Bio-Inspired Multi-Level Hybrid Crypto System

Bio-Inspired Multi-Level Hybrid Crypto System

Padmapriya M. K., Pamela Vinitha Eric
Copyright: © 2022 |Pages: 16
DOI: 10.4018/IJSI.301223
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Research in information Security is very much essential as there is an increase in data breach. DNA cryptography is one of the invention in the field of data security which provides hope for an unbreakable algorithm. This paper presents a multi-level hybrid crypto system based on DNA cryptography and DNA steganography. The proposed method uses a DNA sequence from publicly available DNA data base as a onetime pad. Initially plaintext is converted into DNA form of cipher text and then using central dogma of molecular biology concept DNA strings are converted into amino acid codes which represents the protein form of data. The crux of the algorithm lies on the one-time pad used for encryption process. The proposed system combines the advantages of DNA cryptography, DNA steganography and one time pad. Security analysis shows that proposed method is strong enough to resist brute force attacks as well as cryptanalytic attacks.
Article Preview
Top

Introduction

Today’s business runs on data. Data forms the most valuable asset for majority of the companies. No industry is immune to data security threats. Advancements in technology has given a platform for cybercrimes as well. Cybercrimes pose severe threats to the world-wide economy and the society(Tsakalidis, 2019). According to the statistics gathered by Breach Level Index, more than 2 million records per day were breached in year 2014, which means 32 records were breached each second. Protecting the irreplaceable data is very challenging and has highest priority in the current scenario of cybercrime. It is obvious that new tactics are required to protect the intellectual property, documents or any other sensitive information.

Carrying the data in the form of DNA!!! Yes, sounds fascinating. DNA cryptography is a key innovation in the field of cryptography. A new technique for securing the data was introduced using biological structure of DNA, called as DNA computing. It was invented by Leonard Adleman in the year 1994 for solving complex problems like directed Hamilton path problem, NP complete problems (Adleman, 1994). Later, the technique was extended by various researchers for encrypting and reducing the size of the data to aid faster and secure transmission over a network(Cherian et al., 2013; Roy & Nath, 2016). The strong features of DNA like vast parallelism, exceptional energy efficiency and extraordinary information storage capacity, uniqueness are being explored for computing, data storage and cryptography. The concept of DNA computing in the field of DNA cryptography has paved the way for the development of unbreakable algorithms (Hammad et al., 2020; S & Murugavalli, 1999).

DNA is the carrier of information which contains the fundamental and distinctive characteristics or qualities of a living being. DNA is made up of molecules called nucleotides. Each nucleotide contains a phosphate group, a sugar group and a nitrogen base. The four types of nitrogen bases are adenine (A), thymine (T), guanine (G) and cytosine (C). The order of these bases is what determines DNA's instructions, or genetic code. Nucleotides are attached together to form two long strands that spiral to create a structure called a double helix. In a double helix DNA string, the two strands are complementary to each other, A to T and C to G according to Watson crick rules (M.K, 2016).

DNA encryption uses several concepts listed below.

  • Bio molecular structure, the randomness and incredible information storage nature of DNA is the greatest strength for developing a strong encryption algorithm.

  • Polymerase chain reaction (PCR) used for amplifying the DNA segments.

  • Central dogma of molecular biology is the process by which the information contained in genes is converted into corresponding protein.

  • One Time Pad (OTP) technique, a plaintext is paired with a random secret key which is called as one time pad using some modular arithmetic operation (M.K, 2016).

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024)
Volume 11: 1 Issue (2023)
Volume 10: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2021)
Volume 8: 4 Issues (2020)
Volume 7: 4 Issues (2019)
Volume 6: 4 Issues (2018)
Volume 5: 4 Issues (2017)
Volume 4: 4 Issues (2016)
Volume 3: 4 Issues (2015)
Volume 2: 4 Issues (2014)
Volume 1: 4 Issues (2013)
View Complete Journal Contents Listing