DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation

Cryptography is not only a science of applying complex mathematics and logic to design strong methods to hide data called as encryption, but also to retrieve the original data back, called decryption. The purpose of cryptography is to transmit a message between a sender and receiver such that an eavesdropper is unable to comprehend it. To accomplish this, not only we need a strong algorithm, but a strong key and a strong concept for encryption and decryption process. We have introduced a concept of DNA Deep Learning Cryptography which is defined as a technique of concealing data in terms of DNA sequence and deep learning. In the cryptographic technique, each alphabet of a letter is converted into a different combination of the four bases, namely; Adenine (A), Cytosine (C), Guanine (G) and Thymine (T), which make up the human deoxyribonucleic acid (DNA). Actual implementations with the DNA don’t exceed laboratory level and are expensive. To bring DNA computing on a digital level, easy and effective algorithms are proposed in this paper. In proposed work we have introduced firstly, a method and its implementation for key generation based on the theory of natural selection using Genetic Algorithm with Needleman-Wunsch (NW) algorithm and Secondly, a method for implementation of encryption and decryption based on DNA computing using biological operations Transcription, Translation, DNA Sequencing and Deep Learning.

[1]  Zhi-min Zhou,et al.  Dynamic Programming for Protein Sequence Alignment , 2013 .

[2]  A. Dharani,et al.  A Hybrid DNA Algorithm for DES using Central Dogma of Molecular Biology (CDMB) , 2012 .

[3]  Cong Wang,et al.  A rear-end collision prediction scheme based on deep learning in the Internet of Vehicles , 2017, J. Parallel Distributed Comput..

[4]  Alan D. Ross,et al.  Network Security Essentials , 2003 .

[5]  Jian Shen,et al.  Medical image classification based on multi-scale non-negative sparse coding , 2017, Artif. Intell. Medicine.

[6]  Ritu Chauhan,et al.  A Bayesian Network Model for Probability Estimation , 2015 .

[7]  Padmavathi Kora,et al.  Crossover Operators in Genetic Algorithms: A Review , 2017 .

[8]  Bethany Delman Genetic algorithms in cryptography , 2004 .

[9]  Grace Jordison Molecular Biology of the Gene , 1965, The Yale Journal of Biology and Medicine.

[10]  Benjamin Schrauwen,et al.  Training and analyzing deep recurrent neural networks , 2013, NIPS 2013.

[11]  Kenli Li,et al.  Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Elliptic Curve Discrete Logarithm Problem over GF(2n) , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.

[12]  Junling Sun Sequence splicing techniques and their applications for information encryption , 2012, The 2012 International Conference on Advanced Mechatronic Systems.

[13]  M S Waterman,et al.  Identification of common molecular subsequences. , 1981, Journal of molecular biology.

[14]  Harleen Kaur,et al.  Role of data mining in establishing strategic policies for the efficient management of healthcare system – a case study from Washington DC area using retrospective discharge data , 2012, BMC Health Services Research.

[15]  Wolfgang Kinzel,et al.  Security of neural cryptography , 2004, Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems, 2004. ICECS 2004..

[16]  Arun Kumar Sangaiah,et al.  Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..

[17]  Sonia Goyat Cryptography Using Genetic Algorithms (GAs) , 2012 .

[18]  Xiaohui Tao,et al.  ICTs and the Millennium Development Goals: A United Nations Perspective , 2014 .

[19]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[20]  Asoke Nath,et al.  DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography , 2016 .

[21]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[22]  Anthony J. Bagnall,et al.  The Applications of Genetic Algorithms in Cryptanalysis , 1996 .

[23]  Yunpeng Zhang,et al.  Research on DNA Cryptography , 2012 .

[24]  Arun Kumar Sangaiah,et al.  Weakly-supervised image captioning based on rich contextual information , 2017, Multimedia Tools and Applications.

[25]  V. Maheswaran,et al.  A Novel Encryption Scheme based on DNA Computing , 2007 .

[26]  Vinod Scaria,et al.  Computational Analysis and In silico Predictive Modeling for Inhibitors of PhoP Regulon in S. typhi on High-Throughput Screening Bioassay Dataset , 2015, Interdisciplinary Sciences: Computational Life Sciences.

[27]  Christus,et al.  A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .

[28]  Benjamin Schrauwen,et al.  Training and Analysing Deep Recurrent Neural Networks , 2013, NIPS.

[29]  L M Adleman,et al.  Molecular computation of solutions to combinatorial problems. , 1994, Science.

[30]  Monica Borda,et al.  DNA secret writing techniques , 2010, 2010 8th International Conference on Communications.

[31]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[32]  Viviana I. Risca DNA-BASED STEGANOGRAPHY , 2001, Cryptologia.

[33]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[34]  John H. Reif,et al.  Application of Biomolecular Computing to Medical Science: A Biomolecular Database System for Storage, Processing, and Retrieval of Genetic Information and Material , 2006 .

[35]  Erik Winfree,et al.  A Sticker-Based Model for DNA Computation , 1998, J. Comput. Biol..

[36]  Siddharth Bali,et al.  Public Key Cryptography Using Genetic Algorithm , 2013 .

[37]  W. Marsden I and J , 2012 .

[38]  Olga Tornea,et al.  DNA Cryptographic Algorithms , 2009 .

[39]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[40]  Ewa Lechman,et al.  Catalyzing Development through ICT Adoption , 2017 .

[41]  Ritu Chauhan,et al.  Predictive Analytics and Data Mining: A Framework for Optimizing Decisions with R Tool , 2014 .

[42]  Ewa Lechman,et al.  Catalyzing Development through ICT Adoption: The Developing World Experience , 2016 .

[43]  Xiaohui Tao,et al.  ICTs and the Millennium Development Goals , 2014, Springer US.