SlideShare a Scribd company logo
1 of 46
SRI SAI COLLEGE OF ENGINEERING ANDTECHNOLOGY
Badhani,Pathankot,Punjab,India
M.Tech. Thesis
A NEWAPPROACHTOWARDS
INFORMATION SECURITY BASEDON
DNA CRYPTOGRAPHY
Presented in partial fulfillment of the requirements for the degree of
Master of Technology in Computer Science & Engineering 
PRESENTING BY: ABHISHEK
MAJUMDAR(1269890)
UNDER THE SUPERVISION OF
PROF . MEENAKSHI SHARMA
Date: Jun 7, 2015
PUNJABTECHNICAL UNIVERSITY
Jalandhar- Kapurthala Highway, Jalandhar
Abstract
 Data security is one of the most significant issues of
data transmission and communication of today's world.
 In order to make secure data the researchers are
working on the evolvement of new cryptographic
algorithms.
 One of the efficient directions of achieving security data
communication is DNA based Cryptography.
 The proposed encoding and decoding process is based
on the use of the DNA sequencing string of the DNA
strands. The encoded text that is cipher text produced
by the encoding algorithm is looks similar with the
biological structure of the DNA strands sequence.
CSE Dept. SSCET, Badhani
2
Objective
 Encrypt the plain text into DNA sequence
(cipher text ) using new DNA encryption
technique.
 Decrypt this cipher text using DNA decryption
technique.
 Propose a new model to DNA cryptography
3
CSE Dept. SSCET, Badhani
Outline
 Introduction
 Basis of cryptography
 Brief idea of DNA
 DNA Cryptography
 Related Works
 Proposed Method
 Key Selection and Generation
 Encryption
 Algorithmic steps
 Work flow
 Ensuring Integrity
 Algorithmic steps
 Strength
 Conclusion
 Future Scope
 References
CSE Dept. SSCET, Badhani
4
 Cryptography: The art of protecting
information by transforming Plain Text into an
unreadable format.
 Those who possess the secret key can
decrypt the message .
 Encrypted messages can sometimes broken
by Cryptanalysis .
Basis of Cryptography
5
CSE Dept. SSCET, Badhani
Basis of Cryptography contd….
6
Figure 1.Basic Structure of Cryptography
Symmetric Cipher Model
7
CSE Dept. SSCET, Badhani
Figure 2. Simplified Model of Symmetric Encryption
Intruder’s Attack
Basis of Cryptography Intruder’s
Attack
8
Figure 3.Threat of Intruder
Background Study
 Genetic Code: Information encoded within
genetic material (DNA or mRNA base) .
 DNA sequence : Order of nucleotide bases in
the DNA molecule.
ATTAGCCTTATGCATGAACC
9
CSE Dept. SSCET, Badhani
Brief idea of DNA
 Deoxyribo Nucleic Acid
 Carrier of the genetic information
 A double stranded molecule.
 Each strand is based on 4 bases:
 Adenine (A)
 Thymine (T)
 Cytosine (C)
 Guanine (G)
DNA sequence
10
Brief idea of DNA Base Pairing
 Adenine (A) pairs with Thymine (T)
 Guanine (G) pairs with Cytosine(C)
Hydrogen
Bonds
CSE Dept. SSCET, Badhani
Figure 4. DNA Base Pairing
DNA Cryptography
 First introduced by L. Adleman in 1990s.
 Plaintext message Encoded into DNA
sequences.
 Based on one-time-pads .
12
CSE Dept. SSCET, Badhani
Related works
Bibhash Roy et al.
The use of round in the encoding scheme is taken from this
work.
Each time the user has to validate and authenticate them self
while accessing the service of the algorithm and every time a
new key is generated randomly for data communication.
The encryption scheme is designed based on the property of
DNA sequencing. It is much more difficult to do cryptanalyst the
coded form of message without knowing the selected DNA
sequence.
Mohammad Reza Abbasy et al.
Common DNA sequence is shared between the sender and
the receiver. Then the occurrences of the DNA representation of
the plain text in the reference DNA sequence is listed by using
an indexing method where every couple of nucleotides in DNA
reference sequence is given an index number.
CSE Dept. SSCET, Badhani
13
Related works contd…
H.Z. Hsu and R.C.T.Lee et al.
They presented three methods, the insertion method, the complementary pair method
and the substitution method.
For each method, they secretly select a reference DNA sequence, transform the
sequence into binary bits using binary coding scheme then sub divide the reference
sequence bits into segments of fixed number of bits and incorporate the secret message
into each segments.
After incorporating the message into the DNA sequence, the encoded form of the
message is transform into the DNA sequence form, send this encoded message
together with many other DNA, or DNA-like sequences to the receiver.
The receiver is able to identify the particular desired sequence that is hidden in the
encoded message and ignore all of the other sequences. Thus receiver could be able to
extract the message.
The process of encryption containing different information along with the original
message has also been extracted.
CSE Dept. SSCET, Badhani
14
Related works contd…
Sabari Pramaniket al.
A single stranded DNA string used as the secret key whose length
depends on the plain text and they used it to encrypt the plain text.
They divided the plain text into a number of DNA plain text packets
and attach the packet sequence number with each packet.
Nirmalya Karet al
A method in which rather than sharing the actual keys directly
between the sender and receiver, session keys are shared between
the sender and the receiver that actually bears the information about
the encryption keys.
They had designed an encryption scheme by using the technologies
of DNA synthesis and moreover extra bits and the faked DNA
sequence were padded within the cipher text that made the message
more secure from intruders.
CSE Dept. SSCET, Badhani
15
Related works contd…
Amal Khalifa et al.
Discussed a method of text hiding where the text is encrypted using
amino acid and DNA based playfair cipher and also use
complementary rules to hide the resultant cipher text in a DNA
sequence.
Wang, Xing et al.
A new way to show how cryptography works with DNA computing, it
can transmit message securely and effectively.
They have used RSA algorithm belongs to asymmetric key
cryptography along with DNA computing theory.
Suman Chakraborty et al.
Incorporated an idea of DNA based image encryption using soduko
solution matrix to perform some computations on behalf of the
message.CSE Dept. SSCET, Badhani
16
Proposed method
 3 phases :
 Key Generation and Selection
 256 bit key
 Round key generation
 Encryption of Plain Text:
 Block Ciphering
 DNA Encoding, Primer padding, Hash Mapping
 Ensuring Integrity:
 Shared Hash Function.
CSE Dept. SSCET, Badhani
17
Key Selection & Generation Algorithmic
step
Input: A randomly chosen 256 bit key
Output: 4 round encryption keys
 Step 1. Let, K be the key, K= '1011 1010 0011 0011 1100 1100 1010 0011 0000
0000 0000 0000 1111 1111 1111 1111 1110 1110 1001 0011 0000 1010 1111 0100
1011 1100 0101 1001 0011 1011 0001 1010 0011 1001 0011 0100 1010 1100 1001
1010 0000 0001 1000 1010 1111 0001 1010 0101 0000 0001 1010 1100 1000 1111
1000 1111 0001 1111 0011 0010 1100 0001 1111 1000‘
 Step2. Transformation of key values into matrix row wise
Table 1. Key MatrixCSE Dept. SSCET, Badhani
18
Key Selection & Generation Algorithmic
step
 Step 3. Read the key values column wise (two columns at a time), label the
sub-keys with DNA bases (A, T, C, G) as follows:
A= '1011 0000 1110 1011 0011 0000 0000 0001 1010 0000 1110 1100 1001
0001 0001 1111'
T= '0011 0000 1001 0101 0011 1000 1010 0011 0011 0000 0011 1001 0100
1010 1100 0010'
C= '1100 1111 0000 0011 1010 1111 1000 1100 1100 1111 1010 1011 1100
0001 1111 0001'
G= '1010 1111 1111 0001 1001 1010 1000 1111 0011 1111 0100 1010 1010
0101 1111 1000'
CSE Dept. SSCET, Badhani
19
Key Selection & Generation Algorithmic
step
 Step 4. Let, randomly selected DNA sequence with DNA bases be 'TGCA'
then,
Round 1 key:
Key1=TGCA = '0011 0000 1001 0101 0011 1000 1010 0011 0011 0000 0011 1001
0100 1010 1100 0010 1010 1111 1111 0001 1001 1010 1000 1111 0011 1111 0100
1010 1010 0101 1111 1000 1100 1111 0000 0011 1010 1111 1000 1100 1100 1111
1010 1011 1100 0001 1111 0001 1011 0000 1110 1011 0011 0000 0000 0001 1010
0000 1110 1100 1001 0001 0001 1111‘
Round 2 key:
Key2 =ATGC = '1011 0000 1110 1011 0011 0000 0000 0001 1010 0000 1110 1100
1001 0001 0001 1111 0011 0000 1001 0101 0011 1000 1010 0011 0011 0000 0011
1001 0100 1010 1100 0010 1010 1111 1111 0001 1001 1010 1000 1111 0011 1111
0100 1010 1010 0101 1111 1000 1100 1111 0000 0011 1010 1111 1000 1100 1100
1111 1010 1011 1100 0001 1111 0001'
CSE Dept. SSCET, Badhani
20
Key Selection & Generation Algorithmic
step
Round 3 key:
Key3 = CATG = '1100 1111 0000 0011 1010 1111 1000 1100 1100 1111 1010 1011
1100 0001 1111 0001 1011 0000 1110 1011 0011 0000 0000 0001 1010 0000 1110
1100 1001 0001 0001 1111 0011 0000 1001 0101 0011 1000 1010 0011 0011 0000
0011 1001 0100 1010 1100 0010 1010 1111 1111 0001 1001 1010 1000 1111 0011
1111 0100 1010 1010 0101 1111 1000‘
Round 4 key:
Key4 = GCAT = '1010 1111 1111 0001 1001 1010 1000 1111 0011 1111 0100 1010
1010 0101 1111 1000 1100 1111 0000 0011 1010 1111 1000 1100 1100 1111 1010
1011 1100 0001 1111 0001 1011 0000 1110 1011 0011 0000 0000 0001 1010 0000
1110 1100 1001 0001 0001 1111 0011 0000 1001 0101 0011 1000 1010 0011 0011
0000 0011 1001 0100 1010 1100 0010'
CSE Dept. SSCET, Badhani
21
Key Selection & Generation
Workflow
Figure 5. 4 Round Keys Generation Operation
22
Message Encryption Algorithmic step
Input: Input File; Round Keys.
Output: Cipher text
 Step 1: Read the byte values from the input file called plaintext and transform each
byte value into 8-bit binary representation.
 Step 2: Make 256-bit plaintext blocks from the binary representation.
 Step 3: Repeat step 4 and 11 for each block of plaintext.
 Step 4: Split the 256-bit block into four 64-bit blocks, namely P1, P2, P3, P4.
 Step 5: Subdivide each 64 bit Plain text parts into two 32 bit parts, namely P1L , P1R ,
P2L, P2R, P3L, P3R, P4L , P4R
 Step 6: Repeat step 7 and 10 for each Keyi, where 1 ≤ i ≤ 4.
 Step 7: Read the round encryption key and split into 64 bit parts, namely K1, K2, K3,
and K4.
 Step 8: Subdivide each 64 bit round key parts into two 32 bit parts, namely K1L , K1R ,
K2L, K2R, K3L, K3R, K4L , K4R
CSE Dept. SSCET, Badhani
23
Message Encryption Algorithmic step
 Step 9: Compute four 64 bit parts of the Intermediate Cipher Text and store into 4
temporary variables:
temp1= Concate [(P1L ⊕ K1R), (P1R ⊕ K1L)]
temp2= Concate [(P2L ⊕ K2R), (P2R ⊕ K2L)]
temp3= Concate [(P3L ⊕ K3R), (P3R ⊕ K3L)]
temp4= Concate [(P4L ⊕ K4R), (P4R ⊕ K4L)]
 Step 10: Combine all 64-bit cipher blocks to form 256-bit Intermediate cipher text
block:
ICT = Concate(temp1,temp2,temp3,temp4)
 Step 11: Input ICT as input for the next round as plaintext.
 Step 12: Compute result of round 4 as final cipher text CT.
 Step 13: Club together all the 256-bit cipher text blocks.
CSE Dept. SSCET, Badhani
24
Message Encryption Round operation
Figure 6. Encryption Operation for 4 Rounds
25
Message Encryption Rounds X-OR operation
Figure 7. Proposed EX-OR Operation
CSE Dept. SSCET, Badhani
26
Message Encryption DNA Encoding
 Cipher text is converted into the DNA form of the data using Binary
to DNA substitution rule.
 Use WatsonCrick complementary rule of DNA.
 Primer selection from a public DNA database.(say NCBI).
 Padding extra information.
CSE Dept. SSCET, Badhani
27
Message Encryption DNA Encoding
 Using the substitution rule: A=00, T=11, C=01 and G=10.
CT= 'TCTC TTGC AGGC CGAC GACT GTCG AATA TGTA TCAT
GCTT GACG
AACC ATTA CCCC CCGG TTCT CGAT GGAA ACAT TTTG CATT
CTTC GGCT
AGTG GCGG GAGA GGAA TATT TGTG ATTT ATTC GTGT‘
 Using the complementary rule: A T; T C; C G; G A→ → → →
CT= 'CGCG CCAG TAAG GATG ATGC ACGA TTCT CACT CGTC
AGCC ATGA TTGG TCCT GGGG GGAA CCGC GATC AATT
TGTC CCCA GTCC GCCG AAGC TACA AGAA ATAT AATT CTCC
CACA TCCC TCCG ACAC'
CSE Dept. SSCET, Badhani
28
Message Encryption DNA Encoding
 Select a DNA sequence fromthe NCBI database:
DNAseq = ’TTCC CAAT AGGC TGGA CTGC TTAC CACC CCAT
GTGG CCTC AAAG AGCT CCAG TCAC TCCT TTAC GAAC
CCAA TCAC TCCA GAAC TTTA GAAC AAAG TTTC TGAG
TTAC TCCT TGTA ATAG GCTA AATA’ (say)
 Split DNAseq into 2 parts:
Starting primer = ’TTCC CAAT AGGC TGGA CTGC TTAC CACC
CCAT GTGG CCTC AAAG AGCT CCAG TCAC TCCT TTAC’
Ending primer = ’GAAC CCAA TCAC TCCA GAAC TTTA GAAC
AAAG TTTC TGAG TTAC TCCT TGTA ATAG GCTA AATA’
CSE Dept. SSCET, Badhani
29
Message Encryption DNA Encoding
 After padding extra coding:
CT=TTCC CAAT AGGC TGGA CTGC TTAC CACC CCAT GTGG
CCTC AAAG AGCT CCAG TCAC TCCT TTAC CGCG CCAG
TAAG GATG ATGC ACGA TTCT CACT CGTC AGCC ATGA
TTGG TCCT GGGG GGAA CCGC GATC AATT TGTC CCCA
GTCC GCCG AAGC TACA AGAA ATAT AATT CTCC CACA
TCCC TCCG ACAC GAAC CCAA TCAC TCCA GAAC TTTA
GAAC AAAG TTTC TGAG TTAC TCCT TGTA ATAG GCTA
AATA
Figure 8. Basic format of the cipher DNA sequence
CSE Dept. SSCET, Badhani
30
Message Encryption DNA Encoding
 Hash Mapping:
 CT is now mapped into a randomly selected array of 16 characters
using a hash mapping technique and form FCT.
Let, the randomly selected hash array be,
HA[16]=A, K, Z, S, J, B, T, M, L, F, P, C, R, Y,Q, O
 Each combination of DNA sequence is mapped into with the hash
function array (HA) by means of index values.
Table 2. Hash mapping array with DNA sequence
CSE Dept. SSCET, Badhani
31
Message Encryption DNA Encoding
 Final Cipher Text (FCT) computation:
FCT=’BPLKSQMRFQBZLPPKYOPTASSFPSTZTFBZCCPSJSRMKQ
ZRBFLFCTSPKRBOTFOOOAPQRTABMTPLYPQCAQJLSAKKAB
FPLLTPTCZZRZPATZTLRZBJRZASBTMSBZTFMJKSQJAJ’
CSE Dept. SSCET, Badhani
32
Message Encryption workflow
Figure 9. Schematic diagram of the overall
Message encoding method
CSE Dept. SSCET, Badhani
33
Message Decoding workflow
Figure 10. Schematic diagram of the overall
Message decoding method
CSE Dept. SSCET, Badhani
34
Ensuring Integrity
 Shared Hash function at both side.
 MD5 used as Hash function.
 Create Message Detection Code (MDC).
Figure 11. Message transmission ensuring
35
Key Analysis
CSE Dept. SSCET, Badhani
36
CSE Dept. SSCET, Badhani
Test Datasets
File Types File Size
(in KB)
Cipher Size
(in KB)
Encryption time
(in ms)
Decryption Time
(in ms)
.doc 147 588 6833 4846
.pdf 384 1536 11466 8050
.jpg 768 3072 39431 22371
.mp3 3105 12420 62712 28314
.flv 4028 16112 78717 34804
CSE Dept. SSCET, Badhani
37
Table 2. Test Datasets with attributes
CSE Dept. SSCET, Badhani
Length Analysis
CSE Dept. SSCET, Badhani Figure 12. Length Analysis
38 FileSizeinKB
File Type
CSE Dept. SSCET, Badhani
Time Analysis
CSE Dept. SSCET, Badhani Figure 12. Time Analysis
39 TimeinMilliseconds
File Type
CSE Dept. SSCET, Badhani
Strength of Proposed Approach
 Enhanced security:
 Long 256 bit encryption key– Difficult to brute force attacks
 Improved DNA base encryption – Provide ambiguity
 Use of Message Detection Code – Ensuring integrity
CSE Dept. SSCET, Badhani
40
Conclusion
 Since there are large number of DNA
sequences are available it is almost
impossible to predict which sequence has
been used for encryption.
 Intruders will not be able to predict the main
cipher text for cryptanalysis due to the
presence of extra information along with the
main cipher.
CSE Dept. SSCET, Badhani
41
Future Scope
 Implementation of signature, steganography.
 This improved concept can be used in the
security concerned of real time security of
distributed network systems.
CSE Dept. SSCET, Badhani
42
Reference
43
[1] Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta. “A DNA based Symmetric key
Cryptography”, Se co nd Inte rna tio nal Co nfe re nce o n Sig na ls, Syste m s & Auto m atio n, G ujarat, India , pp. 68-72
Jan.2011.
[2] H.Z. Hsu and R.C.T.Lee,“DNA Based Encryption Methods”, The 23rd Wo rksho p o n Co m bina to rial Mathe m a tics
and Co m putatio n The o ry, Natio na lChi Nan Unive rsity Puli, Na nto u Hsie s, Taiwan 545 , April 2006.
[3] Ashish Gehani, Thomas LaBean and John Reif, “ DNA-Based Cryptography”, DIMACS DNABase d Co m pute rs V,
Am e rica n Mathe m aticalSo cie ty, 2000.
[4] Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta, “An improved Symmetric Key
Cryptography with DNA Based Strong Cipher”, Inte rnatio nal Co nfe re nce o n De vice and Co m m unicatio n, BIT
Me sra, Ranchi, Jarkhand, India , Feb 2011.
[5] L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, Pro ce e ding s o f the
9 th ACMco nfe re nce o n Co m pute r and co m m unicatio ns se curity, Washing to n, DC, USA, pp. 41-47, November
2002.
[6] Bibhash Roy, Atanu Majumder, “An Improved Concept of Cryptography Based on DNA Sequencing”, Inte rna tio nal
Jo urnalo f Ele ctro nics Co m m unicatio n a nd Co m pute r Eng ine e ring , Vol-3, Issue-6, Nov-2012.
[7] Wang, Xing, and Qiang Zhang, “DNA computing-based cryptography”, Bio -Inspire d Co m puting , 20 0 9 . BIC-TA'0 9 .
Fo urth Inte rna tio nalCo nfe re nce o n. IEEE, October 2009, pp. 1-3, ISBN: 978-1-4244-3867-9/09.
[8] Guangzhao Cui, Limin Qin Yanfeng Wang Xuncai Zhang, “ Information Security Technology Based on DNA
Computing”, 2 0 0 7 IEEE Inte rnatio nal Wo rksho p o n 16-18 April 2007,pp. 288-291, ISBN: 1-4244-1035-5,
Location: Xiamen, Fujian.
[9] Guangzhao Cui Limin Qin Yanfeng Wang Xuncai Zhang, “An encryption scheme using DNA technology. Bio-
Inspired Computing: Theories and Application”, 3 rd
Co nfe re nce o n Publicatio n, Date: Sept.28-2008, ISBN: 978-
1-4244-2724-6, pp. 37-42; Adelaide, SA.
[10] Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma; “An Improved Data Security
using DNA Sequencing”, Mo bile He alth 20 1 3 3rd ACMMo biHo c Wo rksho p o n Pe rvasive Wire le ss He althca re In
Co njunctio n With Mo biHo c 20 1 3 , Sym po sium , Bangalore,India, July 29- Aug 01, 2013.
CSE Dept. SSCET, Badhani
Reference
44
[11] Suman Chakraborty, Sudipta Roy, Prof. Samir K. Bandyopadhyay, “Image Steganography Using DNA Sequence and
Sudoku Solution Matrix”. In: Inte rnatio nal Jo urnal o f Advance d Re s e arch in Co m pute r Scie nce and So ftware Eng ine e ring ,
Feb 2012.
[12] Sabari Pramanik,Sanjit Kumar Setua, "DNA Cryptography", 7 th Inte rnatio nal Co nfe re nce o n Ele ctrical and Co m pute r
Eng ine e ring , IEEE, December.2012, Dhaka, Bangladesh.
[13] Amal Khalifa and Ahmed Atito, “High-Capacity DNA-based Steganography”, 8 th
Inte rnatio nal Co nfe re nce and info rm atics
and Syste m s (INFO S20 1 2), IEEE, May.2012
[14] Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi and Mohammad Reza Najaf Torkaman, "DNA Base Data Hiding
Algorithm", International Journal on New Computer Architectures and Their Applications (IJNCAA), 2012.
[15] Mohammad Reza Najaf Torkaman, Pourya Nikfard, Nazanin Sadat Kazazi, Mohammad Reza Abbasy, S.Farzaneh
Tabatabaiee, "Improving Hybrid Cryptosystems with DNA Steganography ", E. Ariwa and E. El-Qawasm e h (Eds. ): DEIS
20 1 1 , CCIS 1 9 4, pp. 4252, 2011.Springer-Verlag Berlin Heidelberg 2011.
[16] Majid Babaei.: A novel text and image encryption method based on chaos theory and DNA computing, Nat Comput
2013.Springer Science+Business Media B.V.(2012). doi:10.1007/ s11047-012-9334-9.
[17] G. Xiao, M. Lu, L. Qin and X. Lai. New field of cryptography: DNA cryptography. In Chinese Science Bulletin, vol.51, no.12,
pp. 1413-1420, 2006.
[18] Behrouz A.Forouzen, Debdeep Mukhopadhyay, “Cryptography and Network Security”,2nd e ditio n, Tata McG raw Hill
Educatio n Pvt. Ltd.
[19] V. I. Risca, “DNA-based steganography,” Crypto lo g ia, Tylo r and Francis ,vol. 25, no. 1, pp. 37–49, 2001.
[20] L. MingXin, L. XueJia, X. GuoZhen, and Q. Lei, “Symmetric-key cryptosystem with DNA technology,” Science in China
Series F: Information Sciences, Springer Verlag, Germany, vol. 50, no. 3, pp. 324–333, 2007.
[21] X. Guozhen, L. Mingxin, Q. Lei, and L. Xuejia, “New field of cryptography:DNA cryptography,” Chine se Sie nce Bulle tin,
Spring e r Ve rlag , Germany, vol. 51, no. 12, pp. 1413–1420, 2006.
 
CSE Dept. SSCET, Badhani
Reference
45
[22] L. Adleman, “Molecular computation of solutions to combinatorial problems,” Scie nce , JSTO R, vol. 266, pp. 1021–1025,
1994.
[23] L. H. N. C. for Biomedical Communications, Handbo o k o n G e ne tic Ce lls and DNA. USA: National Library of Medicine,
National Institutes of Health, Department of Health and Human Services., 2010.
[24] M. Zhang, L. Sabharwal, and W. Tao, “Interactive DNA sequence and structure design for DNA nanoapplications,” IEEE
Trans actio ns o n Nano bio scie nce , vol. 3, no. 4, pp. 286–292, Dec. 2004.
[25] A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, “Cryptography with DNA binary strands,” Bio Syste m s , Else vie r Scie nce ,
vol. 57, no. 1, pp. 13–22, 2000.
[26] G. Cui, L. Cuiling, L. Haobin, and L. Xiaoguang, “DNA computing and its application to information security field, ” IEEE Fifth
Inte rnatio nalCo nfe re nce o n NaturalCo m putatio n, Tianjian, China, Aug. 2009.
[27] Nirmalya Kar, Atanu Majumder, Ashim Saha, “Data Security and Cryptography Basedon DNA Sequencing”, International
Conference on Human Computer Interaction, Education & Information Management System (ICHCEIMS 2013) Sydney,
Australia, June 17-18, 2013.
[28] L. XueJia, L. MingXin, Q. Lei, H. JunSong, and F. XiWen, “Asymmetric encryption and signature method with dna
technology,” SCIENCE CHINAInfo rm atio n Scie nce s , vol. 53, pp. 506–514, 2010.
[29] S. V. Kartalopoulos. “DNA-inspired cryptographic method in optical communications, authentication and data mimicking” .
Pro c. o f the IEEE o n Military Co m m unicatio ns Co nfe re nce , vol.2, pp.774-779, 2005.
[30] A.Boukerche, K. R. L. Juca, J. B. Sobral and M. S. M. A. Notare. An artificial immune based intrusion detection model for
computer and telecommunication systems, Paralle lCo m puting , vol.30, no.5-6, pp.629-646, 2004.
CSE Dept. SSCET, Badhani
Thank you for your
attention !

More Related Content

What's hot

DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption TechniqueSajedul Karim
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyjournalBEEI
 
Literature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesLiterature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesRashmi Tank
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsCSCJournals
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6sophiabelthome
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography cscpconf
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
B03302007012
B03302007012B03302007012
B03302007012theijes
 

What's hot (20)

DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
C010521418
C010521418C010521418
C010521418
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
 
Literature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesLiterature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic Techniques
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
D017433134
D017433134D017433134
D017433134
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
B03302007012
B03302007012B03302007012
B03302007012
 

Viewers also liked

Masters_Thesis_ver.1.02
Masters_Thesis_ver.1.02Masters_Thesis_ver.1.02
Masters_Thesis_ver.1.02Thomas Balle
 
Crypto workshop part 1 - Web and Crypto
Crypto workshop part 1 - Web and CryptoCrypto workshop part 1 - Web and Crypto
Crypto workshop part 1 - Web and Cryptohannob
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...IOSR Journals
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionlockyerj
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
customer satisfaction of internet banking of union bank of india
customer satisfaction of internet banking of union bank of indiacustomer satisfaction of internet banking of union bank of india
customer satisfaction of internet banking of union bank of indiaShrey Saxena
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 

Viewers also liked (18)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Masters_Thesis_ver.1.02
Masters_Thesis_ver.1.02Masters_Thesis_ver.1.02
Masters_Thesis_ver.1.02
 
Crypto workshop part 1 - Web and Crypto
Crypto workshop part 1 - Web and CryptoCrypto workshop part 1 - Web and Crypto
Crypto workshop part 1 - Web and Crypto
 
Data collection
Data collectionData collection
Data collection
 
CrypTool: Cryptography for the masses
CrypTool: Cryptography for the massesCrypTool: Cryptography for the masses
CrypTool: Cryptography for the masses
 
Cryptography With PHP
Cryptography With PHPCryptography With PHP
Cryptography With PHP
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Biometrics
BiometricsBiometrics
Biometrics
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
customer satisfaction of internet banking of union bank of india
customer satisfaction of internet banking of union bank of indiacustomer satisfaction of internet banking of union bank of india
customer satisfaction of internet banking of union bank of india
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY

Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyBALAKUMARC1
 
IRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA CryptographyIRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA CryptographyIRJET Journal
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
 
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...IJNSA Journal
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsIRJET Journal
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd Iaetsd
 
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...IJNSA Journal
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGIJNSA Journal
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
 
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...IJNSA Journal
 
An Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyAn Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyYasmine Anino
 
Analysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques
Analysis of Decoding Plaintext Data Using Enhanced Hamming Code TechniquesAnalysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques
Analysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniquesijtsrd
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 

Similar to A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY (20)

Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA Cryptography
 
IRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA CryptographyIRJET- Enhanced Security using DNA Cryptography
IRJET- Enhanced Security using DNA Cryptography
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
 
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
 
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
 
An Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyAn Survey On DNA Based Cryptography
An Survey On DNA Based Cryptography
 
Analysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques
Analysis of Decoding Plaintext Data Using Enhanced Hamming Code TechniquesAnalysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques
Analysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY

  • 1. SRI SAI COLLEGE OF ENGINEERING ANDTECHNOLOGY Badhani,Pathankot,Punjab,India M.Tech. Thesis A NEWAPPROACHTOWARDS INFORMATION SECURITY BASEDON DNA CRYPTOGRAPHY Presented in partial fulfillment of the requirements for the degree of Master of Technology in Computer Science & Engineering  PRESENTING BY: ABHISHEK MAJUMDAR(1269890) UNDER THE SUPERVISION OF PROF . MEENAKSHI SHARMA Date: Jun 7, 2015 PUNJABTECHNICAL UNIVERSITY Jalandhar- Kapurthala Highway, Jalandhar
  • 2. Abstract  Data security is one of the most significant issues of data transmission and communication of today's world.  In order to make secure data the researchers are working on the evolvement of new cryptographic algorithms.  One of the efficient directions of achieving security data communication is DNA based Cryptography.  The proposed encoding and decoding process is based on the use of the DNA sequencing string of the DNA strands. The encoded text that is cipher text produced by the encoding algorithm is looks similar with the biological structure of the DNA strands sequence. CSE Dept. SSCET, Badhani 2
  • 3. Objective  Encrypt the plain text into DNA sequence (cipher text ) using new DNA encryption technique.  Decrypt this cipher text using DNA decryption technique.  Propose a new model to DNA cryptography 3 CSE Dept. SSCET, Badhani
  • 4. Outline  Introduction  Basis of cryptography  Brief idea of DNA  DNA Cryptography  Related Works  Proposed Method  Key Selection and Generation  Encryption  Algorithmic steps  Work flow  Ensuring Integrity  Algorithmic steps  Strength  Conclusion  Future Scope  References CSE Dept. SSCET, Badhani 4
  • 5.  Cryptography: The art of protecting information by transforming Plain Text into an unreadable format.  Those who possess the secret key can decrypt the message .  Encrypted messages can sometimes broken by Cryptanalysis . Basis of Cryptography 5 CSE Dept. SSCET, Badhani
  • 6. Basis of Cryptography contd…. 6 Figure 1.Basic Structure of Cryptography
  • 7. Symmetric Cipher Model 7 CSE Dept. SSCET, Badhani Figure 2. Simplified Model of Symmetric Encryption
  • 8. Intruder’s Attack Basis of Cryptography Intruder’s Attack 8 Figure 3.Threat of Intruder
  • 9. Background Study  Genetic Code: Information encoded within genetic material (DNA or mRNA base) .  DNA sequence : Order of nucleotide bases in the DNA molecule. ATTAGCCTTATGCATGAACC 9 CSE Dept. SSCET, Badhani
  • 10. Brief idea of DNA  Deoxyribo Nucleic Acid  Carrier of the genetic information  A double stranded molecule.  Each strand is based on 4 bases:  Adenine (A)  Thymine (T)  Cytosine (C)  Guanine (G) DNA sequence 10
  • 11. Brief idea of DNA Base Pairing  Adenine (A) pairs with Thymine (T)  Guanine (G) pairs with Cytosine(C) Hydrogen Bonds CSE Dept. SSCET, Badhani Figure 4. DNA Base Pairing
  • 12. DNA Cryptography  First introduced by L. Adleman in 1990s.  Plaintext message Encoded into DNA sequences.  Based on one-time-pads . 12 CSE Dept. SSCET, Badhani
  • 13. Related works Bibhash Roy et al. The use of round in the encoding scheme is taken from this work. Each time the user has to validate and authenticate them self while accessing the service of the algorithm and every time a new key is generated randomly for data communication. The encryption scheme is designed based on the property of DNA sequencing. It is much more difficult to do cryptanalyst the coded form of message without knowing the selected DNA sequence. Mohammad Reza Abbasy et al. Common DNA sequence is shared between the sender and the receiver. Then the occurrences of the DNA representation of the plain text in the reference DNA sequence is listed by using an indexing method where every couple of nucleotides in DNA reference sequence is given an index number. CSE Dept. SSCET, Badhani 13
  • 14. Related works contd… H.Z. Hsu and R.C.T.Lee et al. They presented three methods, the insertion method, the complementary pair method and the substitution method. For each method, they secretly select a reference DNA sequence, transform the sequence into binary bits using binary coding scheme then sub divide the reference sequence bits into segments of fixed number of bits and incorporate the secret message into each segments. After incorporating the message into the DNA sequence, the encoded form of the message is transform into the DNA sequence form, send this encoded message together with many other DNA, or DNA-like sequences to the receiver. The receiver is able to identify the particular desired sequence that is hidden in the encoded message and ignore all of the other sequences. Thus receiver could be able to extract the message. The process of encryption containing different information along with the original message has also been extracted. CSE Dept. SSCET, Badhani 14
  • 15. Related works contd… Sabari Pramaniket al. A single stranded DNA string used as the secret key whose length depends on the plain text and they used it to encrypt the plain text. They divided the plain text into a number of DNA plain text packets and attach the packet sequence number with each packet. Nirmalya Karet al A method in which rather than sharing the actual keys directly between the sender and receiver, session keys are shared between the sender and the receiver that actually bears the information about the encryption keys. They had designed an encryption scheme by using the technologies of DNA synthesis and moreover extra bits and the faked DNA sequence were padded within the cipher text that made the message more secure from intruders. CSE Dept. SSCET, Badhani 15
  • 16. Related works contd… Amal Khalifa et al. Discussed a method of text hiding where the text is encrypted using amino acid and DNA based playfair cipher and also use complementary rules to hide the resultant cipher text in a DNA sequence. Wang, Xing et al. A new way to show how cryptography works with DNA computing, it can transmit message securely and effectively. They have used RSA algorithm belongs to asymmetric key cryptography along with DNA computing theory. Suman Chakraborty et al. Incorporated an idea of DNA based image encryption using soduko solution matrix to perform some computations on behalf of the message.CSE Dept. SSCET, Badhani 16
  • 17. Proposed method  3 phases :  Key Generation and Selection  256 bit key  Round key generation  Encryption of Plain Text:  Block Ciphering  DNA Encoding, Primer padding, Hash Mapping  Ensuring Integrity:  Shared Hash Function. CSE Dept. SSCET, Badhani 17
  • 18. Key Selection & Generation Algorithmic step Input: A randomly chosen 256 bit key Output: 4 round encryption keys  Step 1. Let, K be the key, K= '1011 1010 0011 0011 1100 1100 1010 0011 0000 0000 0000 0000 1111 1111 1111 1111 1110 1110 1001 0011 0000 1010 1111 0100 1011 1100 0101 1001 0011 1011 0001 1010 0011 1001 0011 0100 1010 1100 1001 1010 0000 0001 1000 1010 1111 0001 1010 0101 0000 0001 1010 1100 1000 1111 1000 1111 0001 1111 0011 0010 1100 0001 1111 1000‘  Step2. Transformation of key values into matrix row wise Table 1. Key MatrixCSE Dept. SSCET, Badhani 18
  • 19. Key Selection & Generation Algorithmic step  Step 3. Read the key values column wise (two columns at a time), label the sub-keys with DNA bases (A, T, C, G) as follows: A= '1011 0000 1110 1011 0011 0000 0000 0001 1010 0000 1110 1100 1001 0001 0001 1111' T= '0011 0000 1001 0101 0011 1000 1010 0011 0011 0000 0011 1001 0100 1010 1100 0010' C= '1100 1111 0000 0011 1010 1111 1000 1100 1100 1111 1010 1011 1100 0001 1111 0001' G= '1010 1111 1111 0001 1001 1010 1000 1111 0011 1111 0100 1010 1010 0101 1111 1000' CSE Dept. SSCET, Badhani 19
  • 20. Key Selection & Generation Algorithmic step  Step 4. Let, randomly selected DNA sequence with DNA bases be 'TGCA' then, Round 1 key: Key1=TGCA = '0011 0000 1001 0101 0011 1000 1010 0011 0011 0000 0011 1001 0100 1010 1100 0010 1010 1111 1111 0001 1001 1010 1000 1111 0011 1111 0100 1010 1010 0101 1111 1000 1100 1111 0000 0011 1010 1111 1000 1100 1100 1111 1010 1011 1100 0001 1111 0001 1011 0000 1110 1011 0011 0000 0000 0001 1010 0000 1110 1100 1001 0001 0001 1111‘ Round 2 key: Key2 =ATGC = '1011 0000 1110 1011 0011 0000 0000 0001 1010 0000 1110 1100 1001 0001 0001 1111 0011 0000 1001 0101 0011 1000 1010 0011 0011 0000 0011 1001 0100 1010 1100 0010 1010 1111 1111 0001 1001 1010 1000 1111 0011 1111 0100 1010 1010 0101 1111 1000 1100 1111 0000 0011 1010 1111 1000 1100 1100 1111 1010 1011 1100 0001 1111 0001' CSE Dept. SSCET, Badhani 20
  • 21. Key Selection & Generation Algorithmic step Round 3 key: Key3 = CATG = '1100 1111 0000 0011 1010 1111 1000 1100 1100 1111 1010 1011 1100 0001 1111 0001 1011 0000 1110 1011 0011 0000 0000 0001 1010 0000 1110 1100 1001 0001 0001 1111 0011 0000 1001 0101 0011 1000 1010 0011 0011 0000 0011 1001 0100 1010 1100 0010 1010 1111 1111 0001 1001 1010 1000 1111 0011 1111 0100 1010 1010 0101 1111 1000‘ Round 4 key: Key4 = GCAT = '1010 1111 1111 0001 1001 1010 1000 1111 0011 1111 0100 1010 1010 0101 1111 1000 1100 1111 0000 0011 1010 1111 1000 1100 1100 1111 1010 1011 1100 0001 1111 0001 1011 0000 1110 1011 0011 0000 0000 0001 1010 0000 1110 1100 1001 0001 0001 1111 0011 0000 1001 0101 0011 1000 1010 0011 0011 0000 0011 1001 0100 1010 1100 0010' CSE Dept. SSCET, Badhani 21
  • 22. Key Selection & Generation Workflow Figure 5. 4 Round Keys Generation Operation 22
  • 23. Message Encryption Algorithmic step Input: Input File; Round Keys. Output: Cipher text  Step 1: Read the byte values from the input file called plaintext and transform each byte value into 8-bit binary representation.  Step 2: Make 256-bit plaintext blocks from the binary representation.  Step 3: Repeat step 4 and 11 for each block of plaintext.  Step 4: Split the 256-bit block into four 64-bit blocks, namely P1, P2, P3, P4.  Step 5: Subdivide each 64 bit Plain text parts into two 32 bit parts, namely P1L , P1R , P2L, P2R, P3L, P3R, P4L , P4R  Step 6: Repeat step 7 and 10 for each Keyi, where 1 ≤ i ≤ 4.  Step 7: Read the round encryption key and split into 64 bit parts, namely K1, K2, K3, and K4.  Step 8: Subdivide each 64 bit round key parts into two 32 bit parts, namely K1L , K1R , K2L, K2R, K3L, K3R, K4L , K4R CSE Dept. SSCET, Badhani 23
  • 24. Message Encryption Algorithmic step  Step 9: Compute four 64 bit parts of the Intermediate Cipher Text and store into 4 temporary variables: temp1= Concate [(P1L ⊕ K1R), (P1R ⊕ K1L)] temp2= Concate [(P2L ⊕ K2R), (P2R ⊕ K2L)] temp3= Concate [(P3L ⊕ K3R), (P3R ⊕ K3L)] temp4= Concate [(P4L ⊕ K4R), (P4R ⊕ K4L)]  Step 10: Combine all 64-bit cipher blocks to form 256-bit Intermediate cipher text block: ICT = Concate(temp1,temp2,temp3,temp4)  Step 11: Input ICT as input for the next round as plaintext.  Step 12: Compute result of round 4 as final cipher text CT.  Step 13: Club together all the 256-bit cipher text blocks. CSE Dept. SSCET, Badhani 24
  • 25. Message Encryption Round operation Figure 6. Encryption Operation for 4 Rounds 25
  • 26. Message Encryption Rounds X-OR operation Figure 7. Proposed EX-OR Operation CSE Dept. SSCET, Badhani 26
  • 27. Message Encryption DNA Encoding  Cipher text is converted into the DNA form of the data using Binary to DNA substitution rule.  Use WatsonCrick complementary rule of DNA.  Primer selection from a public DNA database.(say NCBI).  Padding extra information. CSE Dept. SSCET, Badhani 27
  • 28. Message Encryption DNA Encoding  Using the substitution rule: A=00, T=11, C=01 and G=10. CT= 'TCTC TTGC AGGC CGAC GACT GTCG AATA TGTA TCAT GCTT GACG AACC ATTA CCCC CCGG TTCT CGAT GGAA ACAT TTTG CATT CTTC GGCT AGTG GCGG GAGA GGAA TATT TGTG ATTT ATTC GTGT‘  Using the complementary rule: A T; T C; C G; G A→ → → → CT= 'CGCG CCAG TAAG GATG ATGC ACGA TTCT CACT CGTC AGCC ATGA TTGG TCCT GGGG GGAA CCGC GATC AATT TGTC CCCA GTCC GCCG AAGC TACA AGAA ATAT AATT CTCC CACA TCCC TCCG ACAC' CSE Dept. SSCET, Badhani 28
  • 29. Message Encryption DNA Encoding  Select a DNA sequence fromthe NCBI database: DNAseq = ’TTCC CAAT AGGC TGGA CTGC TTAC CACC CCAT GTGG CCTC AAAG AGCT CCAG TCAC TCCT TTAC GAAC CCAA TCAC TCCA GAAC TTTA GAAC AAAG TTTC TGAG TTAC TCCT TGTA ATAG GCTA AATA’ (say)  Split DNAseq into 2 parts: Starting primer = ’TTCC CAAT AGGC TGGA CTGC TTAC CACC CCAT GTGG CCTC AAAG AGCT CCAG TCAC TCCT TTAC’ Ending primer = ’GAAC CCAA TCAC TCCA GAAC TTTA GAAC AAAG TTTC TGAG TTAC TCCT TGTA ATAG GCTA AATA’ CSE Dept. SSCET, Badhani 29
  • 30. Message Encryption DNA Encoding  After padding extra coding: CT=TTCC CAAT AGGC TGGA CTGC TTAC CACC CCAT GTGG CCTC AAAG AGCT CCAG TCAC TCCT TTAC CGCG CCAG TAAG GATG ATGC ACGA TTCT CACT CGTC AGCC ATGA TTGG TCCT GGGG GGAA CCGC GATC AATT TGTC CCCA GTCC GCCG AAGC TACA AGAA ATAT AATT CTCC CACA TCCC TCCG ACAC GAAC CCAA TCAC TCCA GAAC TTTA GAAC AAAG TTTC TGAG TTAC TCCT TGTA ATAG GCTA AATA Figure 8. Basic format of the cipher DNA sequence CSE Dept. SSCET, Badhani 30
  • 31. Message Encryption DNA Encoding  Hash Mapping:  CT is now mapped into a randomly selected array of 16 characters using a hash mapping technique and form FCT. Let, the randomly selected hash array be, HA[16]=A, K, Z, S, J, B, T, M, L, F, P, C, R, Y,Q, O  Each combination of DNA sequence is mapped into with the hash function array (HA) by means of index values. Table 2. Hash mapping array with DNA sequence CSE Dept. SSCET, Badhani 31
  • 32. Message Encryption DNA Encoding  Final Cipher Text (FCT) computation: FCT=’BPLKSQMRFQBZLPPKYOPTASSFPSTZTFBZCCPSJSRMKQ ZRBFLFCTSPKRBOTFOOOAPQRTABMTPLYPQCAQJLSAKKAB FPLLTPTCZZRZPATZTLRZBJRZASBTMSBZTFMJKSQJAJ’ CSE Dept. SSCET, Badhani 32
  • 33. Message Encryption workflow Figure 9. Schematic diagram of the overall Message encoding method CSE Dept. SSCET, Badhani 33
  • 34. Message Decoding workflow Figure 10. Schematic diagram of the overall Message decoding method CSE Dept. SSCET, Badhani 34
  • 35. Ensuring Integrity  Shared Hash function at both side.  MD5 used as Hash function.  Create Message Detection Code (MDC). Figure 11. Message transmission ensuring 35
  • 36. Key Analysis CSE Dept. SSCET, Badhani 36 CSE Dept. SSCET, Badhani
  • 37. Test Datasets File Types File Size (in KB) Cipher Size (in KB) Encryption time (in ms) Decryption Time (in ms) .doc 147 588 6833 4846 .pdf 384 1536 11466 8050 .jpg 768 3072 39431 22371 .mp3 3105 12420 62712 28314 .flv 4028 16112 78717 34804 CSE Dept. SSCET, Badhani 37 Table 2. Test Datasets with attributes CSE Dept. SSCET, Badhani
  • 38. Length Analysis CSE Dept. SSCET, Badhani Figure 12. Length Analysis 38 FileSizeinKB File Type CSE Dept. SSCET, Badhani
  • 39. Time Analysis CSE Dept. SSCET, Badhani Figure 12. Time Analysis 39 TimeinMilliseconds File Type CSE Dept. SSCET, Badhani
  • 40. Strength of Proposed Approach  Enhanced security:  Long 256 bit encryption key– Difficult to brute force attacks  Improved DNA base encryption – Provide ambiguity  Use of Message Detection Code – Ensuring integrity CSE Dept. SSCET, Badhani 40
  • 41. Conclusion  Since there are large number of DNA sequences are available it is almost impossible to predict which sequence has been used for encryption.  Intruders will not be able to predict the main cipher text for cryptanalysis due to the presence of extra information along with the main cipher. CSE Dept. SSCET, Badhani 41
  • 42. Future Scope  Implementation of signature, steganography.  This improved concept can be used in the security concerned of real time security of distributed network systems. CSE Dept. SSCET, Badhani 42
  • 43. Reference 43 [1] Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta. “A DNA based Symmetric key Cryptography”, Se co nd Inte rna tio nal Co nfe re nce o n Sig na ls, Syste m s & Auto m atio n, G ujarat, India , pp. 68-72 Jan.2011. [2] H.Z. Hsu and R.C.T.Lee,“DNA Based Encryption Methods”, The 23rd Wo rksho p o n Co m bina to rial Mathe m a tics and Co m putatio n The o ry, Natio na lChi Nan Unive rsity Puli, Na nto u Hsie s, Taiwan 545 , April 2006. [3] Ashish Gehani, Thomas LaBean and John Reif, “ DNA-Based Cryptography”, DIMACS DNABase d Co m pute rs V, Am e rica n Mathe m aticalSo cie ty, 2000. [4] Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta, “An improved Symmetric Key Cryptography with DNA Based Strong Cipher”, Inte rnatio nal Co nfe re nce o n De vice and Co m m unicatio n, BIT Me sra, Ranchi, Jarkhand, India , Feb 2011. [5] L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks”, Pro ce e ding s o f the 9 th ACMco nfe re nce o n Co m pute r and co m m unicatio ns se curity, Washing to n, DC, USA, pp. 41-47, November 2002. [6] Bibhash Roy, Atanu Majumder, “An Improved Concept of Cryptography Based on DNA Sequencing”, Inte rna tio nal Jo urnalo f Ele ctro nics Co m m unicatio n a nd Co m pute r Eng ine e ring , Vol-3, Issue-6, Nov-2012. [7] Wang, Xing, and Qiang Zhang, “DNA computing-based cryptography”, Bio -Inspire d Co m puting , 20 0 9 . BIC-TA'0 9 . Fo urth Inte rna tio nalCo nfe re nce o n. IEEE, October 2009, pp. 1-3, ISBN: 978-1-4244-3867-9/09. [8] Guangzhao Cui, Limin Qin Yanfeng Wang Xuncai Zhang, “ Information Security Technology Based on DNA Computing”, 2 0 0 7 IEEE Inte rnatio nal Wo rksho p o n 16-18 April 2007,pp. 288-291, ISBN: 1-4244-1035-5, Location: Xiamen, Fujian. [9] Guangzhao Cui Limin Qin Yanfeng Wang Xuncai Zhang, “An encryption scheme using DNA technology. Bio- Inspired Computing: Theories and Application”, 3 rd Co nfe re nce o n Publicatio n, Date: Sept.28-2008, ISBN: 978- 1-4244-2724-6, pp. 37-42; Adelaide, SA. [10] Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma; “An Improved Data Security using DNA Sequencing”, Mo bile He alth 20 1 3 3rd ACMMo biHo c Wo rksho p o n Pe rvasive Wire le ss He althca re In Co njunctio n With Mo biHo c 20 1 3 , Sym po sium , Bangalore,India, July 29- Aug 01, 2013. CSE Dept. SSCET, Badhani
  • 44. Reference 44 [11] Suman Chakraborty, Sudipta Roy, Prof. Samir K. Bandyopadhyay, “Image Steganography Using DNA Sequence and Sudoku Solution Matrix”. In: Inte rnatio nal Jo urnal o f Advance d Re s e arch in Co m pute r Scie nce and So ftware Eng ine e ring , Feb 2012. [12] Sabari Pramanik,Sanjit Kumar Setua, "DNA Cryptography", 7 th Inte rnatio nal Co nfe re nce o n Ele ctrical and Co m pute r Eng ine e ring , IEEE, December.2012, Dhaka, Bangladesh. [13] Amal Khalifa and Ahmed Atito, “High-Capacity DNA-based Steganography”, 8 th Inte rnatio nal Co nfe re nce and info rm atics and Syste m s (INFO S20 1 2), IEEE, May.2012 [14] Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi and Mohammad Reza Najaf Torkaman, "DNA Base Data Hiding Algorithm", International Journal on New Computer Architectures and Their Applications (IJNCAA), 2012. [15] Mohammad Reza Najaf Torkaman, Pourya Nikfard, Nazanin Sadat Kazazi, Mohammad Reza Abbasy, S.Farzaneh Tabatabaiee, "Improving Hybrid Cryptosystems with DNA Steganography ", E. Ariwa and E. El-Qawasm e h (Eds. ): DEIS 20 1 1 , CCIS 1 9 4, pp. 4252, 2011.Springer-Verlag Berlin Heidelberg 2011. [16] Majid Babaei.: A novel text and image encryption method based on chaos theory and DNA computing, Nat Comput 2013.Springer Science+Business Media B.V.(2012). doi:10.1007/ s11047-012-9334-9. [17] G. Xiao, M. Lu, L. Qin and X. Lai. New field of cryptography: DNA cryptography. In Chinese Science Bulletin, vol.51, no.12, pp. 1413-1420, 2006. [18] Behrouz A.Forouzen, Debdeep Mukhopadhyay, “Cryptography and Network Security”,2nd e ditio n, Tata McG raw Hill Educatio n Pvt. Ltd. [19] V. I. Risca, “DNA-based steganography,” Crypto lo g ia, Tylo r and Francis ,vol. 25, no. 1, pp. 37–49, 2001. [20] L. MingXin, L. XueJia, X. GuoZhen, and Q. Lei, “Symmetric-key cryptosystem with DNA technology,” Science in China Series F: Information Sciences, Springer Verlag, Germany, vol. 50, no. 3, pp. 324–333, 2007. [21] X. Guozhen, L. Mingxin, Q. Lei, and L. Xuejia, “New field of cryptography:DNA cryptography,” Chine se Sie nce Bulle tin, Spring e r Ve rlag , Germany, vol. 51, no. 12, pp. 1413–1420, 2006.   CSE Dept. SSCET, Badhani
  • 45. Reference 45 [22] L. Adleman, “Molecular computation of solutions to combinatorial problems,” Scie nce , JSTO R, vol. 266, pp. 1021–1025, 1994. [23] L. H. N. C. for Biomedical Communications, Handbo o k o n G e ne tic Ce lls and DNA. USA: National Library of Medicine, National Institutes of Health, Department of Health and Human Services., 2010. [24] M. Zhang, L. Sabharwal, and W. Tao, “Interactive DNA sequence and structure design for DNA nanoapplications,” IEEE Trans actio ns o n Nano bio scie nce , vol. 3, no. 4, pp. 286–292, Dec. 2004. [25] A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, “Cryptography with DNA binary strands,” Bio Syste m s , Else vie r Scie nce , vol. 57, no. 1, pp. 13–22, 2000. [26] G. Cui, L. Cuiling, L. Haobin, and L. Xiaoguang, “DNA computing and its application to information security field, ” IEEE Fifth Inte rnatio nalCo nfe re nce o n NaturalCo m putatio n, Tianjian, China, Aug. 2009. [27] Nirmalya Kar, Atanu Majumder, Ashim Saha, “Data Security and Cryptography Basedon DNA Sequencing”, International Conference on Human Computer Interaction, Education & Information Management System (ICHCEIMS 2013) Sydney, Australia, June 17-18, 2013. [28] L. XueJia, L. MingXin, Q. Lei, H. JunSong, and F. XiWen, “Asymmetric encryption and signature method with dna technology,” SCIENCE CHINAInfo rm atio n Scie nce s , vol. 53, pp. 506–514, 2010. [29] S. V. Kartalopoulos. “DNA-inspired cryptographic method in optical communications, authentication and data mimicking” . Pro c. o f the IEEE o n Military Co m m unicatio ns Co nfe re nce , vol.2, pp.774-779, 2005. [30] A.Boukerche, K. R. L. Juca, J. B. Sobral and M. S. M. A. Notare. An artificial immune based intrusion detection model for computer and telecommunication systems, Paralle lCo m puting , vol.30, no.5-6, pp.629-646, 2004. CSE Dept. SSCET, Badhani
  • 46. Thank you for your attention !