SlideShare uma empresa Scribd logo
1 de 20
A New Dna Encryption Technique For Secure
Data Transmission With Authentication And
Confidentiality
Supervised by Presented by
Shyla Afroz Md. Sajedul karim
Lecturer Roll:083008
Dept. of CSE, RUET RUET
Outline

Objective

Background Study

Importance of DNA cryptography

Algorithm & Implementation

Proposed Model

Future work

References
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
2/20
Objective

Encrypt the plain text into DNA sequence(cipher
text ) using new DNA encryption technique.

Decrypt this cipher text using DNA decryption
technique.

Detect the limitation of this technique.

Propose a new model to solve this limitation.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
3/20
Background Study
 Nucleic Acid 2 types: DNA & RNA
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
4/20
Background Study
 Genetic Code: Information encoded within genetic
material (DNA or mRNA base) .
 DNA sequence : Order of nucleotide bases in
the DNA molecule.
ATTAGCCTTATGCATGAACC
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
5/20
Background Study
 Cryptography: The art of protecting information by
transforming Plain Text into an unreadable format.
 Those who possess the secret key can decrypt the
message .
 Encrypted messages can sometimes broken by
Cryptanalysis .
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
6/20
Symmetric Cipher Model
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
7/20
DNA Cryptography
First introduced by L. Adleman in 1990s.
Plaintext message Encoded into DNA
sequences.
Related fields are : information storage , massive
parallel processing , highly secured data
transmission and more.
Based on one-time-pads .
8/2011/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Importance of DNA Cryptography
Weakness of traditional cryptology.
Existing algorithms are no longer secure.
1995 , Bonech break the DES
Weng - Long Chang have designed integer
factorization which can break RSA.
Offer all feature of secure data transmission .
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
9/20
New DNA Encryption Technique

Introduce by R.S. Dhawan and Alice in 2012.

It is symmetric Algorithm.

Has three secret key.

Few mathematical computation is needed.

Encrypted data are DNA sequences.

Support all ASCII character.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
10/20
New DNA Encryption Technique

Key={Starting_Number,Modulus,Hyphen_Indices_ Array[ ] }

Starting_Number: Used to generate some sequential integer .

Substitution_Array: Contains sequential integer .It’s size is the
length of Plain text.
Substitution_Array[ i ]=Substitution_Array[i-1]+Modulus;

Modulus: Difference between each sequential integer in
Substitution_Array[ ]

Hyphen_Indices_ Array[ ] :Used to separate number from
sequence.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
11/20
StartStart
Set START_NUMBER , MODULO ;
SUBSTITUTION_ARRAY[0]=START_NUMBER;
FOR( i=1 TO (MSG_LENGTH-1) )
SUBSTITUTION_ARRAY[i]=SUBSTITUTION_ARR
AY[i-1]+ MODULO ;
Calculate Quotient and Remainder
FOR (i =1 TO (MSG_LENGTH-1) ) {
Quotient[i]= SUBSTITUTION_ARRAY[i]/ASCII[i]
Remind [i]= SUBSTITUTION_ARRAY[i]%ASCII[i] }
Total_ARRAY[]=Quotient[] followed
by Remind[];
Convert 10- Base number to 4-base
from TOTAL_ARRAY[]
to CONVERT_ARRAY[]
Calculate HYPHEN_INDICES[];
Replace:
0------ A 1------T
2-------C 3-----G
Cipher Text
Flow Chart Of Encryption Technique
STOPSTOP
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Input : Plain text;
Perform ASCII conversion into ASCII_ARRAY[]
12/20
Data Sheet And Output Of Encryption Technique
Character ASCII [ ] SUBSTITUTION
ARRAY [ ]
DIVISION Quotient[ ] Remainder[ ]
M 77 877 877/77 11 30
E 69 902 902/69 13 5
S 83 927 927/83 11 14
U 85 952 952/85 11 11
K 75 977 977/75 13 2
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
13/20
StartStart
Separate 4-base number Using
Hyphen_Indices Array
Calculate ASCII value:
For(i=0 to CIPHER_TEXT_LENGTH/2-1)
D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/
QUOTIENT[i]
Mapped ASCII value to CHARACTER
Convert 4- Base number to 10-base
from FOUR_BASE
_ARRAY[] to
TEN_BASE_ARRAY[]
Input : Cipher Text
Mapping:
A------ 0 T------1
C-------2 G-----3
Plain Text
Flow Chart Of Decryption Technique
STOPSTOP
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Make SUBSTITUTION_ARRAY[ ]
Separate REMIND[ ] and QUOTIENT[ ]
14/20
Table And Output Of Decryption Technique
QUOTIENT REMAINDER For(i=0 to cipher_text_length/2)
D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/
QUOTIENT[i]
Character
11 30 (877-30)/11= 77 M
13 5 (902-5)/13= 69 E
11 14 (927-14)/11= 83 S
11 11 (952-11)/11= 85 U
13 2 (977-2)/13 = 75 K
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Cipher Text:TTTCCTTGGCATAAGTTGAC
15/20
Result Analysis

Can Encrypt and Decrypt all ASCII character.

Provide Avalanche effect.

Provide Confidentiality.

Limitations:

Can not provide Authentication property.

Can not detect Modification of message.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
16/20
Proposed Model
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
M ||
H
E D
M
C(K1,M)
H
Compare
K1
K2 K2
E(K2,[M||H(K1,M)]E
17/20
M=Plain Text
H=Hash
function
E=Encryption
D=Decryption
K1 , K2=Key
D
K1
Future Work

Provide Authentication property using Digital
Signature .

Add function that will detect Modification of
message.

Compare performance with Existing one.

Implement this approach in Programming
Language.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
18/20
REFERENCES
[1] RS Dhawan and Alice(2012). A new DNA
Encryption technique for secure data transmission.
Research Scholar , Kurukshetera University,
Haryana, India.
[2] Guangzhao Cui , Cuiling Li , Haobin Li ,
Xiaoguang Li (2009). DNA computing and its
application to information security field. Research
ScholarHenan key Lab of information-based
Electrical Application , Zhengzhou 450002.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
19/20
REFERENCES
[3] Pankaj Rakheja(2012). Integrating DNA
computing in international data encryption
Algorithm(IDEA). Deep Institute of Engineering and
Technology, Haryana, India.
[4] Abdullah Al Mueen & Md. Nurul Amin
Applications of Graphs in Bioinformatics pp.16-50,
2006
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
20/20

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

steganography
steganographysteganography
steganography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 

Destaque

DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
Thomas George C
 
Data communications
Data communicationsData communications
Data communications
UMaine
 
10.data transmission
10.data transmission10.data transmission
10.data transmission
Deepak Sharma
 
The Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele ScottiThe Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele Scotti
OpenKnowledge srl
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
lockyerj
 

Destaque (20)

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
 
Data communications
Data communicationsData communications
Data communications
 
03 data transmission
03 data transmission03 data transmission
03 data transmission
 
10.data transmission
10.data transmission10.data transmission
10.data transmission
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
DNA Kriptografi
DNA KriptografiDNA Kriptografi
DNA Kriptografi
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
Data collection
Data collectionData collection
Data collection
 
Vanet titles
Vanet titlesVanet titles
Vanet titles
 
Jonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ GenomeJonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ Genome
 
The Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele ScottiThe Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele Scotti
 
The DNA Era: Why DNA is important in your life.
The DNA Era:  Why DNA is important in your life.The DNA Era:  Why DNA is important in your life.
The DNA Era: Why DNA is important in your life.
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 

Semelhante a A new DNA encryption technique for secure data transmission with authentication and confidentiality

Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 

Semelhante a A new DNA encryption technique for secure data transmission with authentication and confidentiality (20)

A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
D017433134
D017433134D017433134
D017433134
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
 
B03302007012
B03302007012B03302007012
B03302007012
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

A new DNA encryption technique for secure data transmission with authentication and confidentiality

  • 1. A New Dna Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Supervised by Presented by Shyla Afroz Md. Sajedul karim Lecturer Roll:083008 Dept. of CSE, RUET RUET
  • 2. Outline  Objective  Background Study  Importance of DNA cryptography  Algorithm & Implementation  Proposed Model  Future work  References 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 2/20
  • 3. Objective  Encrypt the plain text into DNA sequence(cipher text ) using new DNA encryption technique.  Decrypt this cipher text using DNA decryption technique.  Detect the limitation of this technique.  Propose a new model to solve this limitation. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 3/20
  • 4. Background Study  Nucleic Acid 2 types: DNA & RNA 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 4/20
  • 5. Background Study  Genetic Code: Information encoded within genetic material (DNA or mRNA base) .  DNA sequence : Order of nucleotide bases in the DNA molecule. ATTAGCCTTATGCATGAACC 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 5/20
  • 6. Background Study  Cryptography: The art of protecting information by transforming Plain Text into an unreadable format.  Those who possess the secret key can decrypt the message .  Encrypted messages can sometimes broken by Cryptanalysis . 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 6/20
  • 7. Symmetric Cipher Model 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 7/20
  • 8. DNA Cryptography First introduced by L. Adleman in 1990s. Plaintext message Encoded into DNA sequences. Related fields are : information storage , massive parallel processing , highly secured data transmission and more. Based on one-time-pads . 8/2011/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality
  • 9. Importance of DNA Cryptography Weakness of traditional cryptology. Existing algorithms are no longer secure. 1995 , Bonech break the DES Weng - Long Chang have designed integer factorization which can break RSA. Offer all feature of secure data transmission . 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 9/20
  • 10. New DNA Encryption Technique  Introduce by R.S. Dhawan and Alice in 2012.  It is symmetric Algorithm.  Has three secret key.  Few mathematical computation is needed.  Encrypted data are DNA sequences.  Support all ASCII character. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 10/20
  • 11. New DNA Encryption Technique  Key={Starting_Number,Modulus,Hyphen_Indices_ Array[ ] }  Starting_Number: Used to generate some sequential integer .  Substitution_Array: Contains sequential integer .It’s size is the length of Plain text. Substitution_Array[ i ]=Substitution_Array[i-1]+Modulus;  Modulus: Difference between each sequential integer in Substitution_Array[ ]  Hyphen_Indices_ Array[ ] :Used to separate number from sequence. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 11/20
  • 12. StartStart Set START_NUMBER , MODULO ; SUBSTITUTION_ARRAY[0]=START_NUMBER; FOR( i=1 TO (MSG_LENGTH-1) ) SUBSTITUTION_ARRAY[i]=SUBSTITUTION_ARR AY[i-1]+ MODULO ; Calculate Quotient and Remainder FOR (i =1 TO (MSG_LENGTH-1) ) { Quotient[i]= SUBSTITUTION_ARRAY[i]/ASCII[i] Remind [i]= SUBSTITUTION_ARRAY[i]%ASCII[i] } Total_ARRAY[]=Quotient[] followed by Remind[]; Convert 10- Base number to 4-base from TOTAL_ARRAY[] to CONVERT_ARRAY[] Calculate HYPHEN_INDICES[]; Replace: 0------ A 1------T 2-------C 3-----G Cipher Text Flow Chart Of Encryption Technique STOPSTOP 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Input : Plain text; Perform ASCII conversion into ASCII_ARRAY[] 12/20
  • 13. Data Sheet And Output Of Encryption Technique Character ASCII [ ] SUBSTITUTION ARRAY [ ] DIVISION Quotient[ ] Remainder[ ] M 77 877 877/77 11 30 E 69 902 902/69 13 5 S 83 927 927/83 11 14 U 85 952 952/85 11 11 K 75 977 977/75 13 2 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 13/20
  • 14. StartStart Separate 4-base number Using Hyphen_Indices Array Calculate ASCII value: For(i=0 to CIPHER_TEXT_LENGTH/2-1) D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/ QUOTIENT[i] Mapped ASCII value to CHARACTER Convert 4- Base number to 10-base from FOUR_BASE _ARRAY[] to TEN_BASE_ARRAY[] Input : Cipher Text Mapping: A------ 0 T------1 C-------2 G-----3 Plain Text Flow Chart Of Decryption Technique STOPSTOP 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Make SUBSTITUTION_ARRAY[ ] Separate REMIND[ ] and QUOTIENT[ ] 14/20
  • 15. Table And Output Of Decryption Technique QUOTIENT REMAINDER For(i=0 to cipher_text_length/2) D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/ QUOTIENT[i] Character 11 30 (877-30)/11= 77 M 13 5 (902-5)/13= 69 E 11 14 (927-14)/11= 83 S 11 11 (952-11)/11= 85 U 13 2 (977-2)/13 = 75 K 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Cipher Text:TTTCCTTGGCATAAGTTGAC 15/20
  • 16. Result Analysis  Can Encrypt and Decrypt all ASCII character.  Provide Avalanche effect.  Provide Confidentiality.  Limitations:  Can not provide Authentication property.  Can not detect Modification of message. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 16/20
  • 17. Proposed Model 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality M || H E D M C(K1,M) H Compare K1 K2 K2 E(K2,[M||H(K1,M)]E 17/20 M=Plain Text H=Hash function E=Encryption D=Decryption K1 , K2=Key D K1
  • 18. Future Work  Provide Authentication property using Digital Signature .  Add function that will detect Modification of message.  Compare performance with Existing one.  Implement this approach in Programming Language. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 18/20
  • 19. REFERENCES [1] RS Dhawan and Alice(2012). A new DNA Encryption technique for secure data transmission. Research Scholar , Kurukshetera University, Haryana, India. [2] Guangzhao Cui , Cuiling Li , Haobin Li , Xiaoguang Li (2009). DNA computing and its application to information security field. Research ScholarHenan key Lab of information-based Electrical Application , Zhengzhou 450002. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 19/20
  • 20. REFERENCES [3] Pankaj Rakheja(2012). Integrating DNA computing in international data encryption Algorithm(IDEA). Deep Institute of Engineering and Technology, Haryana, India. [4] Abdullah Al Mueen & Md. Nurul Amin Applications of Graphs in Bioinformatics pp.16-50, 2006 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 20/20

Notas do Editor

  1. 09/21/13