Article Preview
Top1. Introduction
The Internet of Things (IoT) is a network of internet-connected devices that can collect and exchange data using embedded sensors. In today's IT industry, IoT and Cloud computing are the major technologies gaining traction. Their use is more in line with contemporary trends due to their integrity and compatibility in all computing devices (Pandey, 2019). These technologies are integrated to create the IoT cloud platform. Because these technologies are utilized automatically, there is a requirement for data security from the devices linked by these technologies. For data security, a variety of concepts have been proposed.
For encouraging the delicate trade of data between any sender and beneficiary, safe correspondence is vital. These days, the web has become the discussion for all banking and electronic trade exchanges and it is extremely important that the connection is made in a profoundly secure way (Poojashree et al., 2020). A few strategies and frameworks have been created to scramble and unscramble the plain content in numerical cryptography to satisfy these security prerequisites (Narasingapuram & Ponnavaikko, 2020). Such methodologies are anyway conquered utilizing procedures and strategies for DNA cryptography. DNA cryptography is a significant control of computational DNA science. DNA cryptography plays a major part in the survival of the next generation. Numerous calculations offered in DNA cryptography have constraints therein some of their steps they either utilize standard math cryptography or upheld natural lab explores that do not appear to be suitable inside the advanced registering world.
Morse code is a text encoding system with a sequence of dashes and dots that can be transmitted over radio waves, light or sound. It can be decoded without specialised equipment by a skilled listener. In the early days, Morse code was used to apply electric telegraphs to transmit short text messages over long distance cables. During the rhythm of the Morse code, the sending operator used the Morse key (switch) to switch electrical power on and off. The electrical current engaged an electro-magnet at the receiving end, which would 'press' in the Morse signals pattern. Codes were written directly on paper, in most cases by attaching the pen to an electromagnet, resulting in an initial sequence of dashes, dots, and spaces. It was perfect for broadcasting via Short Wave Radio (SWR-High Frequency), because Morse code requires a smaller bandwidth. Even if the signal was disruptive and noisy, a competent Morse operator would still be able to 'read' the text. So, the Morse code is combined with DNA computing to avoid the attack played over the plaintext.
The key issues in the DNA computation for DNA cryptography is complete character set encoding table. It should be capable of encoding every DNA references to the full ASCII character set, so that the printable components of the entire ASCII character set are mapped to the DNA references, and the encoding table must have the attribute of uniqueness at all times. This is done to prevent two characters from being mapped to the same DNA references. Therefore, proposed framework describes a new, effective, unique, and dynamic DNA calculation method to address this gap, and also give an overview of its results. For the computation, this DNA cryptography uses the Central Molecular Biology Dogma (CDMB) theory. The genetic code translation of RNA is deterministic and has been broken to attack. For example, CTG is translated by RNA arrangements; it randomly picks one of the two tRNA of serine and leucine microbe DNA references. Hence, the encoding is achieved by ‘short’ and ‘long’ length of current flow through a computing within the Morse code system.
The objective of this research was to provide new techniques for secure data transmission. A new parallel cryptography approach based on DNA molecular structure and Morse code pattern is proposed in this research article. DNA collection technique significantly decreases the time complexity with the entire character set encoding table. The complete character set table Morse DNA allocation contains the special characters, numbers, uppercase, and lowercase alphabets. The proposed method achieves high security by evaluating the parameters like Brute-Force Attack (BFA), Ciphertext-Only Attack (COA), Linear Cryptanalysis Attack (LCA), Differential Cryptanalysis Attack (DCA), and Timing Attack (TA). Avalanche effect, confusion and diffusion in cryptography are the properties of a stable cipher operation are also evaluated to maximize security. The proposed DNA computing based cryptography criteria has fulfilled to maintain the organic forms without repudiating the organic forms’ nature.