DNA Cryptography

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

DNA BASED

CRYPTOGRAPHY
D12A BATCH-A

ADITI BHATIA 06
NAMRATA AVHAD 03
A Dynamic DNA for Key-based Cryptography
Author: Bahubali Akiwate, Dr. Latha Parthiban
Year: 2018

2018 International Conference on Computational Techniques,

Electronics and Mechanical Systems (CTEMS)


introduction
Cryptography is the science of protecting

information by transforming it into a secure

format.
Today, cryptography is used to protect digital

data. It focuses on transforming data into

formats that cannot be recognized by

unauthorized users.
Encryption can be done at the sender before

transferring it into the network and after

receiving the encrypted message it is decrypted

at the receiver using a key provided to it.


There is a need to adopt a more secure and reliable

encryption algorithm, DNA Cryptography is one such

approach
The chosen paper proposed a method where various data

forms are accepted using the Unicode approach and

encrypted using DNA sequences.


DNA sequences are taken as the input to generate the key

that is going to provide two stages of data security.


LITERATURE REVIEW
[1] Prajapati Ashishkumar B and Prajapati Barkha, “Implementation Of DNA Cryptography In Cloud

Computing and Using Socket Programming”, IEEE, January 2016.

The above paper focuses only based on the ASCII character set, ignoring non-English users.

[2] Kiran Kumar R and Bharathi Devi P.2018, A Novel Text Encryption Algorithm Using DNA ASCII Table

With A Spiral Approach. Int J Recent Sci Res. 9(1), pp. 23588-23595. DOI:

http://dx.doi.org/10.24327/ijrsr.2018.0901.1495

The above paper doesn't consider the high amount of data load and the random nature of DNA, thus it

provides a simple approach which may not be secure and efficient.


DNA DIGITAL CODING
DNA Digital Coding approach is used in which encoding and

decoding is done using binary values.


It is based on the biological structure of DNA which is composed

of four basic nucleotides


Adenine (A)
Cytosine (C)
Guanine (G)
Thymine (T)
The proposed method combines traditional approaches and

uses DNA digital coding to map digital data to biological data


SYSTEM FLOW
DNA algorithm was implemented in java which encrypts and decrypts the
characters, text, image and audio files.

Select text/file containing data


Convert data into ASCII equivalent and then into Unicode characters
Convert Unicode to Hexadecimal
Convert Hexadecimal to Binary
Convert Binary to DNA Digital Code
Check the file content which contain the DNA amplified data (Generated

Message)
Convert DNA amplified data to original text : Decryption
ENCRYPTION
DECRYPTION
DNA digital coding
DNA basic nucleotides are assigned with

binary values.
DNA digital coding uses four nucleotides

(A, T, G, and C) which are initialized and

assigned with binary values


ENCRYPTION EXAMPLE
Plain Text = "CRYPTOGRAPHY"
Unicode = \u0e0\u0aa\u02020\u0e0\u0aa\u0b6\u0e0\u0aa\u0bf\u0e0\u0a\u0b7
Hexadecimal = 5c753065305c753061615c7530323032305c753065305c7530
61615c753062365c753065305c753061615c753062665c753065305c753061615c75306237
Binary =

0101110001110101001100000110010100110000010111000111010100110000011000010110000101011100011101010011

0000001100100011000000110010001100000101110001110101001100000110010100110000010111000111010100110

00001100001011000010101110001110101001100000110001000110110010111000111010100110000011001010011000

0010110001110101001100000110000101100001010111000111010100110000011000100110011001011100011101000110

000011001010011000001011100011101010011000001100001011000010101110001110101001100000110001000110111
ENCRYPTION EXAMPLE
DNA Digital Coding =

TTCATCTTACAATGTTACAATTCATCTTACAATGATTGATTTCATCTTACAAACAGACAAACAGACAATTCATCTT

ACAATGTTACAATTCATCTTACAATGATTGATTTCATCTTACAATGAGACTGTTCATCTTACAATGTTACAATTCA

TCTTACAATGATTGATTTCATCTTACAATGAGTGTGTTCATCTTACAATGTTACAATTCATCTTACAATGATTGAT

TTCATC TTACAATGAGACTC
Amplified Message =
11111110100111110010010101111111001001011111111010011111001001010111001101110011111111010011111001001010011000

1 001001010010000100100101111111110100111110010010101111111001001011111111010011111001001010111001101110011

11111110100111110010010101110001001001111111111010011111001001010111111100100101111111101001111100100101011100

1101110011111111101001111001001010111000101110111111111101001111100100101011111110010010111111110100111110010010

101110011011100111111111010011111001001010111000100101001
DECRYPTION EXAMPLE
Amplified Message =
11111110100111110010010101111111001001011111111010011111001001010111001101110011111111010011111001001010011000

1 001001010010000100100101111111110100111110010010101111111001001011111111010011111001001010111001101110011

11111110100111110010010101110001001001111111111010011111001001010111111100100101111111101001111100100101011100

1101110011111111101001111001001010111000101110111111111101001111100100101011111110010010111111110100111110010010

101110011011100111111111010011111001001010111000100101001
DNA Digital Coding =

TTCATCTTACAATGTTACAATTCATCTTACAATGATTGATTTCATCTTACAAACAGACAAACAGACAATTCATCTT

ACAATGTTACAATTCATCTTACAATGATTGATTTCATCTTACAATGAGACTGTTCATCTTACAATGTTACAATTCA

TCTTACAATGATTGATTTCATCTTACAATGAGTGTGTTCATCTTACAATGTTACAATTCATCTTACAATGATTGAT

TTCATC TTACAATGAGACTC
DECRYPTION EXAMPLE
Binary =

01011100011101010011000001100101001100000101110001110101001100000110000101100001010111000111010100110

0000011001000110000001100100011000001011100011101010011000001100101001100000101110001110101001100

000110000101100001010111000111010100110000011000100011011001011100011101010011000001100101001100000

1011000111010100110000011000010110000101011100011101010011000001100010011001100101110001110100011000

0011001010011000001011100011101010011000001100001011000010101110001110101001100000110001000110111
Hexadecimal = 5c753065305c753061615c7530323032305c753065305c7530
61615c753062365c753065305c753061615c753062665c753065305c753061615c75306237
Unicode = \u0e0\u0aa\u02020\u0e0\u0aa\u0b6\u0e0\u0aa\u0bf\u0e0\u0a\u0b7
Plain Text = "CRYPTOGRAPHY"
performance analysis
CONCLUSION
The proposed approach a Dynamic DNA for a key-based approach can accept various

forms of data such as characters, text files, images and audio. A random key will be

generated at the sender end every time which will be used for decrypting the ciphertext at

the receiver end.


This makes the approach strong against various cyber-attacks. The proposed approach is

difficult to break by a common cryptanalysis techniques


. It provides two-stage security, improved reliability and better time and computational

complexities
thank you

You might also like