5 research outputs found

    A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data

    Get PDF
    Recentlty, cryptography makes extensive use of different fields includingbioinformatics. The fundamental idea behind the cipher presented here is to transform any kind of binary message; such as text, sound tracks, and even images, into the form of a single-stranded DNA sequence. Subsequently, digraphs of codon triplets are encrypted using a grid of 8x8 codon matrix that is randomly constructed according to some secret key. Although the encryption/decryption rules were kept almost the same as the classical 5x5 Playfair, using the DNA encoding step makes it almost impossible for an attacker to perform a frequency analysis on that vast number of character digraphs. Furthermore, an interweaving step is added to scramble the encrypted sequence offering more randomness. When compared with other modifications of the Playfair cipher, the proposed method showed a number of advantages including the ability to cipher any type of digital media, the elimination of plain-text preprocessing step, and the applicability to be integrated into larger security systems such as DNA steganography. Furthermore, due to the very weak correlation between cipher-data and original message, the proposed method shows a strong robustness against cipher attacks.DOI:http://dx.doi.org/10.11591/ijece.v4i1.496

    An More effective Approach of ECC Encryption Algorithm using DNA Computing

    Get PDF
    Now a day鈥檚 Cryptography is one of the broad areas for researchers. Encryption is most effective way to achieve data security. Cryptographic system entails the study of mathematical techniques of encryption and decryption to solve security problems in communication. Elliptic Curve Cryptography (ECC) is one of the most efficient techniques that are used for this issue. Many researchers have tried to exploit the features of ECC field for security applications. This paper describes an efficient approach based elliptic curve and DNA computing. The security of the scheme is based on Elliptic Curve Discrete Logarithm Problem (ECDLP). Existing DNA based cryptography technique need more computational power and more processing time with larger key sizes to provide higher level of security. The main goal of our construction is to enhance the security of elliptic curve cryptosystem using DNA Computing. Both image and text data are encrypted successfully

    DNA Linear Block Codes: Generation, Error-detection and Error-correction of DNA Codeword

    Get PDF
    In modern age, the increasing complexity of computation and communication technology is leading us towards the necessity of new paradigm. As a result, unconventional approach like DNA coding theory is gaining considerable attention. The storage capacity, information processing and transmission properties of DNA molecules stimulate the notion of DNA coding theory as well as DNA cryptography. In this paper we generate DNA codeword using DNA (n, k) linear block codes which ensures the secure transmission of information. In the proposed code design strategy DNA-based XOR operation (DNAX) is applied for effective construction of DNA codewords which are quadruples generated over the set of alphabets {A,T,G,C}. By worked out examples we explain the use of generator matrix and parity check matrix in encryption and decryption of coded data in the form of short single stranded DNA sequences. The newly developed technique is capable of detecting as well as correcting error in transmission of DNA codewords from sender to the intended receiver.Comment: 23 pages, 1 figure, 5 table

    Wireless Security Protocol in DNA Bio-Inspired Network

    Get PDF
    The 21st century communications have evolved rapidly and spread all over the world using the Wi-Fi network which has provided benefits of connection which become more desirable for users to connect to the internet. These benefits are driving the world to a major internet security issues that links to harm their own sensitive data and it resulting for generates encouragement for attackers to drill the legitimate user鈥檚 Wi-Fi connection to access to where they want to organize and eavesdropping the data passed to hack them through and revealing it to check whether it is useful for them, hence exploiting packets travelling through the user鈥檚 Wi-Fi and using of the powerful of super sniffer techniques by the hackers to break in to such as malware and sniffing software that allows them to crack on the Wi-Fi to steal the data of the user who uses the eavesdropper Wi-Fi without their knowledge, these sniffers open to the hackers access to the user鈥檚 data like bank details and other data, it could be using their details for a crime such as find their identity which make the world more concerns about their personal information and they are looking for the latest security protocols to protect their Wi-Fi network. Wi-Fi security introduces a number of vulnerabilities that give hackers an opportunity to cause harm to the Wi-Fi users by stealing information, accessing the Wi-Fi network to compromise the Wi-Fi network as a way to access the enterprise network which is used by some security protocols. This would allow a hacker to use sniffers to access the Wi-Fi enterprise network which is used in coffee shops across the world and other trading premises by probing the SSID of their Wi-Fi. Near by the hackers would be able to crack the security protocols such as WPA or WPA2 which are the latest protocol that users use for their Wi-Fi security keys. In our research we have taken different security methods to secure the Wi-Fi network using the bio-inspired DNA is the idea comed from the Deoxyribonucleic Acid DNA because that DNA have several important features including the random nature of the sequences denoted by alphapet characters A, C, G and T to perform encoded unique DNA sequences that is transmitting the secrets and the DNA encryption comes from the biology of the DNA science of the human and animals. Our research has achieved basic steps which encrypt the user鈥檚 static data to DNA sequence to use it for a security access key this work is functioning successfully to DNA bases and experimentation prove in the implementation at chapter 5, and we used the symmetric cryptographic keys in DNA sequence encryption to be similar at both parties with the admin(Wi-Fi) and clients and this is the basic step for this project and it needs to implement the dynamic DNA to make the keys more secure for each user and we have explained how we can match and mismatch these encrypted data and how they need to updated automatically to new security keys with the dynamic DNA sequence in future work [1]. The achievements of our research are proposed to convert user data to a DNA security sequence to use it in the same way as the existing security protocols such as WPA2 but in DNA format with the dynamic key and static user data will keep the security key rubost durig the automatic updates, hence the static data and dynamic data can be updated automatically when adding the dynamic data to the project in future work for the user access key and this can be suitable for multi-users to form an autonomous Wi-Fi connection and DNA security key to mitigating some flaws of that existing security protocols techniques has such as sharing the same security key on the same Wi-Fi network users

    Aplicaci贸n de controles de seguridad inform谩tica para dispositivos de almacenamiento digital basados en secuencias de ADN

    Get PDF
    La presente investigaci贸n elabor贸 un modelo com煤n de almacenamiento de informaci贸n digital basado en secuencias de ADN sint茅tico, a partir de ocho (8) modelos existentes, tomados como muestra, para ello se identificaron treinta y uno (31) actividades comunes, que presentaron dichos modelos, y que permiten cumplir con las dos funcionalidades principales requeridas: la de almacenar informaci贸n digital en secuencias de ADN y la de extraer la misma informaci贸n digital de dichas secuencias de ADN. Acto seguido este modelo fue sometido a una evaluaci贸n de riesgos de seguridad, aplicando la metodolog铆a de la ISO/IEC 27005:2018, dando como resultado la identificaci贸n de cuarenta y cinco (45) riesgos de seguridad de la informaci贸n, las cuales recibieron tratamiento mediante la aplicaci贸n de ocho (8) controles de seguridad seleccionados de la ISO/IEC 27002:2013. Al aplicar estos controles de seguridad en el modelo com煤n se agregaron diecis茅is (16) actividades de seguridad que permiti贸 garantizar la confidencialidad, disponibilidad e integridad de la informaci贸n digital, pasando de treinta y un (31) actividades a cuarenta y siete (47) actividades para el modelo seguro de almacenamiento de informaci贸n digital en mol茅culas de ADN sint茅tico.The present investigation elaborated a common model of digital information storage based on synthetic DNA sequences, based on eight (8) existing models, taken as a sample, for which thirty-one (31) common activities were identified, which presented these models, and that allow to fulfill the two main required functionalities: that of storing digital information in DNA sequences and that of extracting the same digital information from said DNA sequences. Then this model was subjected to an evaluation of security risks, applying the methodology of ISO / IEC 27005: 2018, resulting in the identification of forty-five (45) information security risks, which were treated by the application of eight (8) selected security controls from ISO / IEC 27002: 2013. By applying these security controls in the common model, sixteen (16) security activities were added that allowed to guarantee the confidentiality, availability and integrity of digital information, going from thirty-one (31) activities to forty-seven (47) activities for the secure model of digital information storage in synthetic DNA molecules.Trabajo de investigaci贸nCampus Lima Centr
    corecore