DNA Cryptography

DNA Cryptography

Pradipta Roy (West Bengal University of Technology, India), Debarati Dey (West Bengal University of Technology, India), Debashis De (West Bengal University of Technology, India) and Swati Sinha (University of Calcutta, India & West Bengal University of Technology, India)
DOI: 10.4018/978-1-5225-5634-3.ch037


In today's world, sensitive information like secret message, financial transaction, medical report, personal information is transferred over public communication channel. Since the advancement of communication begins, data security becomes a massive problem. The increasing rate of eavesdropping over communication channel leads the introduction of cryptography algorithm for data transmission. Different traditional cryptographic technique is adopted worldwide for protected data transmission. The recent advancement on this field is DNA based cryptography. This chapter describes the application of DNA as computational tool after the exposure of its capability was discovered by Leonard M. Adleman in 1994. Its random nature also helps the cryptography algorithm to become unbreakable. Conventional cryptography methods are sometimes susceptible to attack by the intruder. Therefore the idea of using codon based DNA as a computational tool is used in this cryptography method as an alternative method that fetches new hope in communication technology.
Chapter Preview


Learning new technologies for secure data transmission has very essential implication to us. Technology regularly looks for novel ways of maintaining and resting declare to information. Over number of years, DNA computing has confirmed its efficiency as a programming method for the training set that controls and develops life. Its efficiency and tendency for fixing complicated, extremely related computational problems are also been confirmed. The capability to cover up, watermark, and explanatory information in this method is visibly significant.

Nowadays, genetics and molecular biology are intensely investigated areas with significant quantities of intangible property. Educational and professional organizations may experience more relaxed performing many years expensive research to identify and recombine that gene accountable for some important compound, if there was a handful of path to include an impressive work to determine their participation and declare the performance. The characteristics of DNA are of this kind that, once the actual perform of identifying and determining is done, duplicating is simple.

Furthermore, it is established the DNA has important computational energy to execute billions of similar functions. This area is still in developing phases but DNA processing is already being paid a lot of attention, not only for uniqueness of the complete factor, except in theory, it does factors in days or hours that the present electronic computer systems cannot do in a life-time. There is already a lot of interest to watermarking electronic circuits and alternatives created by electronic computer systems. It appears helpful to regard as the same types of factors with respect to DNA.

DNA computing is basically a programming method. Just similar to a RAM or hard drive, DNA lengths contain details which can be considered and duplicated. On the other hand, DNA contains a series of four nucleic acids, such as, Adenine (A), Thymine (T), Cytosine (C) and Guanine (G) rather than a binary reflection of ones and zeroes, which are allocated for individual knowing. These four nucleotides are used to scribe binary details. Ongoing the example, concealing a key concept in a binary series can be achieved by including the concept and improving the dimension the series as a whole, and by changing some section wisely so that the information is not changed perceptibly or functionally. To include this type of concept, no one will randomly add or intersperse details. It needs a finish knowing of the unique concept and the equipment that procedures it. In the same way, one would not thoughtlessly modify a series of nucleotides basically to accomplish a hiding mechanism.

Complete Chapter List

Search this Book: