SlideShare a Scribd company logo
DNA BASED CRYPTOGRAPHYAND
AUTHENTICATION SYSTEM
Project Guide : Mrs.Thasleena V
Presented By :GROUP 1
ABDUL RASHEED (CEALEIT002)
1
INTRODUCTION
 Data security and cryptography are important aspects of conventional
computing.
 The aim of our project is to design DNA based cryptography and
authentication which is a novel approach to ensure highly secure
environment for transmission of data across networks.
2
3
 Cryptography is the process of scrambling the original text by rearranging and
substituting the original text, arranging it in a seemingly unreadable format for
others. Two types of cryptography are:
 Symmetric encryption
 Symmetric encryption is a single key encryption and also known as
conventional encryption. The symmetric encryption algorithm
generally uses the same key for “encryption” and “decryption”.
 Asymmetric encryption
 Asymmetric encryption is also known as “Public key encryption”. In
asymmetric encryption, the encryption and decryption will be done by
two different keys.
LITERATURE SURVEY
4
 DNA cryptography is First introduced by L. Adleman in 1990s in which
Plaintext message Encoded into DNA sequences.
 DNA sequence : Order of nucleotide bases in the DNA molecule.
ATTAGCCTTATGCATGAACC
 Gehani et. al., introduced the first trial of DNA based Cryptography in which a
substitution method using libraries of distinct one time pads, each of which
defines a specific, randomly generated, pair-wise mapping and an XOR scheme
utilizing molecular computation and indexed, random key strings are used for
encryption .
LITERATURE SURVEY (Cont.)
5
 Leier et. al. presented two different cryptographic approaches based on DNA binary
strands with the idea that a potential interceptor cannot distinguish between dummies
and message strand . The first approach hid information in DNA binary strands and
the second designed a molecular checksum.
 Decryption is done using PCR and subsequent gel electrophoresis.
LITERATURE SURVEY (Cont.)
6
SURVEY COMPARISON REPORT
S.
No
METHODS ADVANTAGE DISADVANTAGE
1 DNA based
implementation of
YAEA encryption
algorithm[2006]
•Real message is not
transferred over network.
•Scalable for large digital
information products.
•Size of plain text
increases the
encryption and
decryption time.
2 DNA encryption
based on matrix
manipulation.[2008]
•Always get new cipher
data from same plain text.
•It include only basic
operation and security
only depends on key.
3 Encryption scheme
using DNA
technology.[2008]
•Prevent attack from a
possible word as PCR
primers.
•Cost of encryption is
low.
•Security can depend
only on decryption
key.
7
• Jin-Shiuh Taur Proposed a way referred to as Table Lookup Substitution
methodology (TLSM) that might double the capability of message activity.
The key plan of the TLSM is to increase the 1-bit complementary rule into
a 2-bit rule table so every conversion of letters will represent 2 bits of the
secret message.
• Cheng Guo, Shiu Proposed the hiding procedure substitutes another letter
for an existing letter on a special location set by the algorithm. The
embedding algorithm encompasses a conversion operates that converts a
given letter with a selected letter outlined by the complementary rule.
EXISTING SYSTEM
8
 Kritika Gupta and Shailendra Singh Projected a DNA Based Cryptological
Techniques for an encryption algorithm based on OTP (one-time-pad) that
involve data encryption using traditional mathematical operations and/or data
manipulating DNA techniques.
 Guangzhao Cui, Limin Qin, Yanfeng Wang, Xuncai Zhang Proposed a secrete
writing theme by exploitation the technologies of DNA synthesis, PCR
amplification and DNA digital secrete writing
EXISTING SYSTEM (Cont.)
PROPOSED SYSTEM
9
 This project aims at providing an efficient solution for secured data
transmission both across a local area network and also via internet.
 The advantages of the proposed system are:
 Unbreakable security by taking the advantage of DNA based encryption.
 Double layer of encryption implementing RSA algorithm along with
DNA based cryptography.
 The type of data which we consider includes:
 Message send across a LAN
 E-mail using Gmail server
 All types of file encryption
10
 The binary data, text or image, is used under the form of ASCII code .
 These numbers are then grouped in blocks and encrypted in using a
traditional method (eg. DES, will form a 2 level encryption).
 This encoded message is then changed to binary format.
 Then these digits are grouped into two and substituted as A for 00, T for
01, G for 10, and C for 11.
 We then fit the primers on either side of this message. Primers will act
as stoppers and detectors for the message. This has to be given to the
receiver prior to the communication.
 This message is followed by our own DNA sequence followed by
another stopper/primer.
 This message is then flanked by many sequences of DNA or by
confining it to a microdot in the micro- array.
PROPOSED SYSTEM (Cont.)
MODULES IN THE SYSTEM
11
 User registration.
It deals with the user interactions. A user has to create his own
account to use the software. He is asked to enter certain details that would
be stored into a database. When he tries to login, the verification process is
done to provide access.
 Message service.
This service is provided to the authenticated user. He can send and
receive messages across the connected LAN. Whether to encrypt the text or
not must be decided by the user. The input given by the user is just the
recipient address, subject and the message text. It will be sent to the
corresponding user connected within the LAN.
 Email service.
This module deals with services related to sending and receiving of
mails. User has to configure the mail settings by defining the incoming and
outgoing mail servers.
MODULES IN THE SYSTEM
12
 Encryption
The process of DNA encryption is explained here. The plaintext is sent
to the encryption process and it is lead through a no: of steps to produce the
DNA encrypted form.
 Decryption
Here the process of encryption is just reversed to retrieve the plain text.
The encrypted ambiguity sequence is first encrypted using RSA to retrieve the
real key sequence. Then, using this key the amino sequence is decrypted to
get the ATGC sequence. This is converted to binary, then corresponding
ASCII values are taken and finally, the plaintext is retrieved.
Hardware and Software Requirements
13
 Hardware Requirements
 Processor - Intel Pentium IV or above
 RAM - 512 MB or above
 Hard Disk Drive - 40GB or above
 Software Requirements
 Operating System - Windows XP or above
 IDE – Net Beans version 6.9.1 or above
 Database - MySQL Database Server 4.0 or above
 Programming Language – Java
DATA FLOW DIAGRAM
 User Registration
14
DATA FLOW DIAGRAM(Cont.)
 Messaging Service
15
DATA FLOW DIAGRAM(Cont.)
16
 Mail Service
DATA FLOW DIAGRAM(Cont.)
17
 File Encryption
DATA FLOW DIAGRAM(Cont.)
18
 File Decryption
SCREENSHOTS
19
20
SCREENSHOTS
21
SCREENSHOTS
22
SCREENSHOTS
23
SCREENSHOTS
CONCLUSION
24
 Message encryption using DNA sequence is a very new technique still
evolving and tried out for secure transmission and reception of hidden
messages.
 Provide Authentication property using Digital Signature .
 Add function that will detect Modification of message.
25
 RS Dhawan and Alice(2012). A new DNA Encryption technique for secure
data transmission. Research Scholar , Kurukshetera University, Haryana,
India.
 Guangzhao Cui , Cuiling Li , Haobin Li , Xiaoguang Li (2009). DNA
computing and its application to information security field. Research
ScholarHenan key Lab of information-based Electrical Application ,
Zhengzhou 450002.
 Pankaj Rakheja(2012). Integrating DNA computing in international data
encryption Algorithm(IDEA). Deep Institute of Engineering and
Technology, Haryana, India.
 Abdullah Al Mueen & Md. Nurul Amin Applications of Graphs in
Bioinformatics pp.16-50, 2006
REFERENCES
THANK YOU
26

More Related Content

What's hot

AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Product Cipher
Product CipherProduct Cipher
Product Cipher
SHUBHA CHATURVEDI
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Cryptography
CryptographyCryptography
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
FellowBuddy.com
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
chauhankapil
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
CheapSSLsecurity
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
IP Security
IP SecurityIP Security
IP Security
Dr.Florence Dayana
 

What's hot (20)

AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Product Cipher
Product CipherProduct Cipher
Product Cipher
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Cryptography
CryptographyCryptography
Cryptography
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Hash Function
Hash FunctionHash Function
Hash Function
 
IP Security
IP SecurityIP Security
IP Security
 

Viewers also liked

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
Abhishek Majumdar
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...
Sajedul Karim
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
Thomas George C
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
Praveen Kumar Donta
 
Major project presentation
Major project presentationMajor project presentation
Major project presentation
Shubham Khandelwal
 
Dfd examples
Dfd examplesDfd examples
Dfd examples
Mohit
 
4º Civilización U11º VA: Comercio internacional
4º Civilización U11º VA: Comercio internacional4º Civilización U11º VA: Comercio internacional
4º Civilización U11º VA: Comercio internacional
ebiolibros
 
DNA Encoding Protocol
DNA Encoding ProtocolDNA Encoding Protocol
DNA Encoding Protocol
amitsnyderman
 
Data collection
Data collectionData collection
Social messenger introduction
Social messenger introductionSocial messenger introduction
Social messenger introduction
deepakrajput022
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
Md. Al-Amin Khandaker Nipu
 
Socket programing
Socket programingSocket programing
Socket programing
Pankil Agrawal
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
Omkar Salunke
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
lockyerj
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
IOSR Journals
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
IDES Editor
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
Alexander Decker
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
Aboul Ella Hassanien
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
richaria
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
Naveena N
 

Viewers also liked (20)

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
Major project presentation
Major project presentationMajor project presentation
Major project presentation
 
Dfd examples
Dfd examplesDfd examples
Dfd examples
 
4º Civilización U11º VA: Comercio internacional
4º Civilización U11º VA: Comercio internacional4º Civilización U11º VA: Comercio internacional
4º Civilización U11º VA: Comercio internacional
 
DNA Encoding Protocol
DNA Encoding ProtocolDNA Encoding Protocol
DNA Encoding Protocol
 
Data collection
Data collectionData collection
Data collection
 
Social messenger introduction
Social messenger introductionSocial messenger introduction
Social messenger introduction
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
 
Socket programing
Socket programingSocket programing
Socket programing
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
 

Similar to DNA based Cryptography_Final_Review

Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
IRJET Journal
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
IJNSA Journal
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
IJERA Editor
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
IJERA Editor
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
Sajedul Karim
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
ChandniA5
 
C010521418
C010521418C010521418
C010521418
IOSR Journals
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
Rajesh Ishida
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
Ayanda Demilade
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
IJECEIAES
 
J017667582
J017667582J017667582
J017667582
IOSR Journals
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
IJERA Editor
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 

Similar to DNA based Cryptography_Final_Review (20)

Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
C010521418
C010521418C010521418
C010521418
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 

DNA based Cryptography_Final_Review

  • 1. DNA BASED CRYPTOGRAPHYAND AUTHENTICATION SYSTEM Project Guide : Mrs.Thasleena V Presented By :GROUP 1 ABDUL RASHEED (CEALEIT002) 1
  • 2. INTRODUCTION  Data security and cryptography are important aspects of conventional computing.  The aim of our project is to design DNA based cryptography and authentication which is a novel approach to ensure highly secure environment for transmission of data across networks. 2
  • 3. 3  Cryptography is the process of scrambling the original text by rearranging and substituting the original text, arranging it in a seemingly unreadable format for others. Two types of cryptography are:  Symmetric encryption  Symmetric encryption is a single key encryption and also known as conventional encryption. The symmetric encryption algorithm generally uses the same key for “encryption” and “decryption”.  Asymmetric encryption  Asymmetric encryption is also known as “Public key encryption”. In asymmetric encryption, the encryption and decryption will be done by two different keys. LITERATURE SURVEY
  • 4. 4  DNA cryptography is First introduced by L. Adleman in 1990s in which Plaintext message Encoded into DNA sequences.  DNA sequence : Order of nucleotide bases in the DNA molecule. ATTAGCCTTATGCATGAACC  Gehani et. al., introduced the first trial of DNA based Cryptography in which a substitution method using libraries of distinct one time pads, each of which defines a specific, randomly generated, pair-wise mapping and an XOR scheme utilizing molecular computation and indexed, random key strings are used for encryption . LITERATURE SURVEY (Cont.)
  • 5. 5  Leier et. al. presented two different cryptographic approaches based on DNA binary strands with the idea that a potential interceptor cannot distinguish between dummies and message strand . The first approach hid information in DNA binary strands and the second designed a molecular checksum.  Decryption is done using PCR and subsequent gel electrophoresis. LITERATURE SURVEY (Cont.)
  • 6. 6 SURVEY COMPARISON REPORT S. No METHODS ADVANTAGE DISADVANTAGE 1 DNA based implementation of YAEA encryption algorithm[2006] •Real message is not transferred over network. •Scalable for large digital information products. •Size of plain text increases the encryption and decryption time. 2 DNA encryption based on matrix manipulation.[2008] •Always get new cipher data from same plain text. •It include only basic operation and security only depends on key. 3 Encryption scheme using DNA technology.[2008] •Prevent attack from a possible word as PCR primers. •Cost of encryption is low. •Security can depend only on decryption key.
  • 7. 7 • Jin-Shiuh Taur Proposed a way referred to as Table Lookup Substitution methodology (TLSM) that might double the capability of message activity. The key plan of the TLSM is to increase the 1-bit complementary rule into a 2-bit rule table so every conversion of letters will represent 2 bits of the secret message. • Cheng Guo, Shiu Proposed the hiding procedure substitutes another letter for an existing letter on a special location set by the algorithm. The embedding algorithm encompasses a conversion operates that converts a given letter with a selected letter outlined by the complementary rule. EXISTING SYSTEM
  • 8. 8  Kritika Gupta and Shailendra Singh Projected a DNA Based Cryptological Techniques for an encryption algorithm based on OTP (one-time-pad) that involve data encryption using traditional mathematical operations and/or data manipulating DNA techniques.  Guangzhao Cui, Limin Qin, Yanfeng Wang, Xuncai Zhang Proposed a secrete writing theme by exploitation the technologies of DNA synthesis, PCR amplification and DNA digital secrete writing EXISTING SYSTEM (Cont.)
  • 9. PROPOSED SYSTEM 9  This project aims at providing an efficient solution for secured data transmission both across a local area network and also via internet.  The advantages of the proposed system are:  Unbreakable security by taking the advantage of DNA based encryption.  Double layer of encryption implementing RSA algorithm along with DNA based cryptography.  The type of data which we consider includes:  Message send across a LAN  E-mail using Gmail server  All types of file encryption
  • 10. 10  The binary data, text or image, is used under the form of ASCII code .  These numbers are then grouped in blocks and encrypted in using a traditional method (eg. DES, will form a 2 level encryption).  This encoded message is then changed to binary format.  Then these digits are grouped into two and substituted as A for 00, T for 01, G for 10, and C for 11.  We then fit the primers on either side of this message. Primers will act as stoppers and detectors for the message. This has to be given to the receiver prior to the communication.  This message is followed by our own DNA sequence followed by another stopper/primer.  This message is then flanked by many sequences of DNA or by confining it to a microdot in the micro- array. PROPOSED SYSTEM (Cont.)
  • 11. MODULES IN THE SYSTEM 11  User registration. It deals with the user interactions. A user has to create his own account to use the software. He is asked to enter certain details that would be stored into a database. When he tries to login, the verification process is done to provide access.  Message service. This service is provided to the authenticated user. He can send and receive messages across the connected LAN. Whether to encrypt the text or not must be decided by the user. The input given by the user is just the recipient address, subject and the message text. It will be sent to the corresponding user connected within the LAN.  Email service. This module deals with services related to sending and receiving of mails. User has to configure the mail settings by defining the incoming and outgoing mail servers.
  • 12. MODULES IN THE SYSTEM 12  Encryption The process of DNA encryption is explained here. The plaintext is sent to the encryption process and it is lead through a no: of steps to produce the DNA encrypted form.  Decryption Here the process of encryption is just reversed to retrieve the plain text. The encrypted ambiguity sequence is first encrypted using RSA to retrieve the real key sequence. Then, using this key the amino sequence is decrypted to get the ATGC sequence. This is converted to binary, then corresponding ASCII values are taken and finally, the plaintext is retrieved.
  • 13. Hardware and Software Requirements 13  Hardware Requirements  Processor - Intel Pentium IV or above  RAM - 512 MB or above  Hard Disk Drive - 40GB or above  Software Requirements  Operating System - Windows XP or above  IDE – Net Beans version 6.9.1 or above  Database - MySQL Database Server 4.0 or above  Programming Language – Java
  • 14. DATA FLOW DIAGRAM  User Registration 14
  • 15. DATA FLOW DIAGRAM(Cont.)  Messaging Service 15
  • 24. CONCLUSION 24  Message encryption using DNA sequence is a very new technique still evolving and tried out for secure transmission and reception of hidden messages.  Provide Authentication property using Digital Signature .  Add function that will detect Modification of message.
  • 25. 25  RS Dhawan and Alice(2012). A new DNA Encryption technique for secure data transmission. Research Scholar , Kurukshetera University, Haryana, India.  Guangzhao Cui , Cuiling Li , Haobin Li , Xiaoguang Li (2009). DNA computing and its application to information security field. Research ScholarHenan key Lab of information-based Electrical Application , Zhengzhou 450002.  Pankaj Rakheja(2012). Integrating DNA computing in international data encryption Algorithm(IDEA). Deep Institute of Engineering and Technology, Haryana, India.  Abdullah Al Mueen & Md. Nurul Amin Applications of Graphs in Bioinformatics pp.16-50, 2006 REFERENCES