5 research outputs found
A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data
Recentlty, cryptography makes extensive use of different fields includingbioinformatics. The fundamental idea behind the cipher presented here is to transform any kind of binary message; such as text, sound tracks, and even images, into the form of a single-stranded DNA sequence. Subsequently, digraphs of codon triplets are encrypted using a grid of 8x8 codon matrix that is randomly constructed according to some secret key. Although the encryption/decryption rules were kept almost the same as the classical 5x5 Playfair, using the DNA encoding step makes it almost impossible for an attacker to perform a frequency analysis on that vast number of character digraphs. Furthermore, an interweaving step is added to scramble the encrypted sequence offering more randomness. When compared with other modifications of the Playfair cipher, the proposed method showed a number of advantages including the ability to cipher any type of digital media, the elimination of plain-text preprocessing step, and the applicability to be integrated into larger security systems such as DNA steganography. Furthermore, due to the very weak correlation between cipher-data and original message, the proposed method shows a strong robustness against cipher attacks.DOI:http://dx.doi.org/10.11591/ijece.v4i1.496
An More effective Approach of ECC Encryption Algorithm using DNA Computing
Now a day鈥檚 Cryptography is one of the broad areas for researchers. Encryption is most effective way to achieve data security. Cryptographic system entails the study of mathematical techniques of encryption and decryption to solve security problems in communication. Elliptic Curve Cryptography (ECC) is one of the most efficient techniques that are used for this issue. Many researchers have tried to exploit the features of ECC field for security applications. This paper describes an efficient approach based elliptic curve and DNA computing. The security of the scheme is based on Elliptic Curve Discrete Logarithm Problem (ECDLP). Existing DNA based cryptography technique need more computational power and more processing time with larger key sizes to provide higher level of security. The main goal of our construction is to enhance the security of elliptic curve cryptosystem using DNA Computing. Both image and text data are encrypted successfully
DNA Linear Block Codes: Generation, Error-detection and Error-correction of DNA Codeword
In modern age, the increasing complexity of computation and communication
technology is leading us towards the necessity of new paradigm. As a result,
unconventional approach like DNA coding theory is gaining considerable
attention. The storage capacity, information processing and transmission
properties of DNA molecules stimulate the notion of DNA coding theory as well
as DNA cryptography. In this paper we generate DNA codeword using DNA (n, k)
linear block codes which ensures the secure transmission of information. In the
proposed code design strategy DNA-based XOR operation (DNAX) is applied for
effective construction of DNA codewords which are quadruples generated over the
set of alphabets {A,T,G,C}. By worked out examples we explain the use of
generator matrix and parity check matrix in encryption and decryption of coded
data in the form of short single stranded DNA sequences. The newly developed
technique is capable of detecting as well as correcting error in transmission
of DNA codewords from sender to the intended receiver.Comment: 23 pages, 1 figure, 5 table
Wireless Security Protocol in DNA Bio-Inspired Network
The 21st century communications have evolved rapidly and spread all over the world
using the Wi-Fi network which has provided benefits of connection which become more
desirable for users to connect to the internet. These benefits are driving the world to a
major internet security issues that links to harm their own sensitive data and it resulting for
generates encouragement for attackers to drill the legitimate user鈥檚 Wi-Fi connection to
access to where they want to organize and eavesdropping the data passed to hack them
through and revealing it to check whether it is useful for them, hence exploiting packets
travelling through the user鈥檚 Wi-Fi and using of the powerful of super sniffer techniques by
the hackers to break in to such as malware and sniffing software that allows them to crack
on the Wi-Fi to steal the data of the user who uses the eavesdropper Wi-Fi without their
knowledge, these sniffers open to the hackers access to the user鈥檚 data like bank details and
other data, it could be using their details for a crime such as find their identity which make
the world more concerns about their personal information and they are looking for the
latest security protocols to protect their Wi-Fi network.
Wi-Fi security introduces a number of vulnerabilities that give hackers an opportunity to
cause harm to the Wi-Fi users by stealing information, accessing the Wi-Fi network to
compromise the Wi-Fi network as a way to access the enterprise network which is used by
some security protocols. This would allow a hacker to use sniffers to access the Wi-Fi
enterprise network which is used in coffee shops across the world and other trading
premises by probing the SSID of their Wi-Fi. Near by the hackers would be able to crack the
security protocols such as WPA or WPA2 which are the latest protocol that users use for
their Wi-Fi security keys.
In our research we have taken different security methods to secure the Wi-Fi network
using the bio-inspired DNA is the idea comed from the Deoxyribonucleic Acid DNA because
that DNA have several important features including the random nature of the sequences
denoted by alphapet characters A, C, G and T to perform encoded unique DNA sequences
that is transmitting the secrets and the DNA encryption comes from the biology of the DNA
science of the human and animals.
Our research has achieved basic steps which encrypt the user鈥檚 static data to DNA
sequence to use it for a security access key this work is functioning successfully to DNA
bases and experimentation prove in the implementation at chapter 5, and we used the
symmetric cryptographic keys in DNA sequence encryption to be similar at both parties
with the admin(Wi-Fi) and clients and this is the basic step for this project and it needs to
implement the dynamic DNA to make the keys more secure for each user and we have
explained how we can match and mismatch these encrypted data and how they need to
updated automatically to new security keys with the dynamic DNA sequence in future work
[1].
The achievements of our research are proposed to convert user data to a DNA security
sequence to use it in the same way as the existing security protocols such as WPA2 but in
DNA format with the dynamic key and static user data will keep the security key rubost
durig the automatic updates, hence the static data and dynamic data can be updated
automatically when adding the dynamic data to the project in future work for the user
access key and this can be suitable for multi-users to form an autonomous Wi-Fi connection
and DNA security key to mitigating some flaws of that existing security protocols techniques
has such as sharing the same security key on the same Wi-Fi network users
Aplicaci贸n de controles de seguridad inform谩tica para dispositivos de almacenamiento digital basados en secuencias de ADN
La presente investigaci贸n elabor贸 un modelo com煤n de almacenamiento de informaci贸n digital basado en secuencias de ADN sint茅tico, a partir de ocho (8) modelos existentes, tomados como muestra, para ello se identificaron treinta y uno (31) actividades comunes, que presentaron dichos modelos, y que permiten cumplir con las dos funcionalidades principales requeridas: la de almacenar informaci贸n digital en secuencias de ADN y la de extraer la misma informaci贸n digital de dichas secuencias de ADN. Acto seguido este modelo fue sometido a una evaluaci贸n de riesgos de seguridad, aplicando la metodolog铆a de la ISO/IEC 27005:2018, dando como resultado la identificaci贸n de cuarenta y cinco (45) riesgos de seguridad de la informaci贸n, las cuales recibieron tratamiento mediante la aplicaci贸n de ocho (8) controles de seguridad seleccionados de la ISO/IEC 27002:2013. Al aplicar estos controles de seguridad en el modelo com煤n se agregaron diecis茅is (16) actividades de seguridad que permiti贸 garantizar la confidencialidad, disponibilidad e integridad de la informaci贸n digital, pasando de treinta y un (31) actividades a cuarenta y siete (47) actividades para el modelo seguro de almacenamiento de informaci贸n digital en mol茅culas de ADN sint茅tico.The present investigation elaborated a common model of digital information storage based on synthetic DNA sequences, based on eight (8) existing models, taken as a sample, for which thirty-one (31) common activities were identified, which presented these models, and that allow to fulfill the two main required functionalities: that of storing digital information in DNA sequences and that of extracting the same digital information from said DNA sequences. Then this model was subjected to an evaluation of security risks, applying the methodology of ISO / IEC 27005: 2018, resulting in the identification of forty-five (45) information security risks, which were treated by the application of eight (8) selected security controls from ISO / IEC 27002: 2013. By applying these security controls in the common model, sixteen (16) security activities were added that allowed to guarantee the confidentiality, availability and integrity of digital information, going from thirty-one (31) activities to forty-seven (47) activities for the secure model of digital information storage in synthetic DNA molecules.Trabajo de investigaci贸nCampus Lima Centr