DNA encoding scheme based on biological operations
Résumé
The internet is a global conduit for information. An enormous amount of data is being transmitted globally over the internet at any moment. Secure transmission of this data is a critical need in the modern world.
To prevent unwanted access by any node along the path, that information must be secured. Users need to ensure the privacy, integrity, and confidentiality of data traveling over insecure communication channels. In this paper, we propose a new approach in symmetric key cryptography which consists of two rounds of processing for delivering information security services (Authentication, Integrity, and Confidentiality). In the first round, a CSPRNG is generated using C# based on a secure seed then is coded using a biological DNA operation to be used as a random key for OTP. In the second round of processing, the XOR arithmetic operation is used as an encryption technique. Our proposed system is more secure compared to the conventional binary coding encryption technique with DNA sequence because the symmetric key goes through three biological process which adds confusion and making it more difficult to decrypt the cipher data. Using a message
digest produced by MD5, the suggested method also ensures integrity.
Téléchargements
Références
A. Aich, A. Sen, S.R. Dash. A symmetric key cryptosystem using DNA sequence with OTP key. Information Systems Design and Intelligent Applications: Proceedings of Second International Conference INDIA, Volume 2. Springer India, (2015). 207 − 215.
S. AL-Wattar and al. Review of DNA and Pseudo DNA Cryptography, International Journal of Computer Science and Engineering, Vol 4, (2015), 65-76.
J. Chen, A DNA-based, biomolecular cryptography design. In 2003 IEEE International Symposium on Circuits and Systems (ISCAS) (Vol. 3, pp. III-III). IEEE, (2003, May).
S. Dhawan, A. Saini. Secure data transmission techniques based on DNA cryptography. Int. J. Emerg. Technol. Comput. Appl. Sci, vol. 2, no 1, p. 95-100 (2012).
A. Gehani, T. LaBean, J. Reif. DNA-based cryptography. Aspects of molecular computing: essays dedicated to tom head, on the occasion of his 70th birthday, (2004), 167 − 188.
O. Goldreich. Modern cryptography, probabilistic proofs and pseudorandomness. Springer science and business Media, Vol. 17, (1998).
R. Hegadi, A.P. Patil. . A Statistical Analysis on In-Built Pseudo Random Number Generators Using NIST Test Suite. In : 2020 5th International Conference on Computing, Communication and Security (ICCCS). IEEE, 2020. p. 1-6.
H. Z. Hsu, R.C.T. Lee. DNA based encryption methods. The 23rd workshop on combinatorial mathematics and computation theory, (2006, April), 545.
M. K. Ibrahem.(2012, April). Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof. In 2012 international conference on future communication networks (pp. 147-152). IEEE.
S. Kalyani, N. Gulati, Pseudo DNA cryptography technique using OTP key for secure data transfer. International journal of engineering science and computing, (2016) vol. 6, no 5, p. 5657-5663.
S.S. Nafea, M.K. Ibrahem, Cryptographic algorithm based on DNA and RNA properties. International journal of advanced research in computer engineering and technology, vol. 7, no 11, p. 804-811.(2018).
P. Pavithran, S. Mathew, et al. A novel cryptosystem based on DNA cryptography and randomly generated mealy machine. Computers and Security, vol. 104, p. 102160, (2021).
A. Rukhin, J. Soto, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications. US Department of Commerce, Technology Administration, National Institute of Standards and Technology, vol 22, (2001).
M. Sabry, M. Hashem, T. Nazmy.Digital encoding to the form of amino acids for DNA cryptography and biological simulation. International Journal of Computer Applications, 2017, vol. 165, no 10.
A. Shamir. On the generation of cryptographically strong pseudorandom sequences. ACM Transactions on Computer Systems, vol 1, (1983), 38-44.
S. Tang, F. Liu. A one-time pad encryption algorithm based on one-way hash and conventional block cipher. 2nd International conference on consumer electronics, Communications and entworks, (2012, April). 72-74.
P.S. Varma, K.G. Raju. Cryptography based on DNA using random key generation scheme. International Journal of Science Engineering and Advance Technology, vol. 2, no 7, (2014). 168-175.
Q. Zhang, L. Guo, X. Wei. A novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system. optik international journal for light and electron optics, vol. 124, no 18, p. 3596-3600, (2013).
Copyright (c) 2025 Boletim da Sociedade Paranaense de Matemática

Ce travail est disponible sous la licence Creative Commons Attribution 4.0 International .
When the manuscript is accepted for publication, the authors agree automatically to transfer the copyright to the (SPM).
The journal utilize the Creative Common Attribution (CC-BY 4.0).



