A Bio-Inspired Algorithm for Symmetric Encryption

A Bio-Inspired Algorithm for Symmetric Encryption

Kadda Benyahia (Laboratory Technology of Communication, University of Tahar Moulay, Saida, Algeria), Meftah Mustapha (Department of Electronic, University of Science and Technology of Oran, Algeria) and Latreche Abdelkrim (University of Saida, Algeria)
Copyright: © 2020 |Pages: 13
DOI: 10.4018/IJOCI.2020010101

Abstract

The exploits of the structure of the DNA to realize the cryptographic systems is a new direction. The security of data transfer is an important factor for data transmission. Cryptography is one of the methods that ensures this constraint by techniques for sending data confidentially. Harnessing the benefits of DNA to secure information content makes cryptography more efficient. In this article, the authors propose a symmetric cryptography system based on DNA called Stegano-DNA- which operates under two main modules: scrambling and encryption. In its scrambling phase, Stegano-DNA eliminates the logical order of the letters in the clear text by the use of boxes of substitutions, and in its encryption phase, looks for the short sequence DNA in the chromosome sequence and memorizes only the number of positions needed to optimize the encryption time than when memorizing all positions.
Article Preview
Top

1.Introduction

Cryptology, etymologically the science of secrecy, encompasses cryptography, the art of hidden writing, and cryptanalysis whose goal is to attack cryptographic methods (Phan & Pointcheval,2005), it has become a separate science that precisely integrates mathematics, computer science and other sciences. Figure 1 represents the cryptographic process that encompasses two main phases encryption and decryption.

Figure 1.

Process of cryptography (Bhatia & Sumbaly, 2014)

IJOCI.2020010101.f01

Recently, a new line of research in cryptography has emerged. It exploits the structure of the DNA to realize the cryptographic systems It is the cryptography with the DNA.

The DNA

DNA, or deoxyribonucleic acid, is the hereditary material in humans and almost all other organisms. The information in DNA like in Figure 2 is stored in a code made of four chemical bases: adenine (A), guanine (G), cytosine (C), and thymine (T).

Figure 2.

DNA structure

IJOCI.2020010101.f02

DNA cryptography (DNA cryptography) is a new research focus in bio-inspired cryptography. Due to its large storage capacity and massive parallelism in computing, DNA can be very useful in cryptography.

Top

2.State Of The Art

Advanced algorithms and methods of security and confidentiality are proposed in different axes, Cloud Bioinformatics (Chang, 2014), smart IoT-based healthcare (Yang et al., 2019), cloud-of-things environments (Sohal et al., 2018) and quantum attack (Yang et al., 2017), whose goal is to ensure the objectives of security: integrity, confidentiality, availability, non-repudiation, and authentication.

Cryptography by DNA is one of these advanced methods. There are different techniques of cryptography DNA that has been developed. In 1994, Adleman (Adleman, 1994) laid the foundation of DNA informatics by providing solutions to combinatorial problems using molecular computation using some Standard Enzym (Rozenberg & Salomaa, 2006). This work was extended by Lipton (1995) by solving another NP-complete problem called “satisfaction” by using DNA molecules in a test tube to encode the graph for 2-bit numbers.

Lipton (1996) exploited the work of Adelman and Lipton to break one of the symmetric key algorithms used for cryptographic purposes known as DES (Data Encryption Standard). They performed biological operations on the DNA strands, they broke DES in just 4 months.

Based on the work of Adelman, in 1997 Ouyanag et al. (1997) showed the effectiveness of DNA by generating solutions of NP-complete problems. DNA cryptographic approach based on the “one-time-pad” molecular theory and performed the encryption / decryption of the 2D image is developed by Chen (2003).

Gibert et al. (2004) laid the foundation for the DNA cryptography basics using the molecular approach and the one-time-pad concept. They proposed an encryption and decryption method that relies on a DNA chip and one -time pad. It is therefore very difficult for the adversary to obtain the encrypted message, this approach is followed by a public key based cryptographic system (one way) by Tanaka et al. (2005).

Amin et al. (2006) proposed a symmetric key based cryptographic DNA approach, where key sequences are obtained from the genetic database.

In 2008, Verma et al. (2008) proposed a new paradigm for secure routing in ad hoc mobile networks (Manet) that uses the pseudo-DNA cryptography approach to secure networks. ad hoc. By transforming the message into a DNA format then it goes through an mRNA transcription phase that will be translated into proteins (translation) which is the result of encryption. This encrypted Text is sent through a secure channel to the recipient and a symmetric key with one-time pad is used at the endpoints (encryption and decryption).

Complete Article List

Search this Journal:
Reset
Open Access Articles
Volume 10: 4 Issues (2020): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing