INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USINGDNA STEGANOGRAPHY

There exists a big demand for innovative secure electronic communications while the expertise level of attackers increases rapidly and that causes even bigger demands and needs for an extreme secure connection. An ideal security protocol should always be protecting the security of connections in many aspects, and leaves no trapdoor for the attackers. Nowadays, one of the popular cryptography protocols is hybrid cryptosystem that uses private and public key cryptography to change secret message. In available cryptography protocol attackers are always aware of transmission of sensitive data. Even non-interested attackers can get interested to break the ciphertext out of curiosity and challenge, when suddenly catches some scrambled data over the network. First of all, we try to explain the roles of innovative approaches in cryptography. After that we discuss about the disadvantages of public key cryptography to exchange secret key. Furthermore, DNA steganography is explained as an innovative paradigm to diminish the usage of public cryptography to exchange session key. In this protocol, session key between a sender and receiver is hidden by novel DNA data hiding technique. Consequently, the attackers are not aware of transmission of session key through unsecure channel. Finally, the strength point of the DNA steganography is discussed.

[1]  Wen-Guey Tzeng Common Modulus and Chosen-Message Attacks on Public-Key Schemes with Linear Recurrence Relations , 1999, Inf. Process. Lett..

[2]  T. Austin,et al.  Architectural support for fast symmetric-key cryptography , 2000, ASPLOS IX.

[3]  R. Sakthi Vignesh,et al.  Limitations of Quantum & the Versatility of Classical Cryptography: A Comparative Study , 2009, 2009 Second International Conference on Environmental and Computer Science.

[4]  Miodrag Potkonjak,et al.  Hiding Data in DNA , 2002, Information Hiding.

[5]  J. Hessels,et al.  INTERNATIONAL ENTREPRENEURSHIP: VALUE CREATION ACROSS NATIONAL BORDERS This book investigates antecedents and outcomes of international entrepreneurship. , 2008 .

[6]  Alex Biryukov,et al.  An introduction to Block Cipher Cryptanalysis , 2006, Proceedings of the IEEE.

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Glenn K. Manacher,et al.  A New Linear-Time ``On-Line'' Algorithm for Finding the Smallest Initial Palindrome of a String , 1975, JACM.

[9]  Stefan H. Thomke,et al.  Experimentation Matters: Unlocking the Potential of New Technologies for Innovation , 2003 .

[10]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[12]  Azzedine Boukerche,et al.  A Secure Key Management Scheme for Wireless and Mobile Ad Hoc Networks Using Frequency-Based Approach: Proof and Correctness , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[13]  F. Crick,et al.  Molecular Structure of Nucleic Acids: A Structure for Deoxyribose Nucleic Acid , 1974, Nature.

[14]  Adi Shamir,et al.  How to expose an eavesdropper , 1984, CACM.

[15]  Todd M. Austin,et al.  Architectural support for fast symmetric-key cryptography , 2000, SIGP.

[16]  Sungwon Sohn,et al.  Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human , 2009 .

[17]  Herbert S. Lin Cryptography and public policy , 1998 .

[18]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[19]  Simon J. D. Phoenix,et al.  Cryptography, trusted third parties and escrow , 1997 .

[20]  Steven M. Bellovin,et al.  An attack on the Interlock Protocol when used for authentication , 1994, IEEE Trans. Inf. Theory.

[21]  Eantrepreneurship American Journal of Small Business , 1976 .

[22]  Jennifer Seberry,et al.  Public Key Cryptography , 2000, Lecture Notes in Computer Science.

[23]  James V. Stone Independent Component Analysis: A Tutorial Introduction , 2007 .

[24]  Bin Deng,et al.  BinText steganography based on Markov state transferring probability , 2009, ICIS.

[25]  W. Gartner “Who Is an Entrepreneur?” Is the Wrong Question , 1988 .

[26]  Frances M. T. Brazier,et al.  Designing creative artificial systems , 2004, Artificial Intelligence for Engineering Design, Analysis and Manufacturing.

[27]  Chris Styles,et al.  Opportunities for marketing researchers in international entrepreneurship , 2006 .

[28]  Paul Thagard,et al.  The AHA! Experience: Creativity Through Emergent Binding in Neural Networks , 2011, Cogn. Sci..

[29]  Guillermo A. Francia,et al.  Steganography obliterator: an attack on the least significant bits , 2006, InfoSecCD '06.

[30]  E. Autio Creative tension: the significance of Ben Oviatt's and Patricia McDougall's article ‘toward a theory of international new ventures’ , 2005 .

[31]  Michael Willett Cryptography old and new , 1982, Comput. Secur..

[32]  Thomas Wollinger,et al.  Fundamentals of Symmetric Cryptography , 2006 .

[33]  Yong Se Kim,et al.  Creativity: Simulation, stimulation, and studies , 2010, Artificial Intelligence for Engineering Design, Analysis and Manufacturing.

[34]  Richard C. T. Lee,et al.  Data hiding methods based upon DNA sequences , 2010, Inf. Sci..

[35]  Hossein Rouhani Zeidanloo,et al.  Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.

[36]  Andreea Zamfir,et al.  Using a computer-based model for developing business students' skills: case study on the regional application of the model , 2011 .

[37]  Sattar J Aboud,et al.  An efficient method for attack RSA scheme , 2009, 2009 Second International Conference on the Applications of Digital Information and Web Technologies.

[38]  Arshad M. Khan,et al.  Innovative and Noninnovative Small Firms: Types and Characteristics , 1989 .

[39]  Vanessa Ratten,et al.  Mobile Banking Innovations and Entrepreneurial Adoption Decisions , 2011, Int. J. E Entrepreneurship Innov..

[40]  Jiri Fridrich,et al.  Secure Steganographic Methods for Palette Images , 1999, Information Hiding.

[41]  Tal Mor,et al.  Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment , 2006, Theor. Comput. Sci..

[42]  P. P. McDougall,et al.  Toward a Theory of International New ventures , 1994 .

[43]  Xiang Li Entrepreneurial competencies as an entrepreneurial distinctive: An examination of the competency approach in defining entrepreneurs , 2009 .

[44]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[45]  A Leier,et al.  Cryptography with DNA binary strands. , 2000, Bio Systems.