Skip to main content

2018 | OriginalPaper | Buchkapitel

A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques

verfasst von : Animesh Hazra, Soumya Ghosh, Sampad Jash

Erschienen in: Advanced Computational and Communication Paradigms

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Today, with the increase in technology and computational power everything is getting digitalized. More and more private data is being loaded into our computers. These data are sent to various websites for suitable applications. Now, the problem arises while transferring these data. Sending these data through insecure channels like the Internet without using proper encryption methods can lead to data loss or data hacking. In order to protect this data, various encryption methods are being implemented. One such encryption methodology used in this arena is DNA cryptography. This paper gives a brief overview of DNA cryptology along with a new algorithm based on the fusion of symmetric-key cryptography, DNA nucleotides, and XOR operation is proposed. This algorithm is very much efficient and one main striking feature of the algorithm is the security which can be set as per sender requirements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kahate, A.: Cryptography and Network Security, 3rd edn. New Delhi (2016) Kahate, A.: Cryptography and Network Security, 3rd edn. New Delhi (2016)
2.
Zurück zum Zitat Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(5187), pp. 1021–1025 (1994) Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(5187), pp. 1021–1025 (1994)
3.
Zurück zum Zitat Hao, L.B., Lee, H.C., Zhang, S.Y.: Fractals related to long DNA sequences and complete genomes. Chaos Solitons Fractals 11, pp. 825–836 (2000) Hao, L.B., Lee, H.C., Zhang, S.Y.: Fractals related to long DNA sequences and complete genomes. Chaos Solitons Fractals 11, pp. 825–836 (2000)
4.
Zurück zum Zitat Zhang, Q., Zhou, S., Wei, X.: An efficient approach for DNA fractal-based image encryption. Appl. Math. Inf. Sci. 5(3), pp. 445–459 (2011) Zhang, Q., Zhou, S., Wei, X.: An efficient approach for DNA fractal-based image encryption. Appl. Math. Inf. Sci. 5(3), pp. 445–459 (2011)
5.
Zurück zum Zitat Zhang, Y., Fu, B., Zhang, X.: DNA cryptography based on DNA fragment assembly. Information Science and Digital Content Technology (ICICDT). In: IEEE International Conference, vol. 1, pp. 179–182 (2012) Zhang, Y., Fu, B., Zhang, X.: DNA cryptography based on DNA fragment assembly. Information Science and Digital Content Technology (ICICDT). In: IEEE International Conference, vol. 1, pp. 179–182 (2012)
6.
Zurück zum Zitat Verma, A.K., Dave, M., Joshi, R.C.: Securing ad hoc networks using DNA cryptography. In: IEEE International Conference on Computers and Devices for Communication, pp. 781–786 (2006) Verma, A.K., Dave, M., Joshi, R.C.: Securing ad hoc networks using DNA cryptography. In: IEEE International Conference on Computers and Devices for Communication, pp. 781–786 (2006)
7.
Zurück zum Zitat Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: Bio-Inspired Computing: Theories and applications, IEEE International Conference, pp. 37–42. Adelaide, SA, Australia (2008) Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: Bio-Inspired Computing: Theories and applications, IEEE International Conference, pp. 37–42. Adelaide, SA, Australia (2008)
8.
Zurück zum Zitat Yupeng, Z., Yu, Z., Zhong, W., Sinnot, R.O.: Index based symmetric DNA encryption algorithm. In: IEEE, 4th International Congress on Image and Signal Processing, pp. 2290–2294 (2011) Yupeng, Z., Yu, Z., Zhong, W., Sinnot, R.O.: Index based symmetric DNA encryption algorithm. In: IEEE, 4th International Congress on Image and Signal Processing, pp. 2290–2294 (2011)
9.
Zurück zum Zitat Kannadasan, R., Basha, M.S., Emerson, I.A.: Survey on molecular cryptographic network DNA (MCND) using BIG DATA. In: 2nd International Symposium on Big Data and Cloud Computing (ISBCC) Procedia Computer Science, vol. 50, pp. 3–9 (2015) Kannadasan, R., Basha, M.S., Emerson, I.A.: Survey on molecular cryptographic network DNA (MCND) using BIG DATA. In: 2nd International Symposium on Big Data and Cloud Computing (ISBCC) Procedia Computer Science, vol. 50, pp. 3–9 (2015)
10.
Zurück zum Zitat Reza, M., Torkaman, N., Kazazi, N.S.: A method to encrypt information with DNA-based cryptography. Int. J. Cyber Secur. Digit. Forensics (IJCSDF) 4(3), pp. 417–426 (2015) Reza, M., Torkaman, N., Kazazi, N.S.: A method to encrypt information with DNA-based cryptography. Int. J. Cyber Secur. Digit. Forensics (IJCSDF) 4(3), pp. 417–426 (2015)
11.
Zurück zum Zitat Tanaka, K., Okamoto, A., Saito, I.: Public-key system using DNA as a one-way function for distribution. Biosystem 81(1), pp. 25–29 (2015) Tanaka, K., Okamoto, A., Saito, I.: Public-key system using DNA as a one-way function for distribution. Biosystem 81(1), pp. 25–29 (2015)
12.
Zurück zum Zitat Singh, H., Chugh, K., Dhaka, H., Verma, A.K.: DNA based cryptography: an approach to secure mobile networks. Int. J. Comput. Appl. 1(19), pp. 77–80 (2010) Singh, H., Chugh, K., Dhaka, H., Verma, A.K.: DNA based cryptography: an approach to secure mobile networks. Int. J. Comput. Appl. 1(19), pp. 77–80 (2010)
Metadaten
Titel
A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques
verfasst von
Animesh Hazra
Soumya Ghosh
Sampad Jash
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_59

Neuer Inhalt