encryption scheme using DNA technology," in IEEE 3rd International conference on Bio-Inspired Computing: Theories and Applications (BICTA08), Adelaid, SA, Australia, 2008, pp. 37–42.
  11. Gehani Ashish, La Bean, Thomas H. Reif, John H,"DNA-Based Cryptography",Department of Computer Science, Duke University, June 1999.
  12. Genetic home reference, a service of the U. S. National Library of Medicine, http://ghr. nlm. nih. gov/ handbook/basics/dna, 2012.
  13. Guangzhao Cui Limin Qin Yanfeng Wang Xuncai Zhang. "An encryption scheme using DNA technology. " Bio-Inspired Computing: Theories and Applications, 2008. BICTA 2008. 3rd International Conference on Publication Date: Sept. 28 2008-Oct. 1 2008 ISBN: 978-1-4244-2724-6, page(s):37-42; Adelaide, SA.
  14. Guangzhao Cui Limin Qin, Yanfeng Wang, Xuncai Zhang, "An Encryption Scheme Using DNA Technology", IEEE, 978-1-4244-2724-6/08, 2008.
  15. L. Adleman, "Molecular computation of solutions to combinatorial problems," Science, JSTOR, vol. 266, pp. 1021–1025, 1994.
  16. L. Eschenauer and V. D. Gligor. "A key-management scheme for distributed sensor networks. " Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, pp. 41– 47, November 18-22 2002.
  17. Leroy Hood and David Galas, "The digital code of DNA", vol 421, no. 6921, 2003.
  18. Miki Hirabayashi, Akio Nishikawa, "Analysis on Secure and Effective Applications of a DNA-Based Cryptosystem", IEEE computer Society, 978-0-7695-4514-1/11, 2011.
  19. Nucleotide base pairing of strands, http://dedunn. edblogs. org, 2012.
  20. P Pankaj Rakheja,"Integrating DNA Computing in International Data Encryption Algorithm", IJCA, Volume 26-No. 3, 2011.
  21. Tushar Mandge, Vijay Choudhary, "A DNA Encryption Technique Based on Matrix Manipulation and Secure key Generation Scheme", ICICES Journal, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Security Encryption Decryption Key generation Cipher text DNA cryptography.