21-07-2012, 11:34 AM
Seminar on DNA Cryptography
1DNA Cryptography[.docx (Size: 14.86 KB / Downloads: 40)
ABSTRACT
Cryptography is one of the major concerned areas
of computer and data security and a very promising direction cryptography research is known as DNA Cryptography.
DNA computational logic can be used in cryptography for encrypting,
storing and transmitting the information, as well as for
computation. Although in its primitive stage, DNA cryptography
is shown to be very effective. In this paper, a proposal is given
where the concept of DNA is being used in the encryption and
decryption process. The theoretical analysis and implementations
shows this method to be efficient in computation, storage and
transmission; and it is very powerful against certain attacks. This
paper also proposes a unique cipher text generation procedure as
well as a new key generation procedure. Finally, to demonstrate
the performance of the proposed method, its implementation is
explained and the results are analyzed.
INTRODUCTION
Recent research trends have focused on Introducing DNA
medium so as to obtain complex computation in the process of
achieving the cipher text. DNA cryptography is the new field
of interest in the common PKI scenario, where it is possible to
follow the pattern of PKI, while also exploiting the inherent
massively-parallel computing properties of DNA bonding to
perform the encryption and decryption of the public and
private keys. The resulting encryption algorithm used in the
transaction is much more complex than the one used by
conventional encryption methods [10]. Public Key
Cryptography is one set of cryptographic techniques for
providing confidentiality, preventing data compromise,
detecting alteration of data and verifying its authenticity, [6].
By the use of DNA computing, the Data Encryption Standard
(DES) cryptographic protocol can be broken [4]. The one-time
pad cryptography with DNA strands, and the research on DNA
steganography (hiding messages in DNA), are shown in
[1].Essential parts of what we may call data security,
specifically confidentiality and authentication, are achieved
using cryptography, [5], which has a long and fascinating
history. In this paper, the proposed algorithm takes its basic
idea from the way DNA encodes the genetic information in the
codons (i.e. each codon holds the information of a particular
protein to be synthesized).