Anefficient 2-Step DNA symmetric cryptography algorithm based on dynamic data structures

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The security of text has become highly demanding in today’s fast growing networking world. DNA computing is one of the emerging technologies in the arena of huge data storage and parallel computation. A single gram of DNA holds 5.5 petabytes of data. This leads to the increased risk in data communication. DNA in computers is mapped to human genome. Thus, the sequence of nucleotide base constructs the foundation of uniqueness. In this paper, a new scheme acronymed as –‘Cryptography on DNA Storage’-CDS is provided. It performs the DNA data encryption in just two-step by using random private key for each letter in the plaintext and parallel swapping of the resultant text in small clusters. It is discussed keeping the time and space complexity of the algorithm in concern.


  • Keywords


    Security; Cryptography;Bio-Encryption;Bio-computing; DNA; DNA Cryptography

  • References


      [1] Cui, G., Qin, L., Wang, Y. and Zhang, X. (2008, September). An encryption scheme using DNA technology. In Bio-Inspired Computing: Theories and Applications, 2008. BICTA 2008. 3rd International Conference on (pp. 37-42). IEEE.

      [2] Gahlaut, A., Bharti, A., Dogra, Y. and Singh, P. (2017, May). DNA Based Cryptography. In International Conference on Information, Communication and Computing Technology (pp. 205-215). Springer, Singapore.

      [3] Haque, R. and Saha, R. (2017). A novel Rolling based DNA Cryptography. Journal of Bioinformatics and Genomics, (1 (3)).

      [4] Kalsi, S., Kaur, H., & Chang, V. (2018). DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Journal of medical systems, 42(1), 17.

      [5] Kress, W. J. and Erickson, D. L. (2008). DNA barcodes: genes, genomics, and bioinformatics. Proceedings of the National Academy of Sciences, 105(8), 2761-2762.

      [6] Martin, T. (2011, February). Undecryptable symmetric encryption. In GCC Conference and Exhibition (GCC), 2011 IEEE (pp. 225-228). IEEE.

      [7] Menezes, A. J., Van Oorschot, P. C. and Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.

      [8] Pramanik, S., and Setua, S. K. (2012, December). DNA cryptography. In Electrical & Computer Engineering (ICECE), 2012 7th International Conference on (pp. 551-554). IEEE.

      [9] Roy, B., Rakshit, G., Singha, P., Majumder, A. andDatta, D. (2011, February). An improved Symmetric key cryptography with DNA Based strong cipher. In Devices and Communications (ICDeCom), 2011 International Conference on (pp. 1-5). IEEE.

      [10] Sadeg, S., Gougache, M., Mansouri, N.andDrias, H. (2010, October). An encryption algorithm inspired from DNA. In Machine and Web Intelligence (ICMWI), 2010 International Conference on (pp. 344-349). IEEE.

      [11] Tornea, O. and Borda, M. E. (2013, January). Security and complexity of a DNA-based cipher. In Roedunet International Conference (RoEduNet), 2013 11th (pp. 1-5). IEEE.

      [12] Wang, X.and Zhang, Q. (2009, October). DNA computing-based cryptography. In Bio-Inspired Computing, 2009. BIC-TA'09. Fourth International Conference on (pp. 1-3). IEEE.

      [13] Wang, Z., Zhao, X., Wang, H. and Cui, G. (2013, May). Information hiding based on DNA steganography. In Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on (pp. 946-949). IEEE.

      [14] Yunpeng, Z., Yu, Z., Zhong, W. and Sinnott, R. O. (2011, October). Index-based symmetric DNA encryption algorithm. In Image and Signal Processing (CISP), 2011 4th International Congress on (Vol. 5, pp. 2290-2294). IEEE.8


 

View

Download

Article ID: 10140
 
DOI: 10.14419/ijet.v7i2.6.10140




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.