Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: An improved Symmetric key cryptography with DNA based strong cipher pdf
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
An improved Symmetric key cryptography with DNA based strong cipher

[attachment=44287]

Abstract

Cryptography is one of the major concerned areas
of computer and data security and a very promising direction in
cryptography research is known as DNA Cryptography. DNA
computational logic can be used in cryptography for encrypting,
storing and transmitting the information, as well as for
computation. Although in its primitive stage, DNA cryptography
is shown to be very effective. In this paper, a proposal is given
where the concept of DNA is being used in the encryption and
decryption process. The theoretical analysis and implementations
shows this method to be efficient in computation, storage and
transmission; and it is very powerful against certain attacks. This
paper also proposes a unique cipher text generation procedure as
well as a new key generation procedure. Finally, to demonstrate
the performance of the proposed method, its implementation is
explained and the results are analyzed.

INTRODUCTION

Recent research trends have focused on Introducing DNA
medium so as to obtain complex computation in the process of
achieving the cipher text. DNA cryptography is the new field
of interest in the common PKI scenario, where it is possible to
follow the pattern of PKI, while also exploiting the inherent
massively-parallel computing properties of DNA bonding to
perform the encryption and decryption of the public and
private keys. The resulting encryption algorithm used in the
transaction is much more complex than the one used by
conventional encryption methods [10]. Public Key
Cryptography is one set of cryptographic techniques for
providing confidentiality, preventing data compromise,
detecting alteration of data and verifying its authenticity, [6].
By the use of DNA computing, the Data Encryption Standard
(DES) cryptographic protocol can be broken [4].

MOTIVATION TOWARDS DNA CRYPTOGRAPHY

For every living cell, DNA is a basic storage medium. Its
main functionality is to absorb and transmit the data of life for
billions years. Near about 10 trillions of DNA molecules could
fit into a space of a marble size. Since all these molecules can
process data simultaneously, theoretically, we can perform
massive parallel computations in a small space at one time.
DNA computing is more generally known as molecular
computing. Computing with DNA offers a completely new
paradigm for computation. The main idea of computing with
DNA is to encode data in a DNA strand form in order to
simulate arithmetical and logical operations. The main
operation of DNA computing is called Synthesis, which is a
process of designing and restructuring information in DNA
sequence form. In DNA computing, designing and
synthesizing information in the DNA sequence form is an
important process where wrong design might leads to wrong
result.

PROPOSED SYMMETRIC KEY CRYPTOGRAPHY

The proposed symmetric key cryptography method has
introduced a new format of cipher text, where the primary
cipher text obtained after encoding is being divided into three
unequal parts and then extra parameters such as primer code,
file type code, integrity code, and authentication code are
added in between parts of the cipher text to obtain the final
cipher text.

LEVEL TWO KEY GENERATION PROCEDURE

The level (2) private key gives the information about the
length of the primer & the positions of introns (fixed length
garbage text, AUT, SPM, FT, EPM, INTR). The primers are
added at the starting and at the ending of primary cipher text
(CT); introns are inserted within the cipher text at positions as
described by the Level(2) key. The sender’s file length is
chosen as level2 key. The sum of the digits of the sender’s file
length is taken as the input to decide the primer’s length.
Introns positions are taken on the basis of the individual digits
of the file length.

PERFORMANCE ANALYSIS OF THE PROPOSAL

The proposed procedures are implemented in java platform
for its platform independent property and available in-built
cryptography functionalities. The procedures are implemented
successfully for the specified sized input plain texts. Initially,
there were constraints for large files such as images or videos
where the required primary memory of the system could create
a problem in the execution and conversion of the plain text
into cipher text. But, later on that problem are also resolved by
simply dividing the large file into fixed sized sub-files and
then performing the swapping while encoding and decoding.
The following table represents the data sets that are obtained
during the testing and analysis of the proposed procedure.

CONCLUSION

The proposed cryptography procedure has included only the
concept DNA cryptography and as DNA computing has
become a large area of interests in the research domain of
cryptography, the proposal can surely be enhanced with much
more advanced concepts such as realization in several security
technologies of encryption, steganography, signature and
authentication by using DNA molecular as information
medium. There are a lot of opportunities in expanding and
manipulating DNA characteristics and operations to solve real
application especially industrial engineering and management
engineering problems.