Anefficient 2-Step DNA symmetric cryptography algorithm based on dynamic data structures

  • Authors

    • Jossy P. George
    • Joseph Varghese Kureethara
    2018-03-11
    https://doi.org/10.14419/ijet.v7i2.6.10140
  • Security, Cryptography, Bio-Encryption, Bio-computing, DNA, DNA Cryptography
  • The security of text has become highly demanding in today’s fast growing networking world. DNA computing is one of the emerging technologies in the arena of huge data storage and parallel computation. A single gram of DNA holds 5.5 petabytes of data. This leads to the increased risk in data communication. DNA in computers is mapped to human genome. Thus, the sequence of nucleotide base constructs the foundation of uniqueness. In this paper, a new scheme acronymed as –‘Cryptography on DNA Storage’-CDS is provided. It performs the DNA data encryption in just two-step by using random private key for each letter in the plaintext and parallel swapping of the resultant text in small clusters. It is discussed keeping the time and space complexity of the algorithm in concern.

  • References

    1. [1] Cui, G., Qin, L., Wang, Y. and Zhang, X. (2008, September). An encryption scheme using DNA technology. In Bio-Inspired Computing: Theories and Applications, 2008. BICTA 2008. 3rd International Conference on (pp. 37-42). IEEE.

      [2] Gahlaut, A., Bharti, A., Dogra, Y. and Singh, P. (2017, May). DNA Based Cryptography. In International Conference on Information, Communication and Computing Technology (pp. 205-215). Springer, Singapore.

      [3] Haque, R. and Saha, R. (2017). A novel Rolling based DNA Cryptography. Journal of Bioinformatics and Genomics, (1 (3)).

      [4] Kalsi, S., Kaur, H., & Chang, V. (2018). DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Journal of medical systems, 42(1), 17.

      [5] Kress, W. J. and Erickson, D. L. (2008). DNA barcodes: genes, genomics, and bioinformatics. Proceedings of the National Academy of Sciences, 105(8), 2761-2762.

      [6] Martin, T. (2011, February). Undecryptable symmetric encryption. In GCC Conference and Exhibition (GCC), 2011 IEEE (pp. 225-228). IEEE.

      [7] Menezes, A. J., Van Oorschot, P. C. and Vanstone, S. A. (1996). Handbook of applied cryptography. CRC press.

      [8] Pramanik, S., and Setua, S. K. (2012, December). DNA cryptography. In Electrical & Computer Engineering (ICECE), 2012 7th International Conference on (pp. 551-554). IEEE.

      [9] Roy, B., Rakshit, G., Singha, P., Majumder, A. andDatta, D. (2011, February). An improved Symmetric key cryptography with DNA Based strong cipher. In Devices and Communications (ICDeCom), 2011 International Conference on (pp. 1-5). IEEE.

      [10] Sadeg, S., Gougache, M., Mansouri, N.andDrias, H. (2010, October). An encryption algorithm inspired from DNA. In Machine and Web Intelligence (ICMWI), 2010 International Conference on (pp. 344-349). IEEE.

      [11] Tornea, O. and Borda, M. E. (2013, January). Security and complexity of a DNA-based cipher. In Roedunet International Conference (RoEduNet), 2013 11th (pp. 1-5). IEEE.

      [12] Wang, X.and Zhang, Q. (2009, October). DNA computing-based cryptography. In Bio-Inspired Computing, 2009. BIC-TA'09. Fourth International Conference on (pp. 1-3). IEEE.

      [13] Wang, Z., Zhao, X., Wang, H. and Cui, G. (2013, May). Information hiding based on DNA steganography. In Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on (pp. 946-949). IEEE.

      [14] Yunpeng, Z., Yu, Z., Zhong, W. and Sinnott, R. O. (2011, October). Index-based symmetric DNA encryption algorithm. In Image and Signal Processing (CISP), 2011 4th International Congress on (Vol. 5, pp. 2290-2294). IEEE.8

  • Downloads

  • How to Cite

    P. George, J., & Varghese Kureethara, J. (2018). Anefficient 2-Step DNA symmetric cryptography algorithm based on dynamic data structures. International Journal of Engineering & Technology, 7(2.6), 141-146. https://doi.org/10.14419/ijet.v7i2.6.10140