A Comparative Review on Symmetric and Asymmetric DNA-Based Cryptography

A Comparative Review on Symmetric and Asymmetric DNA-Based Cryptography

 

A Comparative Review on Symmetric and Asymmetric DNA-Based Cryptography

Ali Maki Sagheer

 Article Link

Abstract    Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other

classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algorithms. The first case concerned on symmetric cryptography that involved DNA coding with OTP (one time pad) algorithms. Asymmetric

cryptography was considered in the second case by ncorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. As observed, the computational time of RSA algorithm combined with DNA coding was longer. In order to alleviate

this problem, data redundancy was reducel2d by activating the GZIP compressed algorithm. The present experimental results showed that DNA symmetric cryptography worked quite well in both time and size analyses. Nevertheless, it was less efficient than the compressed DNA asymmetric cryptography

 

Keywords Asymmetric cryptography, DNA-based, GZIP,OTP,RSA, Symmetric cryptography.

 

REFERENCES

 

[1] P. Rakheja, “Integrating DNA computing in International data encryption algorithm (IDEA),” Int. J. Comput. Appl.,vol. 26, no. 3, pp. 1-6, 2011.

 

[2] D. Prabhu and M. Adimoolam, “Bi-serial DNA encryption algorithm (BDEA),” arXiv Prepr. arXiv1101.2577Computer Science:Cryptography and Security, 2011.

 

[3] S. Sadeg, M. Gougache, N. Mansouri, and H. Drias, “An encryption algorithm inspired from DNA,” in 2010 International Conference on Machine and Web Intelligence (ICMWI), pp. 344-349, 2010.

 

[4] S. K. Muttoo, D. Aggarwal, and B. Ahuja, “A secure image encryption algorithm based on hill cipher system,” Bulletin of Electrical Engineering and Informatics, vol. 1, no. 1, pp. 51-60, 2011.

 

[5] E. R. Arboleda, J. L. Balaba, and J. C. L. Espineli, “Chaotic rivest-shamir-adlerman algorithm with data encryption standard scheduling,” Bulletin of Electronics Engineering and Informatics, vol. 6, no. 3, pp. 219-227, 2017.

 

[6] C. Meshram, “The beta cryptosystem,” Bulletin of Electronics Engineering and Informatics, vol. 4, no. 2, pp. 155-159, 2015.

 

[7] M. Misbahuddin, “An efficient solution for remote user authentication using DNA crypto and steganography,” in Proceedings of the International Conference on Security and Management (SAM), pp. 54-60, 2018.

 

[8] R. Kannadasan, M. S. Saleembasha, and I. Arnold Emerson, “Survey on molecular cryptographic network DNA (MCND) using BIG DATA,” Procedia Comput. Sci., vol. 50, pp. 3-9, 2015.

 

[9] A. Gehani, T. LaBean, and J. Reif, “DNA-based cryptography,” in Aspects of Molecular Computing, Springer, pp. 167-188, 2003.

 

[10] B. B. Raj and V. C. Sharmila, “An survey on DNA based cryptography,” in 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR), pp. 1-3, 2018.

 

[11] R. Thilagavathy and A. Murugan, “Cloud computing: A survey on security issues and DNA, ID-base cryptography,” Indian J. Sci. Technol., vol. 9, no. 28, pp. 1-6, 2016.

 

[12] J. Chauhan and A. Jain, “Survey on encryption algorithm based on chaos theory and DNA cryptography,” Int. J.Adv. Res. Comput. Commun. Eng., vol. 3, no. 8, pp. 7801-7803, 2014.

 

[13] A. Bhateja and K. Mittal, “DNA steganography: Literature survey on its viability as a novel cryptosystem,” J.Comput. Sci. Eng., vol. 2, no. 1, pp. 8-14, 2015.

 

[14] S. Kaur and S. Malhotra, “A review on image encryption using DNA based cryptography techniques,” Int. J. Adv.Res. Comput. Sci. Manag. Stud., vol. 4, no. 3, 2016.

 

[15] A. Cherian, S. R. Raj, and A. Abraham, “A survey on different DNA cryptographic methods,” Int. J. Sci. Res.,vol. 2, no. 4, pp. 167-169, 2013.

 

[16] O. G. Abood and S. K. Guirguis, “DNA computing and its application to information and data security field:A survey,” DNA, vol. 3, no. 1, pp. 1-5, 2019.

 

[17] V. Siddaramappa and K. B. Ramesh, “DNA-based XOR operation (DNAX) for data security using DNA asa storage medium,” in Integrated Intelligent Computing, Communication and Security, Springer, pp. 343-351, 2019.

 

[18] H. Mousa, K. Moustafa, W. Abdel-Wahed, and M. M. Hadhoud, “Data hiding based on contrast mapping usingDNA medium.,” Int. Arab J. Inf. Technol., vol. 8, no. 2, pp. 147-154, 2011.

 

[19] K. Hameed, “DNA computation based approach for enhanced computing power,” Int. J. Emerg. Sci., vol. 1,no. 1, pp. 23-30, 2011.

 

[20] T. Hodorogea, I. S. Otto, and S. Janetta, “Deriving DNA cryptographic keys based on evolutionary models,” in 2011 12th International Carpathian Control Conference (ICCC), pp. 144-147, 2011.

 

[21] Z. Yunpeng, Z. Yu, W. Zhong, and R. O. Sinnott, “Index-based symmetric DNA encryption algorithm,” in 2011 4th International Congress on Image and Signal Processing, vol. 5, pp. 2290-2294, 2011.

 

[22] O. Tornea and M. E. Borda, “Security and complexity of a DNA-based cipher,” in 2013 11th RoEduNetInternational Conference, pp. 1-5, 2013.

 

[23] A. Jain and N. Rajpal, “Adaptive key length based encryption algorithm using DNA approach,” in 2013 International Conference on Machine Intelligence and Research Advancement, pp. 140-144, 2013.

 

[24] S. Jain and V. Bhatnagar, “Bit based symmetric encryption method using DNA sequence,” in 2014 5th International Conference-Confluence The Next Generation Information Technology Summit (Confluence), pp. 495-498, 2014.

 

[25] C. S. Sreeja, M. Misbahuddin, and M. H. NP, “DNA for information security: A survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology,” in International Conference on Computing and Communication Technologies, pp. 1-6, 2014. Bulletin of Electr Eng & Inf ISSN: 2302-9285 ? A comparative review on symmetric and asymmetric DNA-based cryptography (Baraa Tareq Hammad)

2491

 

[26] M. Sabry, M. Hashem, T. Nazmy, and M. E. Khalifa, “Design of DNA-based advanced encryption standard (AES),” in 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems(ICICIS), pp. 390-397, 2015.

 

[27] B. B. Raj, J. F. Vijay, and T. Mahalakshmi, “Secure data transfer through DNA cryptography using symmetricalgorithm,” Int. J. Comput. Appl., vol. 133, no. 2, pp. 19-23, 2016.

 

[28] F. A. Kadhim, G. H. A. Majeed, and R. S. Ali, “Proposal new s-box depending on DNA computing andmathematical operations,” in 2016 Al-Sadeq International Conference on Multidisciplinary in IT andCommunication Science and Applications (AIC-MITCSA), pp. 1-6, 2016.

 

[29] S. B. Beegom and S. Jose, “An enhanced cryptographic model based on DNA approach,” in 2017 Internationalconference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 317-322, 2017.

 

[30] M. R. Biswas, K. M. R. Alam, A. Akber, and Y. Morimoto, “A DNA cryptographic technique based on dynamic DNA encoding and asymmetric cryptosystem,” in 2017 4th International Conference on Networking, Systems andSecurity (NSysS), pp. 1-8, 2017.

 

[31] A. O. Ahgue, S. Franz, J. D. De Nkapkop, P. Adelis, J. Y. Effa, and M. Borda, “A DNA-based chaos algorithm foran efficient image encryption application,” in 2018 International Symposium on Electronics andTelecommunications (ISETC), pp. 1-4, 2018.

 

[32] X. Zhang, Z. Zhou, and Y. Niu, “An image encryption method based on the feistel network and dynamic DNAencoding,” IEEE Photonics J., vol. 10, no. 4, pp. 1-14, 2018.

 

[33] B. D. Patnala and R. K. Kumar, “A novel level-based DNA security algorithm using DNA codons,” inComputational Intelligence and Big Data Analytics, Springer, pp. 1-13, 2019.

 

[34] S. Basu, M. Karuppiah, M. Nasipuri, A. K. Halder, and N. Radhakrishnan, “Bio-inspired cryptosystem with DNA cryptography and neural networks,” J. Syst. Archit., 2019.

 

[35] H. Tatiana, V. Mircea-Florin, B. Monica, and S. Cosmin, “A Java crypto implementation of DNAprovider featuringcomplexity in theory and practice,” in ITI 2008-30th International Conference on Information Technology

Interfaces, pp. 607-612, 2008.

 

[36] S. R. Maniyath and M. Supriya, “An uncompressed image encryption algorithm based on DNA sequences,”Comput. Sci. Inf. Technol., vol. 2, pp. 258-270, 2011.

 

[37] X. Lai, M. Lu, L. Qin, J. Han, and X. Fang, “Asymmetric encryption and signature method with DNA technology,”Sci. China Inf. Sci., vol. 53, no. 3, pp. 506-514, 201

Share |