A Bio-Inspired Algorithm for Symmetric Encryption

TheexploitsofthestructureoftheDNAtorealizethecryptographicsystemsisanewdirection. Thesecurityofdatatransferisanimportantfactorfordatatransmission.Cryptographyisoneofthe methodsthatensuresthisconstraintbytechniquesforsendingdataconfidentially.Harnessingthe benefitsofDNAtosecureinformationcontentmakescryptographymoreefficient.Inthisarticle, theauthorsproposeasymmetriccryptographysystembasedonDNAcalledStegano-DNA-which operatesundertwomainmodules:scramblingandencryption.Initsscramblingphase,Stegano-DNA eliminatesthelogicalorderofthelettersinthecleartextbytheuseofboxesofsubstitutions,andinits encryptionphase,looksfortheshortsequenceDNAinthechromosomesequenceandmemorizesonly thenumberofpositionsneededtooptimizetheencryptiontimethanwhenmemorizingallpositions. KEywORdS Bio-Inspired, Cryptography, Decryption, DNA, Encryption, Security

[1]  Richard Chbeir,et al.  Intelligent and Knowledge-Based Computing for Business and Organizational Advancements , 2012 .

[2]  John H. Reif,et al.  DNA-based Cryptography , 1999, Aspects of Molecular Computing.

[3]  Victor I. Chang,et al.  Semantic keyword searchable proxy re‐encryption for postquantum secure cloud storage , 2017, Concurr. Comput. Pract. Exp..

[4]  O. Tornea,et al.  Security and complexity of a DNA-based cipher , 2013, 2013 11th RoEduNet International Conference.

[5]  Lei Qin,et al.  Asymmetric encryption and signature method with DNA technology , 2010, Science China Information Sciences.

[6]  Victor I. Chang,et al.  Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..

[7]  Priyanka Bhatia,et al.  Framework for Wireless Network Security using Quantum Cryptography , 2014, ArXiv.

[8]  Gerard Briscoe,et al.  The Computing of Digital Ecosystems , 2010, Int. J. Organ. Collect. Intell..

[9]  Akimitsu Okamoto,et al.  Public-key system using DNA as a one-way function for key distribution. , 2005, Bio Systems.

[10]  Yanfeng Wang,et al.  An encryption scheme using DNA technology , 2008, 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications.

[11]  Zakaria Maamar,et al.  CSMA: Context-Based, Service-Oriented Modeling and Analysis Method for Modern Enterprise Applications , 2010, Int. J. Organ. Collect. Intell..

[12]  L M Adleman,et al.  Molecular computation of solutions to combinatorial problems. , 1994, Science.

[13]  P D Kaplan,et al.  DNA solution of the maximal clique problem. , 1997, Science.

[14]  Victor I. Chang,et al.  DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation , 2017, Journal of Medical Systems.

[15]  R J Lipton,et al.  DNA solution of hard computational problems. , 1995, Science.

[16]  Magdy Saeb,et al.  A DNA-based implementation of YAEA encryption algorithm , 2006, Computational Intelligence.

[17]  Anil Kumar Verma,et al.  DNA cryptography: a novel paradigm for secure routing in Mobile Ad hoc Networks (MANETs) , 2008 .

[18]  Grzegorz Rozenberg,et al.  DNA Computing: New Ideas and Paradigms , 1999, ICALP.

[19]  Richard J. Lipton,et al.  DNA Based Computers , 1996 .

[20]  Amine Boudia,et al.  Hybridization Between Scoring Technique and Similarity Technique for Automatic Summarization by Extraction , 2016, Int. J. Organ. Collect. Intell..

[21]  David Pointcheval,et al.  About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations) , 2004, Selected Areas in Cryptography.

[22]  Victor Chang Cloud Bioinformatics in a Private Cloud Deployment , 2013 .

[23]  Victor I. Chang,et al.  A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..

[24]  Monika Mital,et al.  Implementing Software as a Service-Based E-Governance Solution: A Network Governance Perspective , 2014, Int. J. Organ. Collect. Intell..