The report discusses a new cryptographic algorithm using biological computation. DNA sequencing is used to encode data. The process is secure, effective and the future of cryptography.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
DNA-Genetic Encryption Technique Abstract—Thereportdiscussesanewcryptographic algorithm using biological computation. DNA sequencing is used to encode data. The process is secure, effective and the future of cryptography. Keywords—cryptography, DNA, encryption, algorithm I.INTRODUCTION In this digital world, security of data flowing is a major issue.Encryptionofbothstaticandflowingdata, implementationofcontrolonuseraccessbecomes important.Cryptographyisthebranchthatdealswith encoding and decoding of sensitive data and unauthorized access from a third party. Numerous cryptographic methods are implemented for securing sensitive data in the network channel. DNA Genetic Encryption Technique or D-GET is a rapidlyevolvingtechnologythatisbothsecureand unpredictable. The concept of biological framework of the DNA also knows as molecular computing is used. The processhelpsintransmissionofdatapacketsoverthe network channel faster and securely. The binary digital data is converted into DNA sequence. The sequence is encrypted, mutated and crossed over. Certain stages gets repeated in D- GET model [1]. The encrypted data is decrypted with a key. Without proper encryption technique it is not possible to retrieve information from an encrypted information. Hence properencryptionkeyisrequiredinthiscontext.This processhasanotherbenefittoo.Asinformationisnot possibletoretrieveproperencryptionkey,itisnot accessible without proper authorization. The technique has provedtopromotehigherlevelofdatasecurity.DNA cryptographyisbelievedtoputforwardunbreakable algorithms.DNAcryptographytechniquehasseveral advantages- high computation speed, minimal requirement of storage system and power utilization. II.DISCUSSION Cryptography includes mathematical techniques to maintain dataauthenticationandintegrity.Itbasicallyattachan encryption technique along with an encryption key that is integrated with the document that needs to be secured so that it is not easily interpreted. There are various cryptographic algorithms. However, not every algorithm is equally secured and effective and hence proper analysis is required in this context.DNACryptographicmethodscanbeusedto encrypt not only images and texts, but also audio and video clips and money transaction [4]. DNA (Deoxyribonucleic acid)isdoublehelixstructure,whichcarriesgenetic information and is present in the mitochondria of the cell. DNA-Genetic Encryption Technique D-GET is an iterative algorithm uses bio-molecular approach for encoding the plaintext. The technique uses the DNA properties and the process requires minimum storage and computes with high efficiency[1].Dataofanykind,forexampleimage, message or video can be easily encrypted using DGET. The stringgeneratedbyusingDGETishighlysecureand efficient. The functions used improves the complete working of the algorithm. Power consumption for such techniques are also low [3]. For encrypting a data through the DGET model there are five steps involved [2]. The steps of DGET are as follows: a) Pre-processing Stage, b) Symmetric key encryption, c) Reshaping, d) Crossover and e) Mutation. A.Pre-processing stage The chemical bases of DNA are: adenine (A), cytosine(C), guanine (G), and thymine (T).Each base of the DNA has an ASCII value. (A) is coded as 00, (C) as 01, (G) as 10 and (T) as 11. Ingrayimage,pixelsareconvertedinto8-bit binary. In case of RGB image, the bases are separated into three components. For videos, information are deducted from the video like the size of the file, duration, format and frame rate. Each frame is separated and saved into memory. Data can be easily represented in binary form. Data is grouped into 8-bits. Group of two bits are converted into the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
four bases of the DNA sequence, that is the 1s and 0s are converted in to A, C, G and T. B.Key Encryption Stage Symmetric and Asymmetric key algorithms are the two categories of the cryptographic algorithms. In symmetric scheme, a key, which is common to both the sender and the receiver is shared. Whereas asymmetric schemes require bothprivateandpublickeys.Thekeysarerelated mathematically.Symmetric cryptographyalgorithm can easily encrypt huge quality and quantity of data with high speed. After the data is converted into the DNA sequence using the key. The key used is of variable length and can be binary string or DNA sequence. Exclusive OR is performed on the binary data and on the common key. Then the code is converted into the DNA sequence. C.Reshaping Stage ThenextoperationperformedontheencryptedDNA sequence is reshaping. The dense chromosome population that is generated is reshaped. The length of the chromosome are determined. The very first number of the chromosome generated is noted. The values can vary or remain constant in every circle. Reshaping is done by aligning the sequence to construct rows of parental chromosomes and the length is pre-defined. D.Crossover Stage Thenextoperationtobeappliedonthechromosome population is crossover. This stage involves two types of crossover- single-point crossover and rotation crossover. In a single-point crossover, the first and last bit of the parent chromosome sequence is selected in creating new offspring. Two such offspring are created by interchanging the head bits of the parents. The child chromosome carries codes from both the parents. In rotation crossover the aligned DNA sequence are either rotated left or right with their predetermined value. E.Mutation Stage Mutation stage comes right after crossover stage where the chromosomes are submitted to mutation. This process alters the strings of the coded element. Mutation process involves two kinds. Type one converts the coded data to the binary form and mutation points are mentioned between first and end bits. The bits are complemented.Type two converts a group of four bits into two DNA base. After the conversion, the DNA bases are altered and two points are marked in between the first and the end base. The DNA bases are altered [2]. Then the mutated data is send to the sender. The senderonitsendusingthecommonkeydecrypts, crossovers and mutates to get the original form of the data. D-GET uses MATLAB [2]. Experiments are conducted to prove the efficiency of the technique on different image formats.TheRGBimage,isfirstseparatedinto3 components and the encrypted using DGET process and the image is saved. Important matter is after encryption there is no visual connection between the encrypted and the original one. III. CONCLUSION DNA-GeneticEncryptionTechniqueimplementationis being used largely in the cryptographic field. The process is secure as it includes multiple iterative methods. Security in this aspect is an important and essential requirement as the data that is considered in this context is very important from privacypointofview.Thealgorithmperformsgenetic operations. The complete process includes five stages which greatly increases the quality of the encrypted content. This process can be applied on texts, audio and video clips. Hence this process is an important one as it is not only versatile, it is efficient too which is required for this kind of advanced applications. The plaintext is transformed into a DNA sequence using a key. The originality of the message remains a secret as an intruder cannot know whether it is an image or a text. To decrypt the generated cypher is highly impossible. Proper authorization is required and hence this processis sodifficulttoexploitwhichisrequiredfor accessingencryptedinformationproperly.Thereis protection in each layer, which makes the technique robust and effective.
IV. REFERENCES [1]J. Gavinho, G. P. Silva, C. Miceli, and Ieee, A Public Key Compression Method for Fully Homomorphic Encryption using Genetic Algorithms. 2016. [2]H.M.Mousa,“DNA-GeneticEncryption Technique,” Int. J. Comput. Netw. Inf. Secur., 2016. [3]S.Kalsi,H.Kaur,andV.Chang,“DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation,” J. Med. Syst., 2018. [4]P. Praveenkum, P. Rajalakshm, K. Thenmozhi, J. B. B. Rayappan, and R. Amirtharaj, “Horse DNA Runs on Image: A Novel Road to Image Encryption,” Res. J. Inf. Technol., 2016.