SlideShare a Scribd company logo
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
51
Secure Data Transmission Using DNA ENCRYPTION
ANUPRIYA AGGARWAL1
& PRAVEEN KANTH2
1Research Scholar, BRCM, Bahal, Haryana, India
2Assistant Professor, BRCM, Bahal, Haryana, India
Abstract
DNA Encryption is preferable biological technique for securing text/image because of its parallelism, vast
storage and fast computing quality. The process involve biological molecule present in human body called DNA
abbreviated as Deoxyribose Nucleic Acid .The DNA molecule is synthesized and protein component part is
extracted and then converted to nitrogen base . This nitrogen base is used in Encryption/Decryption and
formulated as A (Adenine), C (Cytosine), T (Thymine) and G (Guanine) characters.
DNA Cryptography components are ACTG characters only and how the message gets merged and located is
known as DNA Cryptography. This ACTG characters create DNA Sequence S and merged with message M to
produce new sequence S’ and send to receiver where Sequence S’ back converted to S.
The paper will introduce traditional methods of DNA cryptography in which there is need of key and proposed
methods ,in which introduction to key is not required ,hence removing the tension of securing the key. The
proposed method involves Complementary pair method.
1. Introduction
The earliest form of cryptography was the simple writing of a message, as most people could not read (New
World, 2007). In fact, the very word cryptography comes from the Greek words kryptos and graphein, which
mean hidden and writing, respectively (Pawlan, 1998).
Early cryptography was solely concerned with converting messages into unreadable groups of figures to protect
the message’s content during the time the message was being carried from one place to another. In the modern
era, cryptography has grown from basic message confidentiality to include some phases of message integrity
checking, sender/receiver identity authentication, and digital signatures, among other things (New World, 2007).
DNA Cryptography
In human body to transform the genetic inform from one part to another part nucleic acids are present. There are
two type of nucleic acid DNA and RNA which code for all type of instructions needed for the cell to perform
different function. The DNA Stands for Deoxyribo Nucleic Acid. DNA is the molecule that contains the genetic
code of organism. DNA is material that governs Genetic similarity of looks, nature in human and animals.
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
52
Comparisons between Different Cryptography Techniques
— DES is the old "data encryption standard" from the seventies. Its key size is too short for proper security
(56 effective bits; this can be brute-forced, as has been demonstrated more than ten years ago). Also,
DES uses 64-bit blocks, which raises some potential issues when encrypting several gigabytes of data
with the same key (a gigabyte is not that big nowadays).
— 3DES is a trick to reuse DES implementations, by cascading three instances of DES (with distinct
keys). 3DES is believed to be secure up to at least "2112
" security (which is quite a lot, and quite far in
the realm of "not breakable with today's technology"). But it is slow, especially in software (DES was
designed for efficient hardware implementation, but it sucks in software; and 3DES sucks three times as
much).
— Blowfish is a block cipher proposed by Bruce Schneier, and deployed in some softwares. Blowfish can
use huge keys and is believed secure, except with regards to its block size, which is 64 bits, just like
DES and 3DES. Blowfish is efficient in software, at least on some software platforms (it uses key-
dependent lookup tables, hence performance depends on how the platform handles memory and
caches).
— AES is the successor of DES as standard symmetric encryption algorithm for US federal organizations
(and as standard for pretty much everybody else, too). AES accepts keys of 128, 192 or 256 bits (128
bits is already very unbreakable), uses 128-bit blocks (so no issue there), and is efficient in both
software and hardware. It was selected through an open competition involving hundreds of
cryptographers during several years. Basically, you cannot have better than that.
Advantages of DNA Cryptography
— DNA chains have a very large scale of parallelism, and its computing speed could reach 1 billion times
per second.
— The DNA molecule - as a carrier of data - has a large capacity. It seems that one trillion bits of binary
data can be stored in one cubic decimetre of a DNA solution.
— A DNA molecular computer has low power consumption, only equal to one-billionth of a traditional
computer.
Components of DNA
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
53
DNA is a polymer. The monomer units of DNA are nucleotides, and the polymer is known as a
"polynucleotide." Each nucleotide consists of a 5-carbon sugar (deoxyribose), a nitrogen containing base
attached to the sugar, and a phosphate group. There are four different types of nucleotides found in DNA,
differing only in the nitrogenous base. The four nucleotides are given one letter abbreviations as shorthand for
the four bases.
A is for adenine
G is for guanine
C is for cytosine
T is for thymine
Structure of A and G
Purine Bases
Adenine and guanine are purines. Purines are the larger of the two types of bases found in DNA. Structures are
shown below:
The 9 atoms that make up the fused rings (5 carbon, 4 nitrogen) are numbered 1-9. All ring atoms lie in the same
plane.
Structure of C and T
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
54
Pyrimidine Bases
Cytosine and thymine are pyrimidines. The 6 Atoms (4 carbon, 2 nitrogen) are numbered 1-6. Like purines, all
pyrimidine ring atoms lie in the same plane.
2. Related literature
Technology and Software
DNA cryptography is a subject of study about how to use DNA as an information carrier and it uses modern
biotechnology as a measure to transfer ciphertext into plaintext. Thus, biotechnology plays an important role in
the field of DNA cryptography. In this part we will introduce some of the DNA biotechnology and software of
the field of DNA.
DNA Coding Scheme
The easiest way to encode is to represent four units as four figures:
A (0) – 00.
T (3) – 11.
C (2) – 10.
G (1) – 01.
Obviously, by these encoding rules, there are 4! = 24 possible encoding methods. For DNA encoding, it is
necessary to reflect the biological characteristics and pairing principles of the four nucleotides. Based on this
principle, we know that:
A (0) – 00 and T (3) – 11 make pairs,
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
55
G (1) – 01 and C (2) – 10 make pairs.
Traditional DNA Encryption Algorithm
In this section we propose two methods to encrypt the plaintext using DNA, so that it could be send securely
over a network.
A. Method I
Encryption
Step1: The binary data, text or image, is used under the form of ASCII code (in decimal format).
Step2: These numbers are then grouped in blocks and encrypted in using a traditional method (eg. DES, will
form a 2 level encryption).
Step3: This encoded message is then changed to binary format.
Step4: Then these digits are grouped into two and substituted as A for 00, T for 01, G for 10, and C for 11.
Step5: We then fit the primers on either side of this message. Primers will act as stoppers and detectors for the
message. This has to be given to the receiver prior to the communication.
Step6: This message is followed by our own DNA sequence followed by another stopper/primer.
Step7: This message is then flanked by many sequences of DNA or by confining it to a microdot in the micro-
array.
Step8: If considered as a pseudo method: this sequence is transferred to the receiver through the Internet. Else
the micro-array is sent physically (though time consuming).
Decryption
This message can then be recovered only by an intended recipient who both can find it, and who knows the
sequences of the PCR primers employed, and also the encryption key (2 level encryption used). For pseudo
method:
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
56
Step1. The DNA sequence is searched for the primers (start primer and end primer). The message in-between
them is retrieved and the next DNA sequence before the next primer (our DNA) is retrieved.
Step2. The ATGC characters are substituted accordingly (00,01,10,11 respectively).
Step3. They are then converted into ASCII code and then the message is retrieved.
For the use of actual DNA:
Step1. We have the DNA. What we want is the message flanked by the primers. To accomplish this we can use a
technique called Polymerase Chain Reaction (PCR), which allows you to produce many copies of a specific
sequence of DNA. PCR is an iterative process that cycles through a series of copying events using an enzyme
called polymerase. Polymerase will copy a section of single stranded DNA starting at the position of a primer, a
short piece of DNA complimentary to one end of a section of the DNA that you're interested in. By selecting
primers that flank the section of DNA you want to amplify, the polymerase preferentially amplifies the DNA
between these primers, doubling the amount of DNA containing this sequence. After many iterations of PCR, the
DNA we are working on is amplified exponentially.
Step2.Then the ATGC sequence in this DNA strand is read.
Step3. The ATGC characters are substituted accordingly (00,01,10,11 respectively).
Step4. They are then converted into ASCII code and then the message is retrieved.
B. Method II
Encryption
Step 1: Sender encodes his message in the original DNA sequence and allows the message to be transcripted to
mRNA. During transcription, a DNA segment that constitutes a gene is read, starting from the promoter (starting
position) of the DNA segment. The non-coding areas (intron) are removed according to certain tags, and the
remaining coding areas (extron) are rejoined and caped. Then the sequence is transcribed into a single stranded
sequence of mRNA (messenger RNA). The mRNA moves from the nucleus into the cytoplasm
Step 2: At this stage, the mRNA is translated to protein. During translation, the mRNA sequence is translated
into a sequence of amino acids as the protein is formed. During translation, the ribosome reads the fragment
starting from certain three-bases, and then the ribosome reads three bases (a codon) at a time from the mRNA
and translates them into one amino acid; there are also certain ending three-bases to sign the end of the
translation.
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
57
Fig: Transcription and Translation of the encoded message
Step 3: The resulting protein then behaves like the public key and can be sent to the receiver using public
channel.
Step 4: At the same time, the sender sends the shared secret key to the receiver which consists of the information
he needs to reassemble the DNA such as the location of the non coding regions that need to be reinserted.
Decryption
When the receiver received the protein form of data and the keys, he uses the keys to recover mRNA form of
data from protein form of data, and then recover DNA form of information, in the reverse order as the sender
encrypts the information. He can then recover then binary form of information, and finally gets what the sender
sent him.
3. PROPOSED METHODOLOGY
As we discussed above the problem with traditional DNA encryption method is with security of key. An another
approach to solve that problem is complimentary pair approach like DNA structure we are not going to detail for
this and using our own complimentary pairs.
A → T
C → A
G → C
T → G
Let us consider a reference sequence:
S = ACGGAATTGCTTCAG
Using the complimentary pair approach the new sequence S' will be:
S' = TACCTTGGCAGGATC
But in our methodology we will combine the complimentary approach with substitution approach and we will
generate S' from S with help of plain text (M) steps may be as follows:
Send both S and S' by using any stagenography technique in order to generate more security.
any keys like k and r in traditional cryptography, therefore key security problem is
not there and we are choosing different reference sequence.
3. Hardware & Software Requirements
Languages Used: JAVA
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
58
Platform: Windows 7
4. RESULTS & ANALYSIS
The aim of project was to develop a system that could compute the fundamental idea behind this encryption
technique is the exploitation of DNA cryptographic strength, such as its storing capabilities and parallelism in
order to enforce other conventional cryptographic algorithms. In this study, a binary form of data, such as
plaintext messages, and images are transformed into sequences of DNA nucleotides. Subsequently, efficient
searching algorithms are used to locate the multiple positions of a sequence of four DNA nucleotides. These four
DNA nucleotides represent the binary octet of a single plaintext character or the single pixel of an image within,
say, a Can is Familiaris genomic chromosome.
We call the file containing the randomly selected position in the searchable DNA strand for each plain text
character, the ciphered text. Since there is negligible correlation between the pointers file obtained from the
selected genome, with its inherently massive storing capabilities, and the plain-text characters, the method, we
believe, is robust against any type of cipher attacks.
5. CONCLUSIONS
We have pointed out that the DNA sequences have the special properties which we can utilize for encryption
purposes. We have proposed the algorithm and this is based upon a reference sequence known only to the sender
and the receiver. This reference sequence can be selected from any web-site associated with DNA sequences.
Since there are many websites and roughly 55 million publicly available DNA sequences, it is virtually
impossible to guess this sequence.
6. FUTURE SCOPE
In this system, we use chaotic encryption for encryption systems dealing with plaintext. This encrypted system
eliminates the statistic rules in plaintext and loads chaotic encryption into DNA code. This means that the DNA
code has the same advantages that traditional encryption has. As such, security has been improved. Even if the
attacker deciphered the DNA code, he will still face a lot of chaos code that it would be necessary to decrypt.
This increases the difficulty of decryption. In order to be a new type of encryption system, DNA code is based
on a different security to the traditional code. Accordingly, we can obtain a complementary effect when we
combined these two systems.
7. REFERENCES
[1] Introduction to DNA Structure,
http://www.blc.arizona.edu/molecular_graphics/dna_structure/dna_tutorial.html
[2] Yashaswita R. Bhoir, R.Mathangi ,” DNA CRYPTOGRAPHY with BINARY STRANDS” , Fr. C.
Rodrigues Institute of Technology
[3] K. S. Kumar, V. B. Semwal, S. Prasad and R. C. Tripathi, “Generating 3D Model Using 2D Images of an
Object,” International Journal of Engineering Science, 2011.
[4] S.Jeevidha, Dr.M.S.Saleem Basha, Dr.P.Dhavachelvan , “Analysis on DNA based Cryptography to Secure
Data Transmission”, International Journal of Computer Applications (0975 – 8887) Volume 29– No.8,
September 2011
[5]. L. M. Adleman, “Molecular computation of solutions to combinational problems,” Science, vol. 266, pp.
1021–1024, 1994.
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.7, 2014
59
[6] S.V. Kartalopoulos, “DNA-inspired cryptographic method in optical communications,” in authentication and
data mimicking Military Communications Conference, 2005, pp. 774–779.
[7]. T.Kawai and Y.Hayashizaki, ”DNA BOOK”.
[8] M. Saeb, A. Baith, “An Encryption Algorithm for Data Security,” Recent Advances in Information Science
& Technology, N.E. Mastorakis, (editor), World Scientific Publishing Company, pp. 350-354, 1998.
[9] “DNA-Based Cryptography. DIMACS DNA Based Computers,” V, American Mathematical Society, 2000.
[10] Alberts, B., Bray, D., Lewis, J., Raff, M., Roberts, K. and Watson, J. D., Molecular Biology of the Cell,
New York & London: Garland Publishing, 1994.
[11] Advantages and Disadvantages of Symmetric and Asymmetric Key Encryption Methods
http://voices.yahoo.com/comparing-symmetric-asymmetric-key-encryption-6329400.html?cat=15
The IISTE is a pioneer in the Open-Access hosting service and academic event
management. The aim of the firm is Accelerating Global Knowledge Sharing.
More information about the firm can be found on the homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
There are more than 30 peer-reviewed academic journals hosted under the hosting
platform.
Prospective authors of journals can find the submission instruction on the
following page: http://www.iiste.org/journals/ All the journals articles are available
online to the readers all over the world without financial, legal, or technical barriers
other than those inseparable from gaining access to the internet itself. Paper version
of the journals is also available upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar
Business, Economics, Finance and Management Journals PAPER SUBMISSION EMAIL
European Journal of Business and Management EJBM@iiste.org
Research Journal of Finance and Accounting RJFA@iiste.org
Journal of Economics and Sustainable Development JESD@iiste.org
Information and Knowledge Management IKM@iiste.org
Journal of Developing Country Studies DCS@iiste.org
Industrial Engineering Letters IEL@iiste.org
Physical Sciences, Mathematics and Chemistry Journals PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research JNSR@iiste.org
Journal of Chemistry and Materials Research CMR@iiste.org
Journal of Mathematical Theory and Modeling MTM@iiste.org
Advances in Physics Theories and Applications APTA@iiste.org
Chemical and Process Engineering Research CPER@iiste.org
Engineering, Technology and Systems Journals PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems CEIS@iiste.org
Innovative Systems Design and Engineering ISDE@iiste.org
Journal of Energy Technologies and Policy JETP@iiste.org
Information and Knowledge Management IKM@iiste.org
Journal of Control Theory and Informatics CTI@iiste.org
Journal of Information Engineering and Applications JIEA@iiste.org
Industrial Engineering Letters IEL@iiste.org
Journal of Network and Complex Systems NCS@iiste.org
Environment, Civil, Materials Sciences Journals PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science JEES@iiste.org
Journal of Civil and Environmental Research CER@iiste.org
Journal of Natural Sciences Research JNSR@iiste.org
Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL
Advances in Life Science and Technology ALST@iiste.org
Journal of Natural Sciences Research JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare JBAH@iiste.org
Journal of Food Science and Quality Management FSQM@iiste.org
Journal of Chemistry and Materials Research CMR@iiste.org
Education, and other Social Sciences PAPER SUBMISSION EMAIL
Journal of Education and Practice JEP@iiste.org
Journal of Law, Policy and Globalization JLPG@iiste.org
Journal of New Media and Mass Communication NMMC@iiste.org
Journal of Energy Technologies and Policy JETP@iiste.org
Historical Research Letter HRL@iiste.org
Public Policy and Administration Research PPAR@iiste.org
International Affairs and Global Strategy IAGS@iiste.org
Research on Humanities and Social Sciences RHSS@iiste.org
Journal of Developing Country Studies DCS@iiste.org
Journal of Arts and Design Studies ADS@iiste.org

More Related Content

PDF
Dna cryptography
PPTX
DNA based Cryptography_Final_Review
PDF
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
PDF
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
PPT
A new DNA encryption technique for secure data transmission with authenticati...
PPT
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
PDF
Acm aictc2016
PDF
IRJET- DNA Cryptography
Dna cryptography
DNA based Cryptography_Final_Review
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
A new DNA encryption technique for secure data transmission with authenticati...
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
Acm aictc2016
IRJET- DNA Cryptography

What's hot (20)

PPTX
DNA secret writing project first review
PDF
A new DNA Encryption Technique
PDF
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
PDF
C010521418
PDF
Survey of Different DNA Cryptography based Algorithms
PDF
Literature Review on DNA based Audio Steganographic Techniques
PDF
A Modified Technique For Performing Data Encryption & Data Decryption
PDF
Comparative Study of Three DNA-based Information Hiding Methods
PDF
Hn2513581359
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PDF
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
PDF
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PDF
B03302007012
PDF
An Enhanced Encryption Technique using BCD and Bit Complementation
PDF
International journal of engineering issues vol 2015 - no 2 - paper6
PDF
Wireless Network Security Architecture with Blowfish Encryption Model
PDF
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
PDF
Innovative field of cryptography: DNA cryptography
PDF
Ijcnc050208
PDF
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
DNA secret writing project first review
A new DNA Encryption Technique
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
C010521418
Survey of Different DNA Cryptography based Algorithms
Literature Review on DNA based Audio Steganographic Techniques
A Modified Technique For Performing Data Encryption & Data Decryption
Comparative Study of Three DNA-based Information Hiding Methods
Hn2513581359
A Survey on Generation and Evolution of Various Cryptographic Techniques
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
B03302007012
An Enhanced Encryption Technique using BCD and Bit Complementation
International journal of engineering issues vol 2015 - no 2 - paper6
Wireless Network Security Architecture with Blowfish Encryption Model
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
Innovative field of cryptography: DNA cryptography
Ijcnc050208
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
Ad

Viewers also liked (6)

PPT
Viruses, Biometrics, Encryption
PDF
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
PPTX
Biometrics
PPT
Quantum Cryptography
PPT
Quantum cryptography
PPTX
Quantum cryptography
Viruses, Biometrics, Encryption
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Biometrics
Quantum Cryptography
Quantum cryptography
Quantum cryptography
Ad

Similar to Secure data transmission using dna encryption (20)

PDF
Report dna
PDF
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
PDF
Crypt Sequence DNA
PDF
An Survey On DNA Based Cryptography
PPTX
Data Encryption Technique Based on DNA Cryptography
PDF
Double layered dna based cryptography
PDF
A comparative review on symmetric and asymmetric DNA-based cryptography
PDF
Hn2513581359
PPTX
Data Storage in DNA
PPTX
Liquid Steganography presentation.pptx
PDF
A Dna And Amino-Acids Based Implementation Of Four-Square Cipher
PDF
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
PDF
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
PDF
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
PDF
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
PDF
A Novel DNA Encryption System Using Cellular Automata
PDF
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
PDF
Data protection based neural cryptography and deoxyribonucleic acid
PDF
Significant features for steganography techniques using deoxyribonucleic acid...
PPTX
Turing nucleotidecryptology
Report dna
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
Crypt Sequence DNA
An Survey On DNA Based Cryptography
Data Encryption Technique Based on DNA Cryptography
Double layered dna based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
Hn2513581359
Data Storage in DNA
Liquid Steganography presentation.pptx
A Dna And Amino-Acids Based Implementation Of Four-Square Cipher
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A Novel DNA Encryption System Using Cellular Automata
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
Data protection based neural cryptography and deoxyribonucleic acid
Significant features for steganography techniques using deoxyribonucleic acid...
Turing nucleotidecryptology

More from Alexander Decker (20)

PDF
Abnormalities of hormones and inflammatory cytokines in women affected with p...
PDF
A validation of the adverse childhood experiences scale in
PDF
A usability evaluation framework for b2 c e commerce websites
PDF
A universal model for managing the marketing executives in nigerian banks
PDF
A unique common fixed point theorems in generalized d
PDF
A trends of salmonella and antibiotic resistance
PDF
A transformational generative approach towards understanding al-istifham
PDF
A time series analysis of the determinants of savings in namibia
PDF
A therapy for physical and mental fitness of school children
PDF
A theory of efficiency for managing the marketing executives in nigerian banks
PDF
A systematic evaluation of link budget for
PDF
A synthetic review of contraceptive supplies in punjab
PDF
A synthesis of taylor’s and fayol’s management approaches for managing market...
PDF
A survey paper on sequence pattern mining with incremental
PDF
A survey on live virtual machine migrations and its techniques
PDF
A survey on data mining and analysis in hadoop and mongo db
PDF
A survey on challenges to the media cloud
PDF
A survey of provenance leveraged
PDF
A survey of private equity investments in kenya
PDF
A study to measures the financial health of
Abnormalities of hormones and inflammatory cytokines in women affected with p...
A validation of the adverse childhood experiences scale in
A usability evaluation framework for b2 c e commerce websites
A universal model for managing the marketing executives in nigerian banks
A unique common fixed point theorems in generalized d
A trends of salmonella and antibiotic resistance
A transformational generative approach towards understanding al-istifham
A time series analysis of the determinants of savings in namibia
A therapy for physical and mental fitness of school children
A theory of efficiency for managing the marketing executives in nigerian banks
A systematic evaluation of link budget for
A synthetic review of contraceptive supplies in punjab
A synthesis of taylor’s and fayol’s management approaches for managing market...
A survey paper on sequence pattern mining with incremental
A survey on live virtual machine migrations and its techniques
A survey on data mining and analysis in hadoop and mongo db
A survey on challenges to the media cloud
A survey of provenance leveraged
A survey of private equity investments in kenya
A study to measures the financial health of

Secure data transmission using dna encryption

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 51 Secure Data Transmission Using DNA ENCRYPTION ANUPRIYA AGGARWAL1 & PRAVEEN KANTH2 1Research Scholar, BRCM, Bahal, Haryana, India 2Assistant Professor, BRCM, Bahal, Haryana, India Abstract DNA Encryption is preferable biological technique for securing text/image because of its parallelism, vast storage and fast computing quality. The process involve biological molecule present in human body called DNA abbreviated as Deoxyribose Nucleic Acid .The DNA molecule is synthesized and protein component part is extracted and then converted to nitrogen base . This nitrogen base is used in Encryption/Decryption and formulated as A (Adenine), C (Cytosine), T (Thymine) and G (Guanine) characters. DNA Cryptography components are ACTG characters only and how the message gets merged and located is known as DNA Cryptography. This ACTG characters create DNA Sequence S and merged with message M to produce new sequence S’ and send to receiver where Sequence S’ back converted to S. The paper will introduce traditional methods of DNA cryptography in which there is need of key and proposed methods ,in which introduction to key is not required ,hence removing the tension of securing the key. The proposed method involves Complementary pair method. 1. Introduction The earliest form of cryptography was the simple writing of a message, as most people could not read (New World, 2007). In fact, the very word cryptography comes from the Greek words kryptos and graphein, which mean hidden and writing, respectively (Pawlan, 1998). Early cryptography was solely concerned with converting messages into unreadable groups of figures to protect the message’s content during the time the message was being carried from one place to another. In the modern era, cryptography has grown from basic message confidentiality to include some phases of message integrity checking, sender/receiver identity authentication, and digital signatures, among other things (New World, 2007). DNA Cryptography In human body to transform the genetic inform from one part to another part nucleic acids are present. There are two type of nucleic acid DNA and RNA which code for all type of instructions needed for the cell to perform different function. The DNA Stands for Deoxyribo Nucleic Acid. DNA is the molecule that contains the genetic code of organism. DNA is material that governs Genetic similarity of looks, nature in human and animals.
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 52 Comparisons between Different Cryptography Techniques — DES is the old "data encryption standard" from the seventies. Its key size is too short for proper security (56 effective bits; this can be brute-forced, as has been demonstrated more than ten years ago). Also, DES uses 64-bit blocks, which raises some potential issues when encrypting several gigabytes of data with the same key (a gigabyte is not that big nowadays). — 3DES is a trick to reuse DES implementations, by cascading three instances of DES (with distinct keys). 3DES is believed to be secure up to at least "2112 " security (which is quite a lot, and quite far in the realm of "not breakable with today's technology"). But it is slow, especially in software (DES was designed for efficient hardware implementation, but it sucks in software; and 3DES sucks three times as much). — Blowfish is a block cipher proposed by Bruce Schneier, and deployed in some softwares. Blowfish can use huge keys and is believed secure, except with regards to its block size, which is 64 bits, just like DES and 3DES. Blowfish is efficient in software, at least on some software platforms (it uses key- dependent lookup tables, hence performance depends on how the platform handles memory and caches). — AES is the successor of DES as standard symmetric encryption algorithm for US federal organizations (and as standard for pretty much everybody else, too). AES accepts keys of 128, 192 or 256 bits (128 bits is already very unbreakable), uses 128-bit blocks (so no issue there), and is efficient in both software and hardware. It was selected through an open competition involving hundreds of cryptographers during several years. Basically, you cannot have better than that. Advantages of DNA Cryptography — DNA chains have a very large scale of parallelism, and its computing speed could reach 1 billion times per second. — The DNA molecule - as a carrier of data - has a large capacity. It seems that one trillion bits of binary data can be stored in one cubic decimetre of a DNA solution. — A DNA molecular computer has low power consumption, only equal to one-billionth of a traditional computer. Components of DNA
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 53 DNA is a polymer. The monomer units of DNA are nucleotides, and the polymer is known as a "polynucleotide." Each nucleotide consists of a 5-carbon sugar (deoxyribose), a nitrogen containing base attached to the sugar, and a phosphate group. There are four different types of nucleotides found in DNA, differing only in the nitrogenous base. The four nucleotides are given one letter abbreviations as shorthand for the four bases. A is for adenine G is for guanine C is for cytosine T is for thymine Structure of A and G Purine Bases Adenine and guanine are purines. Purines are the larger of the two types of bases found in DNA. Structures are shown below: The 9 atoms that make up the fused rings (5 carbon, 4 nitrogen) are numbered 1-9. All ring atoms lie in the same plane. Structure of C and T
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 54 Pyrimidine Bases Cytosine and thymine are pyrimidines. The 6 Atoms (4 carbon, 2 nitrogen) are numbered 1-6. Like purines, all pyrimidine ring atoms lie in the same plane. 2. Related literature Technology and Software DNA cryptography is a subject of study about how to use DNA as an information carrier and it uses modern biotechnology as a measure to transfer ciphertext into plaintext. Thus, biotechnology plays an important role in the field of DNA cryptography. In this part we will introduce some of the DNA biotechnology and software of the field of DNA. DNA Coding Scheme The easiest way to encode is to represent four units as four figures: A (0) – 00. T (3) – 11. C (2) – 10. G (1) – 01. Obviously, by these encoding rules, there are 4! = 24 possible encoding methods. For DNA encoding, it is necessary to reflect the biological characteristics and pairing principles of the four nucleotides. Based on this principle, we know that: A (0) – 00 and T (3) – 11 make pairs,
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 55 G (1) – 01 and C (2) – 10 make pairs. Traditional DNA Encryption Algorithm In this section we propose two methods to encrypt the plaintext using DNA, so that it could be send securely over a network. A. Method I Encryption Step1: The binary data, text or image, is used under the form of ASCII code (in decimal format). Step2: These numbers are then grouped in blocks and encrypted in using a traditional method (eg. DES, will form a 2 level encryption). Step3: This encoded message is then changed to binary format. Step4: Then these digits are grouped into two and substituted as A for 00, T for 01, G for 10, and C for 11. Step5: We then fit the primers on either side of this message. Primers will act as stoppers and detectors for the message. This has to be given to the receiver prior to the communication. Step6: This message is followed by our own DNA sequence followed by another stopper/primer. Step7: This message is then flanked by many sequences of DNA or by confining it to a microdot in the micro- array. Step8: If considered as a pseudo method: this sequence is transferred to the receiver through the Internet. Else the micro-array is sent physically (though time consuming). Decryption This message can then be recovered only by an intended recipient who both can find it, and who knows the sequences of the PCR primers employed, and also the encryption key (2 level encryption used). For pseudo method:
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 56 Step1. The DNA sequence is searched for the primers (start primer and end primer). The message in-between them is retrieved and the next DNA sequence before the next primer (our DNA) is retrieved. Step2. The ATGC characters are substituted accordingly (00,01,10,11 respectively). Step3. They are then converted into ASCII code and then the message is retrieved. For the use of actual DNA: Step1. We have the DNA. What we want is the message flanked by the primers. To accomplish this we can use a technique called Polymerase Chain Reaction (PCR), which allows you to produce many copies of a specific sequence of DNA. PCR is an iterative process that cycles through a series of copying events using an enzyme called polymerase. Polymerase will copy a section of single stranded DNA starting at the position of a primer, a short piece of DNA complimentary to one end of a section of the DNA that you're interested in. By selecting primers that flank the section of DNA you want to amplify, the polymerase preferentially amplifies the DNA between these primers, doubling the amount of DNA containing this sequence. After many iterations of PCR, the DNA we are working on is amplified exponentially. Step2.Then the ATGC sequence in this DNA strand is read. Step3. The ATGC characters are substituted accordingly (00,01,10,11 respectively). Step4. They are then converted into ASCII code and then the message is retrieved. B. Method II Encryption Step 1: Sender encodes his message in the original DNA sequence and allows the message to be transcripted to mRNA. During transcription, a DNA segment that constitutes a gene is read, starting from the promoter (starting position) of the DNA segment. The non-coding areas (intron) are removed according to certain tags, and the remaining coding areas (extron) are rejoined and caped. Then the sequence is transcribed into a single stranded sequence of mRNA (messenger RNA). The mRNA moves from the nucleus into the cytoplasm Step 2: At this stage, the mRNA is translated to protein. During translation, the mRNA sequence is translated into a sequence of amino acids as the protein is formed. During translation, the ribosome reads the fragment starting from certain three-bases, and then the ribosome reads three bases (a codon) at a time from the mRNA and translates them into one amino acid; there are also certain ending three-bases to sign the end of the translation.
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 57 Fig: Transcription and Translation of the encoded message Step 3: The resulting protein then behaves like the public key and can be sent to the receiver using public channel. Step 4: At the same time, the sender sends the shared secret key to the receiver which consists of the information he needs to reassemble the DNA such as the location of the non coding regions that need to be reinserted. Decryption When the receiver received the protein form of data and the keys, he uses the keys to recover mRNA form of data from protein form of data, and then recover DNA form of information, in the reverse order as the sender encrypts the information. He can then recover then binary form of information, and finally gets what the sender sent him. 3. PROPOSED METHODOLOGY As we discussed above the problem with traditional DNA encryption method is with security of key. An another approach to solve that problem is complimentary pair approach like DNA structure we are not going to detail for this and using our own complimentary pairs. A → T C → A G → C T → G Let us consider a reference sequence: S = ACGGAATTGCTTCAG Using the complimentary pair approach the new sequence S' will be: S' = TACCTTGGCAGGATC But in our methodology we will combine the complimentary approach with substitution approach and we will generate S' from S with help of plain text (M) steps may be as follows: Send both S and S' by using any stagenography technique in order to generate more security. any keys like k and r in traditional cryptography, therefore key security problem is not there and we are choosing different reference sequence. 3. Hardware & Software Requirements Languages Used: JAVA
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 58 Platform: Windows 7 4. RESULTS & ANALYSIS The aim of project was to develop a system that could compute the fundamental idea behind this encryption technique is the exploitation of DNA cryptographic strength, such as its storing capabilities and parallelism in order to enforce other conventional cryptographic algorithms. In this study, a binary form of data, such as plaintext messages, and images are transformed into sequences of DNA nucleotides. Subsequently, efficient searching algorithms are used to locate the multiple positions of a sequence of four DNA nucleotides. These four DNA nucleotides represent the binary octet of a single plaintext character or the single pixel of an image within, say, a Can is Familiaris genomic chromosome. We call the file containing the randomly selected position in the searchable DNA strand for each plain text character, the ciphered text. Since there is negligible correlation between the pointers file obtained from the selected genome, with its inherently massive storing capabilities, and the plain-text characters, the method, we believe, is robust against any type of cipher attacks. 5. CONCLUSIONS We have pointed out that the DNA sequences have the special properties which we can utilize for encryption purposes. We have proposed the algorithm and this is based upon a reference sequence known only to the sender and the receiver. This reference sequence can be selected from any web-site associated with DNA sequences. Since there are many websites and roughly 55 million publicly available DNA sequences, it is virtually impossible to guess this sequence. 6. FUTURE SCOPE In this system, we use chaotic encryption for encryption systems dealing with plaintext. This encrypted system eliminates the statistic rules in plaintext and loads chaotic encryption into DNA code. This means that the DNA code has the same advantages that traditional encryption has. As such, security has been improved. Even if the attacker deciphered the DNA code, he will still face a lot of chaos code that it would be necessary to decrypt. This increases the difficulty of decryption. In order to be a new type of encryption system, DNA code is based on a different security to the traditional code. Accordingly, we can obtain a complementary effect when we combined these two systems. 7. REFERENCES [1] Introduction to DNA Structure, http://www.blc.arizona.edu/molecular_graphics/dna_structure/dna_tutorial.html [2] Yashaswita R. Bhoir, R.Mathangi ,” DNA CRYPTOGRAPHY with BINARY STRANDS” , Fr. C. Rodrigues Institute of Technology [3] K. S. Kumar, V. B. Semwal, S. Prasad and R. C. Tripathi, “Generating 3D Model Using 2D Images of an Object,” International Journal of Engineering Science, 2011. [4] S.Jeevidha, Dr.M.S.Saleem Basha, Dr.P.Dhavachelvan , “Analysis on DNA based Cryptography to Secure Data Transmission”, International Journal of Computer Applications (0975 – 8887) Volume 29– No.8, September 2011 [5]. L. M. Adleman, “Molecular computation of solutions to combinational problems,” Science, vol. 266, pp. 1021–1024, 1994.
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014 59 [6] S.V. Kartalopoulos, “DNA-inspired cryptographic method in optical communications,” in authentication and data mimicking Military Communications Conference, 2005, pp. 774–779. [7]. T.Kawai and Y.Hayashizaki, ”DNA BOOK”. [8] M. Saeb, A. Baith, “An Encryption Algorithm for Data Security,” Recent Advances in Information Science & Technology, N.E. Mastorakis, (editor), World Scientific Publishing Company, pp. 350-354, 1998. [9] “DNA-Based Cryptography. DIMACS DNA Based Computers,” V, American Mathematical Society, 2000. [10] Alberts, B., Bray, D., Lewis, J., Raff, M., Roberts, K. and Watson, J. D., Molecular Biology of the Cell, New York & London: Garland Publishing, 1994. [11] Advantages and Disadvantages of Symmetric and Asymmetric Key Encryption Methods http://voices.yahoo.com/comparing-symmetric-asymmetric-key-encryption-6329400.html?cat=15
  • 10. The IISTE is a pioneer in the Open-Access hosting service and academic event management. The aim of the firm is Accelerating Global Knowledge Sharing. More information about the firm can be found on the homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS There are more than 30 peer-reviewed academic journals hosted under the hosting platform. Prospective authors of journals can find the submission instruction on the following page: http://www.iiste.org/journals/ All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Paper version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar
  • 11. Business, Economics, Finance and Management Journals PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Journal of Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry Journals PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Chemistry and Materials Research CMR@iiste.org Journal of Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems Journals PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Journal of Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Journal of Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences Journals PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Journal of Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Advances in Life Science and Technology ALST@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Journal of Food Science and Quality Management FSQM@iiste.org Journal of Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Journal of New Media and Mass Communication NMMC@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Historical Research Letter HRL@iiste.org Public Policy and Administration Research PPAR@iiste.org International Affairs and Global Strategy IAGS@iiste.org Research on Humanities and Social Sciences RHSS@iiste.org Journal of Developing Country Studies DCS@iiste.org Journal of Arts and Design Studies ADS@iiste.org