Professional Documents
Culture Documents
Dna Computings
Dna Computings
A PROJECT REPORT
Submitted by
NANDHA KISHORE R
(2018272031)
A report for the Technical Seminar and Report Writing Of The Project
submitted to the Faculty of
in partial fulfillment
for the award of the degree
of
APRIL 2020
ii
ANNA UNIVERSITY
CHENNAI - 600 025
BONA FIDE CERTIFICATE
COUNTERSIGNED
ABSTRACT
ACKNOWLEDGEMENT
I have taken efforts in this project. However, it would not have been
possible without the kind support and help of many individuals and organizations.
I would like to extend my sincere thanks to all of them.
TABLE OF CONTENTS
ABSTRACT iii
LIST OF FIGURES vi
LIST OF SYMBOLS AND ABBREVIATIONS vii
1 INTRODUCTION 1
1.1 DATA ENCRYPTION 2
1.2 DNA CRYPTOGRAPHY 3
1.3 PROBLEM STATEMENT 4
1.4 CHALLENGES 5
1.4.1 Quantum Computing 5
1.4.2 DNA Computing 5
1.4.3 Secure Channels 5
1.4.4 Cryptographic Algorithms Limitations 6
1.5 ORGANIZATION REPORT 6
2 LITERATURE SURVEY 7
2.1 NOVEL ALGORITHM FOR DATA ENCRYPTION 7
2.2 DNA BASED ENCRYPTION METHOD 8
2.3 CONCLUSION 8
3 SYSTEM DESIGN 9
3.1 ARCHITECTURE OF THE SYSTEM 9
4 ALGORITHMS 10
4.1 ENCRYPTION ALGORITHM FOR DNA CRYPTOGRAPHY: 10
4.2 DECRYPTION ALGORITHM FOR DNA CRYPTOGRAPHY: 11
REFERENCES 18
vi
LIST OF FIGURES
LIST OF ABBREVIATIONS
CHAPTER 1
INTRODUCTION
Character set:A B C D E F G H I J K L M N O P Q R S T U V W X Y
Z.
Now a days, the field of biology and that of cryptography have come
to combine. The study of DNA can be applied in DNA cryptography systems
that are based on DNA and one- time-pads, and if It is used correctly, it is
virtually impossible to crack the system.
1.4 CHALLENGES
Chapter 2: This chapter explains about the literature survey made on the existing
system.
Chapter 3: This chapter explains the architecture of the system.
Chapter 4: This chapter explains about the algorithms of the system.
Chapter 5: This chapter explains about the Implementation and performance
analysis of the system.
Chapter 6: This chapter gives the conclusion on the proposed system and what
future work is to be done.
7
CHAPTER 2
LITERATURE SURVEY
This chapter explains about the literature survey made on the existing
system, analyzing the problem statements and issues with the existing system
and proposed objectives for the new system.
H.Z.Hsu and R.C.T.Lee stated that the DNA sequences possess some
interesting properties which we can utilize to encrypt data. We presented three
methods, the insertion method, complementary pair method and the substitution
method. For each method, we secretly select a reference DNA sequence S and
incorporate the secret message M into it such that we obtain S’. We send this
S’, together with many other DNA, or DNA-like sequences to the receiver.
The receiver is able to identify the particular sequence with M hidden in it
and ignore all of the other sequences. He will also be able to extract M.The
proposed method consists of three level of security for encryption of data. In
Level-1 the shift key operation and complement operations are used. In level-2
the LBP operator is applied on the output of shift key and one’s complements
operation. In level-3 the output of two level is converted into DNA sequence.
The receiver will apply the decryption for extracting the plain text from the
cipher text. This proposed DNA cryptography provides the better security than
the other cryptographic techniques and also takes less time for encryption and
decryption of the data and provides more security.In this paper DNA sequences
is used to encrypt data with a three methods.
2.3 CONCLUSION
CHAPTER 3
SYSTEM DESIGN
The following Figure 3.1 shows the system design in which sender
is sending the information to the receiver, Encryption is done in two levels.In
first level,shift text is converted to ASCII value ,Then ASCII values converted
to binary numbers. In second level encryption,apply the insertion encryption
mathod and send the cipher text.The receiver is receiving the key from sender;
the receiver uses this key to get the original message. The cipher text is unreadable
after the encryption; we can read the text by using the key to convert cipher text
to original message.In decryption,Replace the received text with DNA sequence
by applying Insertion Decryption Method. Convert the DNA sequence into
binary numbers by using the DNA binary conversion table. Convert the binary
values into correspondent ASCII values with an segment of 8.The cipher text
should be sent in Secured channel.
CHAPTER 4
ALGORITHMS
This chapter explains about the algorithms for proposed system, The
first level is to transform the plain text to an ASCII text with the shift key and
then convert the text to a binary numbers. Apply the insertion method to binary
numbers; convert the binary numbers to DNA sequence which is represented as
cipher text. The receiver will apply the Insertion decryption method to cipher
text the plaintext will appear.
Input: Plaintext S.
Output: Cipher text S’.
First Level
Step 1:Input the plaintext and shift the plaintext by using key (k1) of any length.
Second Level
Step 1:Replace the received text with DNA sequence by applying Insertion
Decryption Method.
Step 2:Convert the DNA sequence into binary numbers by using the DNA
binary conversion table.
Step 3:Convert the binary values into correspondent ASCII values with
an segment of 8.
Step 4:Shift the ASCII values with the key length of (k1).
CHAPTER 5
Decryption process:
Receive the cipher text
[GGGAAGCCGCCCAACGGACTGACTCACTGACGGGGCAG
CCGCCCAATGGACTGACGTACTAACG
Cipher text to binary values based on DNA conversion table (Table 1)
[’01’, ’01’, ’01’, ’00’, ’00’, ’01’, ’10’, ’10’, ’01’, ’10’, ’10’, ’10’, ’00’, ’00’,
’10’, ’01’, ’01’, ’00’, ’10’, ’11’, ’01’, ’00’, ’10’, ’11’, ’10’, ’00’, ’10’, ’11’,
’01’, ’00’, ’10’, ’01’, ’01’, ’01’, ’01’, ’10’, ’00’, ’01’, ’10’, ’10’, ’01’, ’10’,
’10’, ’10’, ’00’, ’00’, ’11’, ’01’, ’01’, ’00’, ’10’, ’11’, ’01’, ’00’, ’10’, ’01’,
’11’, ’00’, ’10’, ’11’, ’00’, ’00’, ’10’, ’01’]
Concatenate the above values
010101000001101001101010000010010100101
101001011100010110100100101010110000110100110101000001
10101001011010010011100101100001001
Bits for segmentation: 3
[’0101’, ’0100’, ’0001’, ’1010’, ’0110’, ’1010’, ’0000’, ’1001’, ’0100’, ’1011’,
’0100’, ’1011’, ’1000’, ’1011’, ’0100’, ’1001’, ’0101’, ’0110’, ’0001’, ’1010’,
’0110’, ’1010’, ’0000’, ’1101’, ’0100’, ’1011’, ’0100’, ’1001’, ’1100’, ’1011’,
’0000’, ’1001’]
Remove the secret message
[’010’, ’010’, ’000’, ’101’, ’011’, ’101’, ’000’, ’100’, ’010’, ’101’, ’010’, ’101’,
’100’, ’101’, ’010’, ’100’, ’010’, ’011’, ’000’, ’101’, ’011’, ’101’, ’000’, ’110’,
’010’, ’101’, ’010’, ’100’, ’110’, ’101’, ’000’, ’100’]
Concatenate
[’01001000010101110100010001010101010110010101
010001001100010101110100011001010101010011010100 0100’]
15
Performance Analysis
CHAPTER 6
The data security plays a vital role in the many places. Large numbers
of data are occurred every day but the data security level is low. The main
contribution of this paper is to improve the data security level to high by using
DNA cryptography with insertion method. The proposed work is to encrypt the
data with a DNA sequence and with an Insertion method. It is difficult for an
attacker to achieve the original data. If the DNA sequence is known by any of
the attacker, it is impossible to get correctly decrypted the data without knowing
about the Insertion method secret message. This proposed work is to secure the
text data with a high level security by the measure of data compression values.
In future the proposed work is applied to a different types of data like an image,
video, audio and soon.
18
REFERENCES
[1] E Vidhya and R Rathipriya. Two level text data encryption using dna
cryptography. ”, International Journal of Computational Intelligence and
Informatics, 8:106–118, 2018.
[2] L M Adleman. Molecular computation of solutions to combinatorial
problems. 266:1021–1025, 1994.