Preparation_Instruction I. J. Computer Network and Information Security, 2016, 7, 1-9 Published Online July 2016 in MECS (http://www.mecs-press.org/) DOI: XXXXXXXXXX/ijcnis XXXXXXXXXX Copyright © 2016...

I want to know the price


Preparation_Instruction I. J. Computer Network and Information Security, 2016, 7, 1-9 Published Online July 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.07.01 Copyright © 2016 MECS I.J. Computer Network and Information Security, 2016, 7, 1-9 DNA-Genetic Encryption Technique Hamdy M. Mousa Faculty of Computers and Information, Menoufia University, Egypt E-mail: [email protected] Abstract—In this paper, we propose DNA-Genetic Encryption Technique (D-GET) in order to make the technique more secure and less predictable. In this technique, binaries any type of digital data and convert it to DNA sequencing, reshape, encrypt, crossover, mutate and then reshape. The main stages of D-GET are repeated three times or more. Transmit the encrypted data in text/image format file. In other side, the receiver uses the D-GET to decrypt the received data and reshape it to original format. This Technique also transforms the text into an image and vice versa to improve security and multiple key sequences to increase the degree of diffusion and confusion, which makes resulting cipher data difficult to decipher and makes to realize a perfect secrecy system. Experimental results demonstrate that proposed technique has multilayer protection stages against different attacks and higher level of security based on the multi-stages and genetic operations. Decrypted data are acceptable because of there is absolutely difference between it and secret data. Index Terms—DNA Technique, cryptography, bit exchange, Genetic Algorithm. I. INTRODUCTION Cryptography technique is used to hide or represent information so nobody but authorized parties can decode it. Cryptography is the studies of mathematical techniques of information security such as confidentiality, data integrity, and authentication [1]. Ancient Egyptians are the oldest who encrypted text. The Internet provides essential communication and uses as a tool for many applications, i.e. secure commerce and payments to private communications and access control and so forth. Symmetric and Asymmetric key are two categories Cryptographic algorithms. In Symmetric algorithm, a common key is shared between the sender and the receiver. The other involves public and private keys that are mathematically related [1, 2]. There are many traditional cryptographic algorithms that used to encrypt and decrypt secret information. The paper proposed symmetrical encryption algorithm to protect data of Wireless Sensor Networks. It adopts minor encryption rounds, shorter data packet and simplified scrambling function. So, its calculation and resource cost are very low. Interpolation method is used to produce Child-Key by adopting longer-bit Key [3]. In [4], the symmetric cryptography algorithm is proposed for encryption and decryption the real-time audio signal. It is compared with the well-known RSA technique. The results showed that the suggested algorithm produces higher quality audio signal than the RSA method exact signal as the original one. The traditional cryptographic algorithms are not enough to achieve very high level of security and hastily growing bio-molecular computation so that Bio- molecular computation uses in cryptographic field and DNA cryptography is a new cryptographic prototype. DNA is a nucleic acid that contains the genetic instructions. The four bases found in DNA are adenine (A), cytosine (C), guanine (G) and thymine (T). A gene is a sequence of DNA that contains genetic information of all living organisms [5]. Three techniques to convert data from binary form to DNA (or RNA) form to amino acids form and the reverse are explained [5]. Nowadays, many research papers are proposed based on DNA encryption schemes that use biological properties of DNA sequences [6, 7, 8]. In the last few years, DNA Cryptography seems to be a promising strategy for fulfilling the current information security needs. There are different processes to encode data and different DNA cryptography methodology that are used for secure data transmission like Polymerase chain reaction, bio-molecular, one-time-pad [9]. The most advantage of DNA cryptography is parallel processing capabilities. DNA-based bio-molecular cryptography approach is designed. It based on DNA and carbon nanotube message that is used to transfer data between DNA and conventional binary storage [10]. The parallel DNA cryptography technique is introduced based on one time pad, DNA digital coding technique and DNA hybridization technique [11]. Parallelism DNA encryption technique based on matrix manipulation and secure key generation scheme is proposed [12]. DNA cryptographic based on implementation of YAEA encryption algorithm is proposed. It is symmetric key DNA cryptographic called Yet Another Encryption Algorithm (YAEA) and combined the mathematical model of the algorithm with the DNA to define key sequences [13]. DNA cryptography for Securing Ad hoc Networks based on the DNA digital coding and DNA fragmentation with symmetric system algorithm is proposed [14]. A new symmetric key DNA cryptographic algorithm based on the DNA key features and amino acid coding is proposed to enhance the security level of classical OTP cipher [15]. Public-key system using DNA as a one-way function for distribution is proposed. In this system, message is mailto:[email protected] 2 DNA-Genetic Encryption Technique Copyright © 2016 MECS I.J. Computer Network and Information Security, 2016, 7, 1-9 encoded by two primers using Polymerase Chain Reaction amplifications [16]. DNA public key cryptosystem, an asymmetric encryption and signature cryptosystem is proposed [17, 18]. A novel generation key scheme based on DNA is proposed to increase computational based on key expansion matrix depended on DNA scheme using random key generation scheme speed [19]. Data hiding is type of security of information. The two categories of data hiding are digital watermarking and steganographic applications. Data hiding aims to hide secret information in cover media without detectable [20]. Cryptography and steganography technique to encrypt and hide data using one-time-pad technique and DNA sequences technique [21]. The authors proposed symmetric DNA encryption algorithm to hide data based on DNA sequence [22]. The authors used Block cipher and Index of string for encrypting message into DNA sequences. DNA encryption algorithm searches the key sequence and writes in index number [23]. A novel and unique biological simulation based technique for DNA encryption and decryption is proposed. The plaintext is divided into two halves equally and transformed to DNA sequences using unique encoding table generation for every session. After that the cipher text is generated after applying proposed technique steps [24]. Some existing works on DNA Cryptography are discussed and compared [9]. An encryption method is composed of DNA synthesis and the hypothesis of conventional cryptography. The DNA Digital coding is also used as the plaintext pre- process stage. For more security protection, it is also used the fundamental keys that are the normal DNA successions [25]. Biotic Pseudo DNA based secret key cryptographic mechanism is proposed based on the genetic information of biological system using bio- molecular computation that is vast parallelism and energy efficiency. To improve security, it is also used of splicing system and random multiple key sequence [26]. Novel DNA cryptography algorithm is proposed based upon a secured symmetric key generation. This encryption algorithm is composed of three stages encryption, random key generation and decryption. In encryption stage, text is converted to ASCII then to DNA code. By using random key generated DNA sequences, this initial cipher is transformed to final cipher [27]. In this paper, DNA-Genetic Encryption Technique (D- GET) is proposed. In this technique, the secret data converted into binary and then into DNA sequences. In addition, the D-GET is an iterative algorithm. Iteration is called a round, and the number of rounds is three or more. Each round has four operations and it is iterative in nature. Iteration consists of encryption, reshaping process and genetic operations. In addition to that the symmetric key is used. Any data type format can be used as secret data i.e. text, word document, image pixels, audio and video. Experimental results prove that reconstructed data is typical copy of secret data. And they also demonstrate that proposed technique maintains the perfect security. The remaining of the paper is organized as follows: in section 2, proposed technique is introduced in detail, and then in section 3, the experimental results are provided, discussed and proved that it satisfies the presented security. Finally, some concluding remarks are given in the last section. II. D-GET TECHNIQUE The traditional cryptography is not sufficient due to the need of security increases and developing of cryptanalytic techniques. In recent years, DNA cryptography is a new field of cryptography. DNA cryptography seems to be a promising strategy for fulfilling the current information security needs. This paper proposes DNA-Genetic Encryption Technique (D-GET) that is an iterative algorithm in order to enhance information security. Any type of data (i.e. message, image, video or signal) can be encrypted. The main steps of proposed technique are pre-processing, symmetric key encryption, reshaping and crossover and mutation [28]. They are explained as following. A. Pre-processing Stage After reading secret data, this data must be preparing depending into its type. In case text file, it is converted into ASCII values. Group them into 8-bits Binary data. Every two adjacent bits are transferred to the four bases; adenine (A), cytosine (C), guanine (G) and thymine (T), found in DNA. For example: according to Table 1. Table 1. DNA and Representation of bits DNA Bits A 00 C 01 G 10 T 11 In case of gray image, read pixels of image data into
Apr 03, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here