Open Access Open Access  Restricted Access Subscription Access

DNA Cryptography based Data transmission

Yogendra Kumar Upadhyaya, Chetna Sinha

Abstract


Abstract: The biological research in the field of information technology covers the exploitation of storing capabilities, parallelism and also in conservative cryptography which enhances the security features for data transmission. DNA (deoxyribonucleic acids) is the gene information which encodes information of all living beings. Though the DNA computing has its application in the field of huge information storage, massive parallel processing, low energy consumption which have been proposed and proved by the researchers and soon the molecular computer can replace the existing silicon computer and it exploits the world smallest computer. The combination of DNA molecules can be interpreted as a result to give a solution to a specific problem. The DNA strands can be simulated for more nodes and size. It provides more security with increase node (4 nodes, security 50% and 8 nodes, security 150%). This paper analysis an existing approach to the DNA computing method and DNA based cryptographic approach which provides the clear idea and limitations of existing research works.

Keywords: DNA, encryption, arrays, computers, receivers, DNA computing

Cite this Article: Yogendra Kumar Upadhyaya, Chetna Sinha. DNA Cryptography-based Data Transmission. Journal of Network Security. 2019; 7(3): 31–40p.


Full Text:

PDF

References


M. Babaei, “A novel text and image encryption method based on chaos theory and DNA computing,” Nat. Comput., vol. 12, no. 1, pp. 101–107, Mar. 2013.

G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, “Error analysis and detection procedures for a hardware implementation of the advanced encryption standard,” IEEE Trans. Comput., vol. 52, no. 4, pp. 492–505, Apr. 2003.

Chih-Chung Lu and Shau-Yin Tseng, “Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter,” in Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors, pp. 277–285.

R. Guesmi, M. A. B. Farah, A. Kachouri, and M. Samet, “A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2,” Nonlinear Dyn., vol. 83, no. 3, pp. 1123–1136, Feb. 2016.

E. M. S. Hossain, K. M. R. Alam, M. R. Biswas, and Y. Morimoto, “A DNA cryptographic technique based on dynamic DNA sequence table,” in 2016 19th International Conference on Computer and Information Technology (ICCIT), 2016, pp. 270–275.

E. Hugues-Salas, F. Ntavou, D. Gkounis, G. T. Kanellos, R. Nejabati, and D. Simeonidou, “Monitoring and Physical-Layer Attack Mitigation in SDN-Controlled Quantum Key Distribution Networks,” J. Opt. Commun. Netw., vol. 11, no. 2, p. A209, Feb. 2019.

G. Jacob and A. Murugan, “An Encryption Scheme with DNA Technology and JPEG Zigzag Coding for Secure Transmission of Images,” May 2013.

F. K.A. and D. Antony, “A Multiphase Cryptosystem with Secure Key Encapsulation Scheme Based on Principles of DNA Computing,” in 2014 Fourth International Conference on Advances in Computing and Communications, 2014, pp. 1–4.

M. Kim, W. Lee, and D.-H. Cho, “A Novel PAPR Reduction Scheme for OFDM System Based on Deep Learning,” IEEE Commun. Lett., vol. 22, no. 3, pp. 510–513, Mar. 2018.

R. W. F. Lai and S. S. M. Chow, “Structured Encryption with Non-interactive Updates and Parallel Traversal,” in 2015 IEEE 35th International Conference on Distributed Computing Systems, 2015, pp. 776–777.

Monika and S. Upadhyaya, “Secure Communication Using DNA Cryptography with Secure Socket Layer (SSL) Protocol in Wireless Sensor Networks,” Procedia Comput. Sci., vol. 70, pp. 808–813, Jan. 2015.

D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,” J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, Apr. 2017.

S. Singh, P. K. Sharma, S. Y. Moon, and J. H. Park, “Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions,” J. Ambient Intell. Humaniz. Comput., pp. 1–18, May 2017.

J. Zhang, D. Hou, and H. Ren, “Image Encryption Algorithm Based on Dynamic DNA Coding and Chen’s Hyperchaotic System,” Math. Probl. Eng., vol. 2016, pp. 1–11, Sep. 2016.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517