SlideShare a Scribd company logo
1 of 3
Download to read offline
Proceedings of 2018 Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR)
978-1-5386-5744-7/18/$31.00ยฉ2018 IEEE 1
An Survey on DNA Based Cryptography
Bonny B Raj
Department of Computer Science and Engineering
HITS,
Chennai, Tamilnadu, India
bonny.renjith@gmail.com
Abstract - Information Security play a vital issue in todayโ€™s
life. In this paper DNA is used as an information carrier. DNA
cryptography is an upcoming technology, which combines bio-
logical information and data security. They provide wide range
of extraordinary parallelism, exceptional energy efficiency,
storing and computing capabilities. This paper presents a re-
view on DNA Cryptographic approaches, highlights the merits
and demerits of each one.
Keywords - Biological Information, DNA Cryptography,
Information security, Information Technology.
I. INTRODUCTION
Security threats are increasing day by day due to
the information flow in network .The most confidential
infor-mation such as business records, health records and
private information should be broadcasted via a public
transmission media with extreme care. The security of
these information involves an enormous threats by an
unintentional recipient. Cryptography helps us in ensuring
protection of such data. Cryptographic methods provide
transmission of data with secure storing of data across
channels so that it can be un-derstood only by the
intended receiver. Many algorithms have been developed
for the purpose of encrypting the in-formation or data.
II. CRYPTOGRAPHIC ASPECTS
Cryptography is concerned with four major
aspects. They include:
A. Confidentiality
It deals with protecting data from unauthorized us-
ers.
B. Integrity
Receiving data without any kind of alteration.
C. Non repudiation
Sender cannot stop sending data.
D. Authentication
Confirms that data is coming from right person.
III. DNA
DNA stands for De-oxyribo nucleic acid is a thread like
V Ceronmani Sharmila
Department of Information Technology
HITS,
Chennai, Tamilnadu, India
csharmila@hindustanuniv.ac.in
chain of molecules known as nucleic acid. They are used
for transmitting genetic instructions which in turn is
used in growth, development, functioning and reproduction
of all
Fig. 1 Structure of DNA
living organism [1]. This intricate design of the
organism includes human organ that are the outcome of
assigning cer-tain procedure to the virgin message which
in turn will be encoded in a DNA sequences which is
termed as genes.
Further these complicated mathematical operations
are subjected to basic additions and subtractions. One of
the major advantage of DNA molecule is that it is a
combination of four bases, Adenine (A), Thiamine (T),
Guanine (G) and Cytosine (C).These four bases combines
in different order to form Purines (Guanine and Adenine
combinations) and Py-rimidines (Thymine and Cytosine
combinations). These bi-strands of DNA molecules are
anti parallel and they can moves in the reverse directions.
This complementary adds up DNA with a different data
pattern for computing and may be used in different
aspects. Fig. 1 shows the structure of DNA.
IV. DNA CRYPTOGRAPHY AND COMPUTING
DNA Computing and Cryptography concept has
emerged from computational ability of De-oxyribo Nucleic
Acid (DNA). It is a cryptographic branch of biological sci-
ence which make use of computing more complex to the
unauthorized user [2].
A. Operations on DNA
DNA molecules are helpful in solving computational
and mathematical problems with the help of different
biological operations which can be summarized as :
1) Hybridization: In this method two numbers of
single stranded DNA molecules are combined together to
form a double stranded DNA molecule.
2) Denaturation: This is the method of separating dou-ble
stranded molecule to two separate single stranded DNA.
3) Litigation: This is a method of combing two double
stranded DNA sequence to a new double stranded DNA
sequence.
Proceedings of 2018 Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR)
2
4) Polymerase Chain Reaction: A Polymerase chain re-
action or simply PCR is a molecular biological application
method for amplifying a single copy or a few copies of a
piece
of DNA molecule across several orders of degree, generat-
ing thousands or millions of copies of a specific DNA combi-
nations.
5) Gel Electrophoresis: A Gel Electrophoresis is a
process of separating DNA molecules located in the
gel. Here gel is used as a filter. Electrophoresis refers to the
push of DNA strands through the gel filter. This can be done
with the help of a electrophoresis box by applying
electricity, where it moves DNA. Short strands move
quickly where as longer strands moves slowly through
the holes of gel. Strands with equal length move with
uniform speed and ends ups successively and thus the
DNA threads gets sort by themselves.
V. BASIC TERMINOLOGIES IN DNA
Some fundamental biological terms which is commonly
used in DNA Computation and Cryptography are listed as
follows:
A. Codons
Codons are combinations of tri-bases of nucleotide in
the form of a triplet.
B. Genes
Genes act as the functioning units of DNA molecules.
An individual gene consist of definite sets of data or encod-
ing of a definite protein or particular process. They can be
coded or non-coded sequences. The coded sequences are
known by the term Exons and non-coded sequences as In-
trons.
C. Chromosome
Chromosomes are huge DNA structures which is coiled
over protein molecules, that includes genes, other regulative
elements and sequences of nucleotides. In other words
chromosomes may be a long strings of genes.
D. Genome
Genome are specific combinations of being which
in-clude genes, chromosome, nucleotides and DNA of a
living cell.
The fundamental techniques used in DNA
Encryption are DNA digital coding and PCR Amplification
[3].
VI. DNA DIGITAL ENCODING
DNA digital encoding is a method of aligning
DNA molecules. They act a major role in encryption and
decryp-tion of data. We cannot use DNA molecule as
alphabets for computation purpose, for this they make use of
the approach BCD or binary digital coding, that encode
the combinations as 1โ€™s and 0โ€™s. DNA encoding can be
done on the basis of four nucleotide bases A, C, T and G.
These four bit subunits
TABLE I
DNA DIGITAL ENCODING
Encoding DNA
Nucleotide
Decimal Value Binary Value
A 0 00
C 1 01
T 2 10
G 3 11
of DNA molecule are then converted into two bit binary val-
ues as A as 0 [00], T as 1 [01], C as 2 [10], G as 3 [11] as
shown in the table 1. DNA digital encoding is a method of
aligning DNA molecules. They act a major role in encryption
and decryption of data. We cannot use DNA molecule as
alphabets for computation purpose, for this they make use of
the approach BCD or binary digital coding, that encode the
combinations as 1โ€™s and 0โ€™s. DNA encoding can be done on
the basis of four nucleotide bases A, C, T and G. These four
bit subunits of DNA molecule are then converted into two bit
binary values as A as 0 [00], T as 1 [01], C as 2 [10], G as 3
[11] as shown in the Table I.
Suppose the plain text is โ€œABCโ€ initial step of this
pro-cess is to convert each characteristic to its
corresponding ASCII value (A=65, B=66). Then they are
converted to its binary value (the sequences of bits 0โ€™s
and 1โ€™s will be 65= 1000001 and 66=1000010, and it will
be mapped to ACTG combinations using the table1 as
TAAGAAT and the data is ready for encryption. Along
with DNA digital encoding fur-ther encryption methods
can be included for making it more secure like PCR
Amplification process.
VII. PCR AMPLIFICATION
PCR stands for polymer chain reaction which hold
the bio-molecular method of DNA Amplification which is
placed on the Watson-crick complementary model. Here
two pri-mers are coded with a DNA sequences. Primers
are small units of DNA. The two primer combinations can
be passed on as the key for the PCR Amplification
Process [4].PCR Amplification is shown in the Fig. 2.
The original information can be positioned securely
be-tween the two primers for encoding them into a new
se-quence. The resultant message is very difficult to
amplify if the PCR primers are unknown. Different length
primers will generate different results, so correctness of
primers are very important in this process. Biological PCR
operations are as follows:
A. Step 1- Denaturation
PCR Amplification is considered as the first step of de-
naturation, here a dual stranded molecule can be separated
into two single stranded DNA molecule. This fragment can
be again heated up to 94 to 95 degree for one to few minutes
to denature or to get separated as double stranded molecule
to single strand.
Proceedings of 2018 Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR)
3
Fig. 2 Polymer Chain Reaction
B. Step 2- Primer Annealing
In Primer Annealing the temperature is reduced to 50 to
65 degree for one to few minutes so that the primer get at-
tached to the corresponding complementary pairs. These
primers are structured to strengthen the DNA region.
C. Step 3- Primer Extension
Here the temperature can be increased to 72 degree for
one to few minutes. Thus polymer enzyme will add
nucleo-tides to the strands of shorter primers on
original DNA strands, here by amplifying the DNA
strands between the primers.
VII. DNA ENCODING METHODS
DNA Digital encoding and PCR methods are the
most commonly used encryption techniques in DNA based
Cryp-tography. In addition to this the other few
techniques, they include:
A. DNA Chip Based
DNA chips and micro-arrays have opened a new
way for doing research. DNA chip based technology is best
suit-ed for storing and handling biological information.
They can support wide range of manipulation of genome
sequence. Such DNA Chip consist of numerous ports which
is embed-ded in a solid surface, commonly a glass slide.
Here each spot consist of a large number of ports, which
are nucleo-tides sequence capable of binding
complementary nucleotide [5].
B. DNA Steganography
The method of hiding secret message inside an
message is known an steganography. Any medium like
message, video or image file can be used for hiding
message. In DNA based steganography, input DNA strands
with the given message could be combined along with a
random secret key DNA molecule, which is concealed
inside another DNA molecule. An original text can be
retrieved using hybridization with the complement of secret
key strands. This method is best suited for large-scale
encryption.
C. DNA Certification
DNA certification deals with the biological character
of DNA. This is widely used in the field of justice, finance
etc. They are used to certify biological individual accuracy.
VIII. CONCLUSION
DNA molecule can hold both feasibility and
applicability of DNA-based Cryptography. A secured DNA
based crypto-graphic algorithms provides multi levels of
security. Some DNA algorithms are provided with
resisting different types of attacks including statistical,
differentia and exhaustive attacks. DNA computation and
its applications are still in the world of reverie and is not
yet been utilized properly. They can also deal with better
performance on data storage and security. Let us hope that
DNA computation and its authen-tication processes will
extend it in future with better perfor-mance for information
storage and security.
REFERENCES
[1] Tushar Mandge, Vijay Choudhary, โ€œA Review on Emerging
Cryptography Technique: DNA Cryptographyโ€ Proceedings pub-
lished in International Journal of Computer Applications, pp 9-13,
2012.
[2] Zhihua Chen, Xiutang Geng, Jin Xu, โ€œEfficient DNA sticker algo-
rithms for DESโ€, IEEE 3rd International Conference on Bio-Inspired
Computing, BICTA08, pp 15-22, 2008.
[3] L. Adleman, Molecular Computation of Solutions to Combinatorial
Problems, Science, vol. 266, pp. 1021-1024, 1994.
[4] R. J. Lipton, Using DNA to solve NP complete problems Science,
Vol. 268, pp. 542-545, 1995.
[5] A. Gehani, T. La Bean, and J. Reif, DNA-based Cryptography, Lec-
ture notes in Computer Science, Springer, 2004
.

More Related Content

Similar to An Survey On DNA Based Cryptography

Ag04602228232
Ag04602228232Ag04602228232
Ag04602228232IJERA Editor
ย 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6sophiabelthome
ย 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyjournalBEEI
ย 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsIRJET Journal
ย 
27 20 dec16 13794 28120-1-sm(edit)genap
27 20 dec16 13794 28120-1-sm(edit)genap27 20 dec16 13794 28120-1-sm(edit)genap
27 20 dec16 13794 28120-1-sm(edit)genapnooriasukmaningtyas
ย 
Report dna
Report dnaReport dna
Report dnaDrAliKMattar
ย 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
ย 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsCSCJournals
ย 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryptionAlexander Decker
ย 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628IJERA Editor
ย 
DNA based computer : present & future
DNA based computer : present & futureDNA based computer : present & future
DNA based computer : present & futureKinjal Mondal
ย 
Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...eSAT Journals
ย 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programmingeSAT Publishing House
ย 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
ย 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY Abhishek Majumdar
ย 
Loss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingLoss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingIJERA Editor
ย 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
ย 
Literature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesLiterature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesRashmi Tank
ย 

Similar to An Survey On DNA Based Cryptography (20)

Ag04602228232
Ag04602228232Ag04602228232
Ag04602228232
ย 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6
ย 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
ย 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
ย 
27 20 dec16 13794 28120-1-sm(edit)genap
27 20 dec16 13794 28120-1-sm(edit)genap27 20 dec16 13794 28120-1-sm(edit)genap
27 20 dec16 13794 28120-1-sm(edit)genap
ย 
Report dna
Report dnaReport dna
Report dna
ย 
C010521418
C010521418C010521418
C010521418
ย 
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORKCLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
CLASSIFICATION OF CANCER BY GENE EXPRESSION USING NEURAL NETWORK
ย 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
ย 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
ย 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
ย 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
ย 
DNA based computer : present & future
DNA based computer : present & futureDNA based computer : present & future
DNA based computer : present & future
ย 
Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...Comparative analysis of dynamic programming algorithms to find similarity in ...
Comparative analysis of dynamic programming algorithms to find similarity in ...
ย 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programming
ย 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
ย 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
ย 
Loss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingLoss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic Coding
ย 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
ย 
Literature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesLiterature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic Techniques
ย 

More from Yasmine Anino

Essay On Shylock
Essay On ShylockEssay On Shylock
Essay On ShylockYasmine Anino
ย 
Short Essay On Swami Vivekananda
Short Essay On Swami VivekanandaShort Essay On Swami Vivekananda
Short Essay On Swami VivekanandaYasmine Anino
ย 
Evaluation Essay Samples
Evaluation Essay SamplesEvaluation Essay Samples
Evaluation Essay SamplesYasmine Anino
ย 
Science Topics For Essays
Science Topics For EssaysScience Topics For Essays
Science Topics For EssaysYasmine Anino
ย 
Essay Environmental Protection
Essay Environmental ProtectionEssay Environmental Protection
Essay Environmental ProtectionYasmine Anino
ย 
College Level Persuasive Essay Topics
College Level Persuasive Essay TopicsCollege Level Persuasive Essay Topics
College Level Persuasive Essay TopicsYasmine Anino
ย 
Free Printable Ice Cream Shaped Writing Templates
Free Printable Ice Cream Shaped Writing TemplatesFree Printable Ice Cream Shaped Writing Templates
Free Printable Ice Cream Shaped Writing TemplatesYasmine Anino
ย 
Outrageous How To Write A Concl
Outrageous How To Write A ConclOutrageous How To Write A Concl
Outrageous How To Write A ConclYasmine Anino
ย 
Free Printable Essay Writing Worksheets - Printable Wo
Free Printable Essay Writing Worksheets - Printable WoFree Printable Essay Writing Worksheets - Printable Wo
Free Printable Essay Writing Worksheets - Printable WoYasmine Anino
ย 
Structure Of An Academic Essay
Structure Of An Academic EssayStructure Of An Academic Essay
Structure Of An Academic EssayYasmine Anino
ย 
Critical Appraisal Example 2020-2022 - Fill And Sign
Critical Appraisal Example 2020-2022 - Fill And SignCritical Appraisal Example 2020-2022 - Fill And Sign
Critical Appraisal Example 2020-2022 - Fill And SignYasmine Anino
ย 
Uva 2023 Supplemental Essays 2023 Calendar
Uva 2023 Supplemental Essays 2023 CalendarUva 2023 Supplemental Essays 2023 Calendar
Uva 2023 Supplemental Essays 2023 CalendarYasmine Anino
ย 
Superhero Writing Worksheet By Jill Katherin
Superhero Writing Worksheet By Jill KatherinSuperhero Writing Worksheet By Jill Katherin
Superhero Writing Worksheet By Jill KatherinYasmine Anino
ย 
Printable Writing Paper Vintage Christmas Holly B
Printable Writing Paper Vintage Christmas Holly BPrintable Writing Paper Vintage Christmas Holly B
Printable Writing Paper Vintage Christmas Holly BYasmine Anino
ย 
Good Personal Reflective Essay
Good Personal Reflective EssayGood Personal Reflective Essay
Good Personal Reflective EssayYasmine Anino
ย 
Position Paper Mun Examples - Position Paper
Position Paper Mun Examples - Position PaperPosition Paper Mun Examples - Position Paper
Position Paper Mun Examples - Position PaperYasmine Anino
ย 
Hook C Lead C Attention Grabber Beginning An Ess
Hook C Lead C Attention Grabber Beginning An EssHook C Lead C Attention Grabber Beginning An Ess
Hook C Lead C Attention Grabber Beginning An EssYasmine Anino
ย 
Princess Themed Writing Paper Teaching Resources
Princess Themed Writing Paper Teaching ResourcesPrincess Themed Writing Paper Teaching Resources
Princess Themed Writing Paper Teaching ResourcesYasmine Anino
ย 
How To Write Essays Faster - CIPD Students Help
How To Write Essays Faster - CIPD Students HelpHow To Write Essays Faster - CIPD Students Help
How To Write Essays Faster - CIPD Students HelpYasmine Anino
ย 
Research Paper Step By Step Jfk Research Paper Outline Researc
Research Paper Step By Step  Jfk Research Paper Outline  ResearcResearch Paper Step By Step  Jfk Research Paper Outline  Researc
Research Paper Step By Step Jfk Research Paper Outline ResearcYasmine Anino
ย 

More from Yasmine Anino (20)

Essay On Shylock
Essay On ShylockEssay On Shylock
Essay On Shylock
ย 
Short Essay On Swami Vivekananda
Short Essay On Swami VivekanandaShort Essay On Swami Vivekananda
Short Essay On Swami Vivekananda
ย 
Evaluation Essay Samples
Evaluation Essay SamplesEvaluation Essay Samples
Evaluation Essay Samples
ย 
Science Topics For Essays
Science Topics For EssaysScience Topics For Essays
Science Topics For Essays
ย 
Essay Environmental Protection
Essay Environmental ProtectionEssay Environmental Protection
Essay Environmental Protection
ย 
College Level Persuasive Essay Topics
College Level Persuasive Essay TopicsCollege Level Persuasive Essay Topics
College Level Persuasive Essay Topics
ย 
Free Printable Ice Cream Shaped Writing Templates
Free Printable Ice Cream Shaped Writing TemplatesFree Printable Ice Cream Shaped Writing Templates
Free Printable Ice Cream Shaped Writing Templates
ย 
Outrageous How To Write A Concl
Outrageous How To Write A ConclOutrageous How To Write A Concl
Outrageous How To Write A Concl
ย 
Free Printable Essay Writing Worksheets - Printable Wo
Free Printable Essay Writing Worksheets - Printable WoFree Printable Essay Writing Worksheets - Printable Wo
Free Printable Essay Writing Worksheets - Printable Wo
ย 
Structure Of An Academic Essay
Structure Of An Academic EssayStructure Of An Academic Essay
Structure Of An Academic Essay
ย 
Critical Appraisal Example 2020-2022 - Fill And Sign
Critical Appraisal Example 2020-2022 - Fill And SignCritical Appraisal Example 2020-2022 - Fill And Sign
Critical Appraisal Example 2020-2022 - Fill And Sign
ย 
Uva 2023 Supplemental Essays 2023 Calendar
Uva 2023 Supplemental Essays 2023 CalendarUva 2023 Supplemental Essays 2023 Calendar
Uva 2023 Supplemental Essays 2023 Calendar
ย 
Superhero Writing Worksheet By Jill Katherin
Superhero Writing Worksheet By Jill KatherinSuperhero Writing Worksheet By Jill Katherin
Superhero Writing Worksheet By Jill Katherin
ย 
Printable Writing Paper Vintage Christmas Holly B
Printable Writing Paper Vintage Christmas Holly BPrintable Writing Paper Vintage Christmas Holly B
Printable Writing Paper Vintage Christmas Holly B
ย 
Good Personal Reflective Essay
Good Personal Reflective EssayGood Personal Reflective Essay
Good Personal Reflective Essay
ย 
Position Paper Mun Examples - Position Paper
Position Paper Mun Examples - Position PaperPosition Paper Mun Examples - Position Paper
Position Paper Mun Examples - Position Paper
ย 
Hook C Lead C Attention Grabber Beginning An Ess
Hook C Lead C Attention Grabber Beginning An EssHook C Lead C Attention Grabber Beginning An Ess
Hook C Lead C Attention Grabber Beginning An Ess
ย 
Princess Themed Writing Paper Teaching Resources
Princess Themed Writing Paper Teaching ResourcesPrincess Themed Writing Paper Teaching Resources
Princess Themed Writing Paper Teaching Resources
ย 
How To Write Essays Faster - CIPD Students Help
How To Write Essays Faster - CIPD Students HelpHow To Write Essays Faster - CIPD Students Help
How To Write Essays Faster - CIPD Students Help
ย 
Research Paper Step By Step Jfk Research Paper Outline Researc
Research Paper Step By Step  Jfk Research Paper Outline  ResearcResearch Paper Step By Step  Jfk Research Paper Outline  Researc
Research Paper Step By Step Jfk Research Paper Outline Researc
ย 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
ย 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
ย 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
ย 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
ย 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
ย 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
ย 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
ย 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
ย 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
ย 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
ย 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
ย 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
ย 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
ย 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
ย 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
ย 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
ย 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
ย 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
ย 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
ย 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
ย 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
ย 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
ย 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
ย 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ย 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
ย 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
ย 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
ย 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
ย 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
ย 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
ย 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
ย 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
ย 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
ย 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
ย 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
ย 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
ย 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
ย 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
ย 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ย 

An Survey On DNA Based Cryptography

  • 1. Proceedings of 2018 Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR) 978-1-5386-5744-7/18/$31.00ยฉ2018 IEEE 1 An Survey on DNA Based Cryptography Bonny B Raj Department of Computer Science and Engineering HITS, Chennai, Tamilnadu, India bonny.renjith@gmail.com Abstract - Information Security play a vital issue in todayโ€™s life. In this paper DNA is used as an information carrier. DNA cryptography is an upcoming technology, which combines bio- logical information and data security. They provide wide range of extraordinary parallelism, exceptional energy efficiency, storing and computing capabilities. This paper presents a re- view on DNA Cryptographic approaches, highlights the merits and demerits of each one. Keywords - Biological Information, DNA Cryptography, Information security, Information Technology. I. INTRODUCTION Security threats are increasing day by day due to the information flow in network .The most confidential infor-mation such as business records, health records and private information should be broadcasted via a public transmission media with extreme care. The security of these information involves an enormous threats by an unintentional recipient. Cryptography helps us in ensuring protection of such data. Cryptographic methods provide transmission of data with secure storing of data across channels so that it can be un-derstood only by the intended receiver. Many algorithms have been developed for the purpose of encrypting the in-formation or data. II. CRYPTOGRAPHIC ASPECTS Cryptography is concerned with four major aspects. They include: A. Confidentiality It deals with protecting data from unauthorized us- ers. B. Integrity Receiving data without any kind of alteration. C. Non repudiation Sender cannot stop sending data. D. Authentication Confirms that data is coming from right person. III. DNA DNA stands for De-oxyribo nucleic acid is a thread like V Ceronmani Sharmila Department of Information Technology HITS, Chennai, Tamilnadu, India csharmila@hindustanuniv.ac.in chain of molecules known as nucleic acid. They are used for transmitting genetic instructions which in turn is used in growth, development, functioning and reproduction of all Fig. 1 Structure of DNA living organism [1]. This intricate design of the organism includes human organ that are the outcome of assigning cer-tain procedure to the virgin message which in turn will be encoded in a DNA sequences which is termed as genes. Further these complicated mathematical operations are subjected to basic additions and subtractions. One of the major advantage of DNA molecule is that it is a combination of four bases, Adenine (A), Thiamine (T), Guanine (G) and Cytosine (C).These four bases combines in different order to form Purines (Guanine and Adenine combinations) and Py-rimidines (Thymine and Cytosine combinations). These bi-strands of DNA molecules are anti parallel and they can moves in the reverse directions. This complementary adds up DNA with a different data pattern for computing and may be used in different aspects. Fig. 1 shows the structure of DNA. IV. DNA CRYPTOGRAPHY AND COMPUTING DNA Computing and Cryptography concept has emerged from computational ability of De-oxyribo Nucleic Acid (DNA). It is a cryptographic branch of biological sci- ence which make use of computing more complex to the unauthorized user [2]. A. Operations on DNA DNA molecules are helpful in solving computational and mathematical problems with the help of different biological operations which can be summarized as : 1) Hybridization: In this method two numbers of single stranded DNA molecules are combined together to form a double stranded DNA molecule. 2) Denaturation: This is the method of separating dou-ble stranded molecule to two separate single stranded DNA. 3) Litigation: This is a method of combing two double stranded DNA sequence to a new double stranded DNA sequence.
  • 2. Proceedings of 2018 Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR) 2 4) Polymerase Chain Reaction: A Polymerase chain re- action or simply PCR is a molecular biological application method for amplifying a single copy or a few copies of a piece of DNA molecule across several orders of degree, generat- ing thousands or millions of copies of a specific DNA combi- nations. 5) Gel Electrophoresis: A Gel Electrophoresis is a process of separating DNA molecules located in the gel. Here gel is used as a filter. Electrophoresis refers to the push of DNA strands through the gel filter. This can be done with the help of a electrophoresis box by applying electricity, where it moves DNA. Short strands move quickly where as longer strands moves slowly through the holes of gel. Strands with equal length move with uniform speed and ends ups successively and thus the DNA threads gets sort by themselves. V. BASIC TERMINOLOGIES IN DNA Some fundamental biological terms which is commonly used in DNA Computation and Cryptography are listed as follows: A. Codons Codons are combinations of tri-bases of nucleotide in the form of a triplet. B. Genes Genes act as the functioning units of DNA molecules. An individual gene consist of definite sets of data or encod- ing of a definite protein or particular process. They can be coded or non-coded sequences. The coded sequences are known by the term Exons and non-coded sequences as In- trons. C. Chromosome Chromosomes are huge DNA structures which is coiled over protein molecules, that includes genes, other regulative elements and sequences of nucleotides. In other words chromosomes may be a long strings of genes. D. Genome Genome are specific combinations of being which in-clude genes, chromosome, nucleotides and DNA of a living cell. The fundamental techniques used in DNA Encryption are DNA digital coding and PCR Amplification [3]. VI. DNA DIGITAL ENCODING DNA digital encoding is a method of aligning DNA molecules. They act a major role in encryption and decryp-tion of data. We cannot use DNA molecule as alphabets for computation purpose, for this they make use of the approach BCD or binary digital coding, that encode the combinations as 1โ€™s and 0โ€™s. DNA encoding can be done on the basis of four nucleotide bases A, C, T and G. These four bit subunits TABLE I DNA DIGITAL ENCODING Encoding DNA Nucleotide Decimal Value Binary Value A 0 00 C 1 01 T 2 10 G 3 11 of DNA molecule are then converted into two bit binary val- ues as A as 0 [00], T as 1 [01], C as 2 [10], G as 3 [11] as shown in the table 1. DNA digital encoding is a method of aligning DNA molecules. They act a major role in encryption and decryption of data. We cannot use DNA molecule as alphabets for computation purpose, for this they make use of the approach BCD or binary digital coding, that encode the combinations as 1โ€™s and 0โ€™s. DNA encoding can be done on the basis of four nucleotide bases A, C, T and G. These four bit subunits of DNA molecule are then converted into two bit binary values as A as 0 [00], T as 1 [01], C as 2 [10], G as 3 [11] as shown in the Table I. Suppose the plain text is โ€œABCโ€ initial step of this pro-cess is to convert each characteristic to its corresponding ASCII value (A=65, B=66). Then they are converted to its binary value (the sequences of bits 0โ€™s and 1โ€™s will be 65= 1000001 and 66=1000010, and it will be mapped to ACTG combinations using the table1 as TAAGAAT and the data is ready for encryption. Along with DNA digital encoding fur-ther encryption methods can be included for making it more secure like PCR Amplification process. VII. PCR AMPLIFICATION PCR stands for polymer chain reaction which hold the bio-molecular method of DNA Amplification which is placed on the Watson-crick complementary model. Here two pri-mers are coded with a DNA sequences. Primers are small units of DNA. The two primer combinations can be passed on as the key for the PCR Amplification Process [4].PCR Amplification is shown in the Fig. 2. The original information can be positioned securely be-tween the two primers for encoding them into a new se-quence. The resultant message is very difficult to amplify if the PCR primers are unknown. Different length primers will generate different results, so correctness of primers are very important in this process. Biological PCR operations are as follows: A. Step 1- Denaturation PCR Amplification is considered as the first step of de- naturation, here a dual stranded molecule can be separated into two single stranded DNA molecule. This fragment can be again heated up to 94 to 95 degree for one to few minutes to denature or to get separated as double stranded molecule to single strand.
  • 3. Proceedings of 2018 Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR) 3 Fig. 2 Polymer Chain Reaction B. Step 2- Primer Annealing In Primer Annealing the temperature is reduced to 50 to 65 degree for one to few minutes so that the primer get at- tached to the corresponding complementary pairs. These primers are structured to strengthen the DNA region. C. Step 3- Primer Extension Here the temperature can be increased to 72 degree for one to few minutes. Thus polymer enzyme will add nucleo-tides to the strands of shorter primers on original DNA strands, here by amplifying the DNA strands between the primers. VII. DNA ENCODING METHODS DNA Digital encoding and PCR methods are the most commonly used encryption techniques in DNA based Cryp-tography. In addition to this the other few techniques, they include: A. DNA Chip Based DNA chips and micro-arrays have opened a new way for doing research. DNA chip based technology is best suit-ed for storing and handling biological information. They can support wide range of manipulation of genome sequence. Such DNA Chip consist of numerous ports which is embed-ded in a solid surface, commonly a glass slide. Here each spot consist of a large number of ports, which are nucleo-tides sequence capable of binding complementary nucleotide [5]. B. DNA Steganography The method of hiding secret message inside an message is known an steganography. Any medium like message, video or image file can be used for hiding message. In DNA based steganography, input DNA strands with the given message could be combined along with a random secret key DNA molecule, which is concealed inside another DNA molecule. An original text can be retrieved using hybridization with the complement of secret key strands. This method is best suited for large-scale encryption. C. DNA Certification DNA certification deals with the biological character of DNA. This is widely used in the field of justice, finance etc. They are used to certify biological individual accuracy. VIII. CONCLUSION DNA molecule can hold both feasibility and applicability of DNA-based Cryptography. A secured DNA based crypto-graphic algorithms provides multi levels of security. Some DNA algorithms are provided with resisting different types of attacks including statistical, differentia and exhaustive attacks. DNA computation and its applications are still in the world of reverie and is not yet been utilized properly. They can also deal with better performance on data storage and security. Let us hope that DNA computation and its authen-tication processes will extend it in future with better perfor-mance for information storage and security. REFERENCES [1] Tushar Mandge, Vijay Choudhary, โ€œA Review on Emerging Cryptography Technique: DNA Cryptographyโ€ Proceedings pub- lished in International Journal of Computer Applications, pp 9-13, 2012. [2] Zhihua Chen, Xiutang Geng, Jin Xu, โ€œEfficient DNA sticker algo- rithms for DESโ€, IEEE 3rd International Conference on Bio-Inspired Computing, BICTA08, pp 15-22, 2008. [3] L. Adleman, Molecular Computation of Solutions to Combinatorial Problems, Science, vol. 266, pp. 1021-1024, 1994. [4] R. J. Lipton, Using DNA to solve NP complete problems Science, Vol. 268, pp. 542-545, 1995. [5] A. Gehani, T. La Bean, and J. Reif, DNA-based Cryptography, Lec- ture notes in Computer Science, Springer, 2004 .