Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations

Networks have evolved very rapidly, which allow secret data transformation speedily through the Internet. However, the security of secret data has posed a serious threat due to openness of these networks. Thus, researchers draw their attention on cryptography field for this reason. Due to the traditional cryptographic techniques which are vulnerable to intruders nowadays. Deoxyribonucleic Acid (DNA) considered as a promising technology for cryptography field due to extraordinary data density and vast parallelism. With the help of the various DNA arithmetic and biological operations are also Blum Blum Shub (BBS) generator, a multi-level of DNA encryption algorithm is proposed here. The algorithm first uses the dynamic key generation to encrypt sensitive information as a first level; second, it uses BBS generator to generate a random DNA sequence; third, the BBS-DNA sequence spliced with a DNA Gen Bank reference to produce a new DNA reference. Then, substitution, permutation, and dynamic key are used to scramble the new DNA reference nucleotides locations. Finally, for further enhanced security, an injective mapping is established to combine encrypted information with encrypted DNA reference using Knight tour movement in Hadamard matrix. The National Institute of Standard and Technology (NIST) tests have been used to test the proposed algorithm. The results of the tests demonstrate that they effectively passed all the randomness tests of NIST which means they can effectively resist attack operations.

[1]  Onur Koçak,et al.  Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..

[2]  Zuriati Ahmad Zukarnain,et al.  Generating a new S-Box inspired by biological DNA , 2015 .

[3]  Vishal Bhatnagar,et al.  Analogy of various DNA based security algorithms using cryptography and steganography , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[4]  Deepak Kumar,et al.  Secret data writing using DNA sequences , 2011 .

[5]  Nikita S. Kolte,et al.  DNA Cryptography using Index-Based Symmetric DNA Encryption Algorithm , 2017 .

[6]  Mohammed Misbahuddin,et al.  DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology , 2014, International Conference on Computing and Communication Technologies.

[7]  Sheena Mathew,et al.  An encryption based on DNA cryptography and steganography , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[8]  Xin Liu,et al.  An optimized DNA based encryption scheme with enforced secure key distribution , 2017, Cluster Computing.

[9]  Richard O. Sinnott,et al.  Index-based symmetric DNA encryption algorithm , 2011, 2011 4th International Congress on Image and Signal Processing.

[10]  Zuriati Ahmad Zukarnain,et al.  A NEW DNA BASED APPROACH OF GENERATING KEY - DEPENDENT MIX COLUMNS TRANSFORMATION , 2015 .

[11]  Chithralekha Balamurugan,et al.  A Novel DNA Computing Based Encryption and Decryption Algorithm , 2015 .

[12]  Waleej Haider,et al.  Cryptography using DNA Nucleotides , 2017 .

[13]  Mohammad Reza Najaf Torkaman,et al.  INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USINGDNA STEGANOGRAPHY , 2012 .

[14]  Xianwei Zhang,et al.  DNA cryptography based on DNA Fragment assembly , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).

[15]  Lawrence E. Bassham,et al.  Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .

[16]  Sangeetha Jose,et al.  An enhanced cryptographic model based on DNA approach , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[17]  Zuriati Zukarnain,et al.  A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation , 2015, ArXiv.

[18]  Elnaz Koopahi,et al.  Secure scan-based design using Blum Blum Shub algorithm , 2016, 2016 IEEE East-West Design & Test Symposium (EWDTS).

[19]  T. Mandge,et al.  A DNA encryption technique based on matrix manipulation and secure key generation scheme , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).