Design and Analysis of DNA Encryption and Decryption Technique based on Asymmetric Cryptography System

Security of sensitive information at the time of transmission over public channels is one of the critical issues in digital society. The DNA-based cryptography technique is a new paradigm in the cryptography field that is used to protect data during transmission. In this paper we introduce the asymmetric DNA cryptography technique for encrypting and decrypting plain-texts. This technique is based on the concept of data dependency, dynamic encoding and asymmetric cryptosystem (i.e. RSA algorithm). The asymmetric cryptosystem is used solely to initiate the encryption and decryption processes that are completely conducted using DNA computing. The basic idea is to create a dynamic DNA table based on the plaintext, using multi-level security, data dependency and generating 14 dynamic round keys. The proposed technique is implemented using the JAVA platform and its efficiency is examined in terms of avalanche property. The evaluation process proves that the proposed technique outperforms the RSA algorithm in terms of avalanche property.

[1]  Nabiha Azizi,et al.  A Computer-Aided Diagnosis System for Breast Cancer Combining Features Complementarily and New Scheme of SVM Classifiers Fusion , 2013 .

[2]  Hassan Al-Mahdi,et al.  Design and analysis of DNA Binary Cryptography Algorithm for Plaintext , 2018, International Journal of Engineering and Technology.

[3]  Lei Zhang,et al.  Application of improved HU moments in object recognition , 2012, 2012 IEEE International Conference on Automation and Logistics.

[4]  Fabio Roli,et al.  Methods for Designing Multiple Classifier Systems , 2001, Multiple Classifier Systems.

[5]  Chithralekha Balamurugan,et al.  A Novel DNA Computing Based Encryption and Decryption Algorithm , 2015 .

[6]  Richard C. T. Lee,et al.  Data hiding methods based upon DNA sequences , 2010, Inf. Sci..

[7]  P. Langley Selection of Relevant Features in Machine Learning , 1994 .

[8]  A Leier,et al.  Cryptography with DNA binary strands. , 2000, Bio Systems.

[9]  Bijoy Bandyopadhyay,et al.  Steganography and Steganalysis: Different Approaches , 2011, ArXiv.

[10]  Prerna Mahajan,et al.  A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .

[11]  Magdy Saeb,et al.  A DNA-based implementation of YAEA encryption algorithm , 2006, Computational Intelligence.

[12]  Deepak Singh Chouhan,et al.  An architectural framework for encryption & generation of digital signature using DNA cryptography , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).

[13]  Grace Jordison Molecular Biology of the Gene , 1965, The Yale Journal of Biology and Medicine.

[14]  Chin-Chen Chang,et al.  A NEW DATA HIDING SCHEME BASED ON DNA SEQUENCE , 2011 .

[15]  T. Mandge,et al.  A DNA encryption technique based on matrix manipulation and secure key generation scheme , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[16]  David L. Nelson,et al.  Lehninger Principles of Biochemisty , 2015 .

[17]  Habiba Drias,et al.  An encryption algorithm inspired from DNA , 2010, 2010 International Conference on Machine and Web Intelligence.

[18]  Ban Ahmed Mitras,et al.  PROPOSED STEGANOGRAPHY APPROACH USING DNA PROPERTIES , 2013 .

[19]  Yasuhiko Morimoto,et al.  A DNA cryptographic technique based on dynamic DNA sequence table , 2016, 2016 19th International Conference on Computer and Information Technology (ICCIT).

[20]  Sheena Mathew,et al.  An encryption based on DNA cryptography and steganography , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[21]  Jian Zhang,et al.  Image Encryption Algorithm Based on DNA Encoding and Chaotic Maps , 2014 .

[22]  Farshid Hossein Nejad,et al.  Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys , 2014, 2014 International Conference on Computational Science and Technology (ICCST).

[23]  Kashif Javed,et al.  A two-stage Markov blanket based feature selection algorithm for text classification , 2015, Neurocomputing.