268 research outputs found

    Data Encryption in Communication Using DNA Sequences

    Get PDF
    cryptography is a field which makes the transmitted message unreadable to unauthorised users. In this work we take inspiration from DNA encryption schemes and use of biological alphabets to manipulate information by employing the DNA sequence reaction to autonomously make a copy of its threads as an extended encryption key. Information is converted from plain text to several formats and then follows the stages of protein formation from DNA sequences to generate an extended key using chemical property and attributes to be used in encryption mechanism. This technique will enhance the security of the encryption mechanism by substitution, manipulation, and complexity. Furthermore this technique can be used in many applications of information and communication systems as well as adding more complexity to existing encryption algorithms

    Securing Birth Certificate Documents with DNA Profiles

    Get PDF
    The birth certificate is a document used by a person to obtain identification and licensing documents throughout their lifetime. For identity verification, the birth certificate provides limited information to support a person’s claim of identity. Authentication to the birth certificate is strictly a matter of possession. DNA profiling is becoming a commodity analysis that can be done accurately in under two hours with little human intervention. The DNA profile is a superior biometric to add to a birth record because it is stable throughout a person’s life and beyond. Acceptability of universal DNA profiling will depend heavily on privacy and safety concerns. This paper uses the U.S. FBI CODIS profile as a basis to discuss the effectiveness of DNA profiling and to provide a practical basis for a discussion of potential privacy and authenticity controls. As is discussed, adopting DNA profiles to improve document security should be done cautiously

    Chaos Theory and DNA Computation Based Data Encryption System for E-Healthcare Monitoring System

    Get PDF
    The body area sensor network consists of small motes, such devices are considerably energy constrained, limited computation capabilities, and small size of memory such that most advanced encryption scheme cannot be implemented in this type of sensor network. An encryption algorithm must be designed to be a tradeoff between simple computation and powerful encryption scheme. Our proposed algorithm consists of combination of two approaches DNA computation and chaos theory to improve the one-time pad encryption technique. In this work a small amount of memory capacity is required since acquiring samples were encrypted individually in real time. The proposed algorithm appears to be very secure. In this paper, we will explain briefly the design of the proposed algorithm and show its efficiency through encryption tests. Also the effect of some sample loss due to collision occurs in the communication has been studied. The algorithm has been simulated using MATLAB and tested practically using shimmer sensor network platform. Keywords: chaos theory, DNA computation, Body area sensor network

    Data Encryption Using Bio-Molecular Information

    Get PDF
    Cryptography is a field, which makes the transmitted message unreadable to unauthorised users. In this work we take inspiration from DNA encryption schemes and use of biological alphabets to manipulate information by employing the DNA sequence reaction, to autonomously make a copy of its threads as an extended encryption key. Information is converted from plain text to several formats and then follows the stages of protein formation from DNA sequences to generate an extended key using chemical property and attributes to be used in encryption mechanism. This technique will enhance the security of the encryption mechanism by substitution, manipulation, and complexity. Furthermore this technique can be used in many applications of information and communication systems as well as adding more complexity to existing encryption algorithms

    Enhancement to the patient's health care image encryption system, using several layers of DNA computing and AES (MLAESDNA)

    Get PDF
    Keeping patient health data private has been a big issue for decades, and this issue will not go away anytime soon. As an integral part of many developing technologies, cryptographic Internet communications ICs (e.g. fog computing and cloud computing) are a main focus of IoT research. Just keep trying all the potential keys until you find the correct one. New and future technologies must have a model of DNA cryptography in order to assure the efficient flow of these technologies. Public-key cryptography is also required to make DNA sequence testing devices for the Internet of Things interoperable. This method employs DNA layers and AES in such a way that it may be easier to design a trustworthy hybrid encryption algorithm that uses DNA layers and AES. In order to guard against brute-force decryption attacks, DNA sequences are encrypted using three keys: (I) the main key, which is the key to the AES encryption algorithm; (II) the rule 1 key, which is the base DNA structure; and (III) the rule 2 key, which is the DNA helical structure binding probability. This key was created with increased security in mind. multi-layered AES encryption and DNA computing were applied to "Covid 19" images in this research (MLAESDNA). With cloud computing, the MLAESDNA team was able to show that IoT signals could be enhanced with encrypted data

    Secure Data Transmission Using DNA ENCRYPTION

    Get PDF
    DNA Encryption is preferable biological technique for securing text/image because of its parallelism, vast storage and fast computing quality. The process involve biological molecule present in human body called DNA abbreviated as Deoxyribose  Nucleic Acid .The DNA molecule is synthesized and protein component part is extracted and then converted to nitrogen base . This nitrogen base is used in Encryption/Decryption and formulated as A (Adenine), C (Cytosine), T (Thymine) and G (Guanine) characters. DNA Cryptography components are ACTG characters only and how the message gets merged and located is known as DNA Cryptography. This ACTG characters create DNA Sequence S and merged with message M to produce new sequence S’ and send to receiver where Sequence S’ back converted to S. The paper will introduce traditional methods of DNA cryptography in which there is need of key and proposed methods ,in which introduction to key is not required ,hence removing the tension of securing the key.  The proposed method involves Complementary pair method

    Data Hiding Based DNA Issues: A Review

    Get PDF
    يعد أمن المعلومات مصدر قلق رئيسي ، لا سيما مع نمو استخدام الإنترنت. بسبب هذا النمو ظهرت حالات اختراق للبيانات المرسلة منها الوصول غير المصرح به التي يتم التصدي له باستخدام تقنيات اتصال آمنة متنوعة  وهي ؛ التشفير وإخفاء البيانات. تتعلق الاتجاهات الحديثة بالحمض النووي المستخدم في التشفير وإخفاء البيانات كحامل للبيانات من خلال استغلال خصائصه الجزيئية الحيوية. تقدم هذه الورقة استبيانًا حول البحوث المنشورة المستندة إلى الحمض النووي لاخفاء البيانات المهمة  كحامي لها  والمنقولة عبر قناة غير آمنة  لمعرفة  نقاط القوة والضعف فيها. لمساعدة البحث المستقبلي في تصميم تقنيات أكثر كفاءة وأمانًا للاخفاء في الحمض نوويSecurity of Information are a key concern, particularly with the extension growth of internet usage. This growth comes the incidents of unauthorized access which are countered by the use of varied secure communication techniques, namely; cryptography and data hiding. More recent trends are concerned with DNA used for cryptography and data hiding as a carrier exploiting its bio-molecular properties. This paper provides a review about published DNA based data hiding techniques using the DNA as a safeguard to critical data that transmitted on an insecure channel, to find out the strength and weaknesses points of them. This will help the future research in designing of more efficient and secure data hiding techniques-based DNA

    Privacy in the Genomic Era

    Get PDF
    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward

    Wireless Security Protocol in DNA Bio-Inspired Network

    Get PDF
    The 21st century communications have evolved rapidly and spread all over the world using the Wi-Fi network which has provided benefits of connection which become more desirable for users to connect to the internet. These benefits are driving the world to a major internet security issues that links to harm their own sensitive data and it resulting for generates encouragement for attackers to drill the legitimate user’s Wi-Fi connection to access to where they want to organize and eavesdropping the data passed to hack them through and revealing it to check whether it is useful for them, hence exploiting packets travelling through the user’s Wi-Fi and using of the powerful of super sniffer techniques by the hackers to break in to such as malware and sniffing software that allows them to crack on the Wi-Fi to steal the data of the user who uses the eavesdropper Wi-Fi without their knowledge, these sniffers open to the hackers access to the user’s data like bank details and other data, it could be using their details for a crime such as find their identity which make the world more concerns about their personal information and they are looking for the latest security protocols to protect their Wi-Fi network. Wi-Fi security introduces a number of vulnerabilities that give hackers an opportunity to cause harm to the Wi-Fi users by stealing information, accessing the Wi-Fi network to compromise the Wi-Fi network as a way to access the enterprise network which is used by some security protocols. This would allow a hacker to use sniffers to access the Wi-Fi enterprise network which is used in coffee shops across the world and other trading premises by probing the SSID of their Wi-Fi. Near by the hackers would be able to crack the security protocols such as WPA or WPA2 which are the latest protocol that users use for their Wi-Fi security keys. In our research we have taken different security methods to secure the Wi-Fi network using the bio-inspired DNA is the idea comed from the Deoxyribonucleic Acid DNA because that DNA have several important features including the random nature of the sequences denoted by alphapet characters A, C, G and T to perform encoded unique DNA sequences that is transmitting the secrets and the DNA encryption comes from the biology of the DNA science of the human and animals. Our research has achieved basic steps which encrypt the user’s static data to DNA sequence to use it for a security access key this work is functioning successfully to DNA bases and experimentation prove in the implementation at chapter 5, and we used the symmetric cryptographic keys in DNA sequence encryption to be similar at both parties with the admin(Wi-Fi) and clients and this is the basic step for this project and it needs to implement the dynamic DNA to make the keys more secure for each user and we have explained how we can match and mismatch these encrypted data and how they need to updated automatically to new security keys with the dynamic DNA sequence in future work [1]. The achievements of our research are proposed to convert user data to a DNA security sequence to use it in the same way as the existing security protocols such as WPA2 but in DNA format with the dynamic key and static user data will keep the security key rubost durig the automatic updates, hence the static data and dynamic data can be updated automatically when adding the dynamic data to the project in future work for the user access key and this can be suitable for multi-users to form an autonomous Wi-Fi connection and DNA security key to mitigating some flaws of that existing security protocols techniques has such as sharing the same security key on the same Wi-Fi network users
    corecore