[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A DNA Cryptosystem Using Diffie–Hellman Key Exchange

Published: 20 February 2024 Publication History

Abstract

DNA cryptography is a method of concealing information in the form of DNA sequence. It is growing in popularity as a result of its quicker performance and low storage and power requirements. Despite its advantages, employing DNA cryptography purely is difficult due to a lack of secure theory and its easily implementable techniques. This paper presents a cutting-edge solution that uses bioinformatics and Diffie–Hellman Key exchange to protect the data during communications, overcoming the difficulties associated with employing solely DNA cryptography. Our cryptosystem suggests a method for encrypting and decrypting data that makes use of the entire Central Dogma of Molecular Biology (CDMB), the process by which DNA is converted into proteins. The Diffie–Hellman Key exchange approach is utilized for key generation in this algorithm, which also includes a few extra modifications for additional strength. Comparing our proposed bio-inspired cryptosystem to current systems, it demonstrates potential cryptographic efficiency, even on big data sets. In addition, it creates a very robust and quick-to-generate cryptosystem that protects the data from numerous online threats.

References

[1]
. Katz J, Cryptography. 2004.
[2]
Greene SS Security Program and Policies: Principles and Practices. 2014.
[3]
Karuppiah M and Saravanan R A secure remote user mutual authentication scheme using smart cards J Inf Secur Appl 2014 19 4–5 282-294
[4]
Kumari S, Karuppiah M, Li X, Wu F, Das AK, and Odelu V An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks Secur Commun Netw 2016 9 17 4255-4271
[5]
Saggese GP, Romano L, Mazzocca N, and Mazzeo A A tamper resistant hardware accelerator for RSA cryptographic applications J Syst Archit 2004 50 12 711-727
[6]
De Silva PY and Ganegoda GU New trends of digital data storage in DNA Biomed Res Int 2016 2016 1-14
[7]
Dove A DNA cryptography Nat Biotechnol 1999 17 7 625-625
[8]
Jirwan N, Singh A “Techniques TECHNIQUES OF,” Int. J. Sci. Eng. Res., vol. 4, no. 3, pp. 1–6, 2013, [Online]. Available: http://www.ijser.org
[9]
Simmons GJ Symmetric and asymmetric encryption ACM Comput Surv 1979 11 4 305-330
[10]
Chang JP and Shasha DE Storing clocked programs inside DNA: a simplifying framework for nanocomputing Synth Lect Comput Sci 2011 3 1 1-73
[11]
Barman P. “An Efficient Hybrid Elliptic Curve Cryptography System with DNA Encoding,” Int. Res. J. Comput. Sci., no. May 2015, 2015, [Online]. Available: http://www.irjcs.com/volumes/vol2/iss5/07.MYJCS10100.pdf.
[12]
Ning K. “A Pseudo DNA Cryptography Method,” Comput. Res. Repos. – CORR, 2009.
[13]
Roy SS,. Shahriyar SA, Asaf-Uddowla M, Alam KMR, Morimoto Y, “A novel encryption model for text messages using delayed chaotic neural network and DNA cryptography,” in 2017 20th International Conference of Computer and Information Technology (ICCIT), 2017, pp. 1–6.
[14]
Jogdand RM and Bisalapur SS Design of an efficient neural key generation Int J Artif Intell Appl 2011 2 1 60-69
[15]
Shihab K A backpropagation neural network for computer network security J Comput Sci 2006 2 9 710-715
[16]
Kalsi S, Kaur H, and Chang V DNA cryptography and deep learning using genetic algorithm with NW algorithm for key generation J Med Syst 2018 42 1 17
[17]
. Sajisha KS, Mathew S. “An encryption based on DNA cryptography and steganography,” in 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), 2017, pp. 162–167.
[18]
Pandey GP Implementation of DNA cryptography in cloud computing and using huffman algorithm, socket programming and new approach to secure cloud data SSRN Electron J 2019
[19]
Basu S, Karuppiah M, Nasipuri M, Halder AK, and Radhakrishnan N Bio-inspired cryptosystem with DNA cryptography and neural networks J Syst Archit 2019 94 24-31
[20]
Indrasena Reddy M, Siva Kumar AP, and Subba Reddy K A secured cryptographic system based on DNA and a hybrid key generation approach Biosystems 2020 197 104207
[21]
Geethanjali G, Ashwin C, Bharath VP, Avinash A, Hiremath A. “Enhanced Data Encryption in IOT using ECC Cryptography and LSB Steganography,” in 2021 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C) 2021 (pp. 173–177).
[22]
Singh P, Khari M, and Vimal S EESSMT: An energy efficient hybrid scheme for securing mobile Ad hoc networks using IoT Wirel Pers Commun 2022 126 3 2149-2173
[23]
Singh P, Khari M, and Kaundanya NS Ahmad KAB, Ahmad K, and Dulhare UN Impact of group theory in cryptosystem Functional encryption 2021 Cham Springer International Publishing 19-36
[24]
Devi PB, Ravindra P, and Kumar RK “Hiding information in an image using DNA cryptography 2023 Elsevier 173-210
[25]
Shivaramakrishna D and Nagaratna M A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control Alexandria Eng J 2023 84 275-284
[26]
Gadde S, Amutharaj J, and Usha S A security model to protect the isolation of medical data in the cloud using hybrid cryptography J Inf Secur Appl 2023 73
[27]
Goyal SB, Ravi RV, Verma C, Raboaca MS, and Enescu FM A lightweight cryptographic algorithm for underwater acoustic networks Procedia Comput Sci 2022 215 266-273
[28]
Murtaza MH, Tahir H, Tahir S, Alizai ZA, Riaz Q, and Hussain M A portable hardware security module and cryptographic key generator J Inf Secur Appl 2022 70
[29]
Morange M The central dogma of molecular biology Resonance 2009 14 3 236-247
[30]
Pavithran P, Mathew S, Namasudra S, and Lorenz P A novel cryptosystem based on DNA cryptography and randomly generated mealy machine Comput Secur 2021 104
[31]
Miller WB, Baluška F, and Reber AS A revised central dogma for the 21st century: All biology is cognitive information processing Prog Biophys Mol Biol 2023 182 34-48
[32]
Huffman D A method for the construction of minimum-redundancy codes Proc IRE 1952 40 9 1098-1101
[33]
Sayood K Huffman coding Introduction to data compression 2006 UK Elsevier 41-80
[34]
Arshad R, Saleem A, Khan D “Performance comparison of Huffman Coding and Double Huffman Coding,” in 2016 Sixth International Conference on Innovative Computing Technology (INTECH), 2016, pp. 361–364.
[35]
Ya-Jun He, Duo-Li Zhang, Bin Shen, and Luo-Feng Geng, “Implementation of fast Huffman decoding algorithm,” In: 2007 7th International Conference on ASIC, 2007, pp. 770–773.
[36]
U. Maurer and S. Wolf, “Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms,” In: Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252), p. 327.
[37]
Kumar M, Iqbal A, and Kumar P A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography Signal Process 2016 125 187-202
[38]
Jose A and Subramaniam K WITHDRAWN: DNA based SHA512-ECC cryptography and CM-CSA based steganography for data security Mater Today Proc 2020
[39]
Nan Li, “Research on Diffie-Hellman key exchange protocol,” In: 2010 2nd International Conference on Computer Engineering and Technology, 2010, pp. V4–634-V4–637.
[40]
Cock PJA et al. Biopython: freely available Python tools for computational molecular biology and bioinformatics Bioinformatics 2009 25 11 1422-1423

Index Terms

  1. A DNA Cryptosystem Using Diffie–Hellman Key Exchange
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image SN Computer Science
      SN Computer Science  Volume 5, Issue 3
      Mar 2024
      750 pages

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 20 February 2024
      Accepted: 04 January 2024
      Received: 07 April 2022

      Author Tags

      1. DNA cryptography
      2. Encryption
      3. Decryption
      4. Public key exchange
      5. Central dogma

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 21 Dec 2024

      Other Metrics

      Citations

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media