SlideShare a Scribd company logo
A New Dna Encryption Technique For Secure
Data Transmission With Authentication And
Confidentiality
Supervised by Presented by
Shyla Afroz Md. Sajedul karim
Lecturer Roll:083008
Dept. of CSE, RUET RUET
Outline

Objective

Background Study

Importance of DNA cryptography

Algorithm & Implementation

Proposed Model

Future work

References
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
2/20
Objective

Encrypt the plain text into DNA sequence(cipher
text ) using new DNA encryption technique.

Decrypt this cipher text using DNA decryption
technique.

Detect the limitation of this technique.

Propose a new model to solve this limitation.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
3/20
Background Study
 Nucleic Acid 2 types: DNA & RNA
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
4/20
Background Study
 Genetic Code: Information encoded within genetic
material (DNA or mRNA base) .
 DNA sequence : Order of nucleotide bases in
the DNA molecule.
ATTAGCCTTATGCATGAACC
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
5/20
Background Study
 Cryptography: The art of protecting information by
transforming Plain Text into an unreadable format.
 Those who possess the secret key can decrypt the
message .
 Encrypted messages can sometimes broken by
Cryptanalysis .
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
6/20
Symmetric Cipher Model
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
7/20
DNA Cryptography
First introduced by L. Adleman in 1990s.
Plaintext message Encoded into DNA
sequences.
Related fields are : information storage , massive
parallel processing , highly secured data
transmission and more.
Based on one-time-pads .
8/2011/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Importance of DNA Cryptography
Weakness of traditional cryptology.
Existing algorithms are no longer secure.
1995 , Bonech break the DES
Weng - Long Chang have designed integer
factorization which can break RSA.
Offer all feature of secure data transmission .
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
9/20
New DNA Encryption Technique

Introduce by R.S. Dhawan and Alice in 2012.

It is symmetric Algorithm.

Has three secret key.

Few mathematical computation is needed.

Encrypted data are DNA sequences.

Support all ASCII character.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
10/20
New DNA Encryption Technique

Key={Starting_Number,Modulus,Hyphen_Indices_ Array[ ] }

Starting_Number: Used to generate some sequential integer .

Substitution_Array: Contains sequential integer .It’s size is the
length of Plain text.
Substitution_Array[ i ]=Substitution_Array[i-1]+Modulus;

Modulus: Difference between each sequential integer in
Substitution_Array[ ]

Hyphen_Indices_ Array[ ] :Used to separate number from
sequence.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
11/20
StartStart
Set START_NUMBER , MODULO ;
SUBSTITUTION_ARRAY[0]=START_NUMBER;
FOR( i=1 TO (MSG_LENGTH-1) )
SUBSTITUTION_ARRAY[i]=SUBSTITUTION_ARR
AY[i-1]+ MODULO ;
Calculate Quotient and Remainder
FOR (i =1 TO (MSG_LENGTH-1) ) {
Quotient[i]= SUBSTITUTION_ARRAY[i]/ASCII[i]
Remind [i]= SUBSTITUTION_ARRAY[i]%ASCII[i] }
Total_ARRAY[]=Quotient[] followed
by Remind[];
Convert 10- Base number to 4-base
from TOTAL_ARRAY[]
to CONVERT_ARRAY[]
Calculate HYPHEN_INDICES[];
Replace:
0------ A 1------T
2-------C 3-----G
Cipher Text
Flow Chart Of Encryption Technique
STOPSTOP
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Input : Plain text;
Perform ASCII conversion into ASCII_ARRAY[]
12/20
Data Sheet And Output Of Encryption Technique
Character ASCII [ ] SUBSTITUTION
ARRAY [ ]
DIVISION Quotient[ ] Remainder[ ]
M 77 877 877/77 11 30
E 69 902 902/69 13 5
S 83 927 927/83 11 14
U 85 952 952/85 11 11
K 75 977 977/75 13 2
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
13/20
StartStart
Separate 4-base number Using
Hyphen_Indices Array
Calculate ASCII value:
For(i=0 to CIPHER_TEXT_LENGTH/2-1)
D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/
QUOTIENT[i]
Mapped ASCII value to CHARACTER
Convert 4- Base number to 10-base
from FOUR_BASE
_ARRAY[] to
TEN_BASE_ARRAY[]
Input : Cipher Text
Mapping:
A------ 0 T------1
C-------2 G-----3
Plain Text
Flow Chart Of Decryption Technique
STOPSTOP
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Make SUBSTITUTION_ARRAY[ ]
Separate REMIND[ ] and QUOTIENT[ ]
14/20
Table And Output Of Decryption Technique
QUOTIENT REMAINDER For(i=0 to cipher_text_length/2)
D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/
QUOTIENT[i]
Character
11 30 (877-30)/11= 77 M
13 5 (902-5)/13= 69 E
11 14 (927-14)/11= 83 S
11 11 (952-11)/11= 85 U
13 2 (977-2)/13 = 75 K
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Cipher Text:TTTCCTTGGCATAAGTTGAC
15/20
Result Analysis

Can Encrypt and Decrypt all ASCII character.

Provide Avalanche effect.

Provide Confidentiality.

Limitations:

Can not provide Authentication property.

Can not detect Modification of message.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
16/20
Proposed Model
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
M ||
H
E D
M
C(K1,M)
H
Compare
K1
K2 K2
E(K2,[M||H(K1,M)]E
17/20
M=Plain Text
H=Hash
function
E=Encryption
D=Decryption
K1 , K2=Key
D
K1
Future Work

Provide Authentication property using Digital
Signature .

Add function that will detect Modification of
message.

Compare performance with Existing one.

Implement this approach in Programming
Language.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
18/20
REFERENCES
[1] RS Dhawan and Alice(2012). A new DNA
Encryption technique for secure data transmission.
Research Scholar , Kurukshetera University,
Haryana, India.
[2] Guangzhao Cui , Cuiling Li , Haobin Li ,
Xiaoguang Li (2009). DNA computing and its
application to information security field. Research
ScholarHenan key Lab of information-based
Electrical Application , Zhengzhou 450002.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
19/20
REFERENCES
[3] Pankaj Rakheja(2012). Integrating DNA
computing in international data encryption
Algorithm(IDEA). Deep Institute of Engineering and
Technology, Haryana, India.
[4] Abdullah Al Mueen & Md. Nurul Amin
Applications of Graphs in Bioinformatics pp.16-50,
2006
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
20/20

More Related Content

What's hot

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
Amlan Patel
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
prashantdahake
 
Cryptography
CryptographyCryptography
Cryptography
AnandKaGe
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
James Ridgway
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
 
Encryption
EncryptionEncryption
Encryption
Jadavsejal
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
Christopher Martin
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 

Viewers also liked

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
Abhishek Majumdar
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
IDES Editor
 
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
AlexACMSC
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
03 data transmission
03 data transmission03 data transmission
03 data transmission
Orbay Yeşil
 
10.data transmission
10.data transmission10.data transmission
10.data transmissionDeepak Sharma
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
Bise Mond
 
DNA Kriptografi
DNA KriptografiDNA Kriptografi
DNA Kriptografi
ismail AKBUDAK
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
Praveen Kumar Donta
 
Vanet titles
Vanet titlesVanet titles
Vanet titles
Shakas Technologies
 
Jonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ GenomeJonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ Genome
Jonathan Eisen
 
The Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele ScottiThe Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele ScottiOpenKnowledge srl
 
The DNA Era: Why DNA is important in your life.
The DNA Era:  Why DNA is important in your life.The DNA Era:  Why DNA is important in your life.
The DNA Era: Why DNA is important in your life.
Richard Brownell
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionlockyerj
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
IOSR Journals
 

Viewers also liked (20)

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
 
Data communications
Data communicationsData communications
Data communications
 
03 data transmission
03 data transmission03 data transmission
03 data transmission
 
10.data transmission
10.data transmission10.data transmission
10.data transmission
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
DNA Kriptografi
DNA KriptografiDNA Kriptografi
DNA Kriptografi
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
Data collection
Data collectionData collection
Data collection
 
Vanet titles
Vanet titlesVanet titles
Vanet titles
 
Jonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ GenomeJonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ Genome
 
The Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele ScottiThe Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele Scotti
 
The DNA Era: Why DNA is important in your life.
The DNA Era:  Why DNA is important in your life.The DNA Era:  Why DNA is important in your life.
The DNA Era: Why DNA is important in your life.
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 

Similar to A new DNA encryption technique for secure data transmission with authentication and confidentiality

A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
IJNSA Journal
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
Sajedul Karim
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
IJERA Editor
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
D017433134
D017433134D017433134
D017433134
IOSR Journals
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
journalBEEI
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
IJERA Editor
 
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
IRJET Journal
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Amirul Wiramuda
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
ijsptm
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
ijcisjournal
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
CSCJournals
 

Similar to A new DNA encryption technique for secure data transmission with authentication and confidentiality (20)

A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
D017433134
D017433134D017433134
D017433134
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
 
B03302007012
B03302007012B03302007012
B03302007012
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

A new DNA encryption technique for secure data transmission with authentication and confidentiality

  • 1. A New Dna Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Supervised by Presented by Shyla Afroz Md. Sajedul karim Lecturer Roll:083008 Dept. of CSE, RUET RUET
  • 2. Outline  Objective  Background Study  Importance of DNA cryptography  Algorithm & Implementation  Proposed Model  Future work  References 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 2/20
  • 3. Objective  Encrypt the plain text into DNA sequence(cipher text ) using new DNA encryption technique.  Decrypt this cipher text using DNA decryption technique.  Detect the limitation of this technique.  Propose a new model to solve this limitation. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 3/20
  • 4. Background Study  Nucleic Acid 2 types: DNA & RNA 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 4/20
  • 5. Background Study  Genetic Code: Information encoded within genetic material (DNA or mRNA base) .  DNA sequence : Order of nucleotide bases in the DNA molecule. ATTAGCCTTATGCATGAACC 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 5/20
  • 6. Background Study  Cryptography: The art of protecting information by transforming Plain Text into an unreadable format.  Those who possess the secret key can decrypt the message .  Encrypted messages can sometimes broken by Cryptanalysis . 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 6/20
  • 7. Symmetric Cipher Model 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 7/20
  • 8. DNA Cryptography First introduced by L. Adleman in 1990s. Plaintext message Encoded into DNA sequences. Related fields are : information storage , massive parallel processing , highly secured data transmission and more. Based on one-time-pads . 8/2011/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality
  • 9. Importance of DNA Cryptography Weakness of traditional cryptology. Existing algorithms are no longer secure. 1995 , Bonech break the DES Weng - Long Chang have designed integer factorization which can break RSA. Offer all feature of secure data transmission . 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 9/20
  • 10. New DNA Encryption Technique  Introduce by R.S. Dhawan and Alice in 2012.  It is symmetric Algorithm.  Has three secret key.  Few mathematical computation is needed.  Encrypted data are DNA sequences.  Support all ASCII character. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 10/20
  • 11. New DNA Encryption Technique  Key={Starting_Number,Modulus,Hyphen_Indices_ Array[ ] }  Starting_Number: Used to generate some sequential integer .  Substitution_Array: Contains sequential integer .It’s size is the length of Plain text. Substitution_Array[ i ]=Substitution_Array[i-1]+Modulus;  Modulus: Difference between each sequential integer in Substitution_Array[ ]  Hyphen_Indices_ Array[ ] :Used to separate number from sequence. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 11/20
  • 12. StartStart Set START_NUMBER , MODULO ; SUBSTITUTION_ARRAY[0]=START_NUMBER; FOR( i=1 TO (MSG_LENGTH-1) ) SUBSTITUTION_ARRAY[i]=SUBSTITUTION_ARR AY[i-1]+ MODULO ; Calculate Quotient and Remainder FOR (i =1 TO (MSG_LENGTH-1) ) { Quotient[i]= SUBSTITUTION_ARRAY[i]/ASCII[i] Remind [i]= SUBSTITUTION_ARRAY[i]%ASCII[i] } Total_ARRAY[]=Quotient[] followed by Remind[]; Convert 10- Base number to 4-base from TOTAL_ARRAY[] to CONVERT_ARRAY[] Calculate HYPHEN_INDICES[]; Replace: 0------ A 1------T 2-------C 3-----G Cipher Text Flow Chart Of Encryption Technique STOPSTOP 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Input : Plain text; Perform ASCII conversion into ASCII_ARRAY[] 12/20
  • 13. Data Sheet And Output Of Encryption Technique Character ASCII [ ] SUBSTITUTION ARRAY [ ] DIVISION Quotient[ ] Remainder[ ] M 77 877 877/77 11 30 E 69 902 902/69 13 5 S 83 927 927/83 11 14 U 85 952 952/85 11 11 K 75 977 977/75 13 2 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 13/20
  • 14. StartStart Separate 4-base number Using Hyphen_Indices Array Calculate ASCII value: For(i=0 to CIPHER_TEXT_LENGTH/2-1) D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/ QUOTIENT[i] Mapped ASCII value to CHARACTER Convert 4- Base number to 10-base from FOUR_BASE _ARRAY[] to TEN_BASE_ARRAY[] Input : Cipher Text Mapping: A------ 0 T------1 C-------2 G-----3 Plain Text Flow Chart Of Decryption Technique STOPSTOP 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Make SUBSTITUTION_ARRAY[ ] Separate REMIND[ ] and QUOTIENT[ ] 14/20
  • 15. Table And Output Of Decryption Technique QUOTIENT REMAINDER For(i=0 to cipher_text_length/2) D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/ QUOTIENT[i] Character 11 30 (877-30)/11= 77 M 13 5 (902-5)/13= 69 E 11 14 (927-14)/11= 83 S 11 11 (952-11)/11= 85 U 13 2 (977-2)/13 = 75 K 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Cipher Text:TTTCCTTGGCATAAGTTGAC 15/20
  • 16. Result Analysis  Can Encrypt and Decrypt all ASCII character.  Provide Avalanche effect.  Provide Confidentiality.  Limitations:  Can not provide Authentication property.  Can not detect Modification of message. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 16/20
  • 17. Proposed Model 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality M || H E D M C(K1,M) H Compare K1 K2 K2 E(K2,[M||H(K1,M)]E 17/20 M=Plain Text H=Hash function E=Encryption D=Decryption K1 , K2=Key D K1
  • 18. Future Work  Provide Authentication property using Digital Signature .  Add function that will detect Modification of message.  Compare performance with Existing one.  Implement this approach in Programming Language. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 18/20
  • 19. REFERENCES [1] RS Dhawan and Alice(2012). A new DNA Encryption technique for secure data transmission. Research Scholar , Kurukshetera University, Haryana, India. [2] Guangzhao Cui , Cuiling Li , Haobin Li , Xiaoguang Li (2009). DNA computing and its application to information security field. Research ScholarHenan key Lab of information-based Electrical Application , Zhengzhou 450002. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 19/20
  • 20. REFERENCES [3] Pankaj Rakheja(2012). Integrating DNA computing in international data encryption Algorithm(IDEA). Deep Institute of Engineering and Technology, Haryana, India. [4] Abdullah Al Mueen & Md. Nurul Amin Applications of Graphs in Bioinformatics pp.16-50, 2006 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 20/20

Editor's Notes

  1. 09/21/13