SlideShare a Scribd company logo
Anup R. Nimje / International Journal of Engineering Research and Applications (IJERA)
  ISSN: 2248-9622 www.ijera.com Vol. 2, Issue5, September- October 2012, pp.1358-1359

         Cryptography In Cloud-Security Using DNA (Genetic)
                            Techniques
                                            Anup R. Nimje*
     *(Student of Master Of Engineering, Computer Engineering, College Of Engineering and Technology,
                                                Amravati)


ABSTRACT
         The security concerns would be still           DNA cryptography. Using Chip Based Micro array
there in cloud systems. Cryptography consists of        technology.
the encryption-decryption techniques. There are
many schemes, algorithms those can be used for          III. CONCEPT
security purposes. DNA is now mostly a                            The chip-based micro-array technology,
theoretical concept but if implemented in future        and can be generally expressed below [1]:
would be providing most strong and secure               Encryption: Plaintext to cipher text conversion:
system. In this paper it has been proposed that         1. DNA structure has two strands. Take one or
DNA cryptographic algorithms are adopted for                more input DNA strands it can be considered to
the optimization of data security in cloud                  be the plaintext message.
security. So that cloud system would be most            2. Append to them one or more randomly
secure.                                                     constructed “secret key” strands.
                                                        3. Resulting “tagged plaintext” DNA strands are
Keywords – Cipher text, Decryption, DNA,                    hidden by mixing them within many other
Encryption, Key, Plaintext, Proteins, Strands.              additional “distracter” DNA strands which might
                                                            also be constructed by random assembly.
I. INTRODUCTION                                         Decryption: Recovery of plaintext from cipher text:
          In Cloud computing security mechanisms        1. Given knowledge of the “secret key” strands.
would be a challenge. The most serious concerns are     2. Resolution of DNA strands can be decrypted by a
the possibility of lack of confidentiality, integrity      number of possible known recombinant DNA
and authentication among the cloud users and               separation methods: Plaintext message strands
service providers. The key intent of this research         may be separated out by hybridization with the
paper is to represent a new techniques for security        complements of the “secret key” strands might be
schemes and to ensure data confidentiality, integrity      placed in solid support on magnetic beads or on a
and authentication.                                        prepared surface.
          In this paper it has been proposed that                 This process is used in 2D image
DNA cryptographic algorithms are adopted for the        encryption. They also suggested the use of DNA
optimization of data security in cloud computing.       computing on steganography. The method with
 DNA can be used in cryptography for storing and        improved security is also suggested by researchers.
transmitting the information, as well as for            [2]
computation. Although in its primitive stage, DNA                 It is easy to see that DNA computing is just
cryptography is shown to be very effective.             classical computing, highly parallelized and mass
Theoretical analysis should be performed before its     storage. Thus the idea of this form of DNA
real applications, because it requires high tech lab    computing is at great risk in the field of
requirements and computational limitations, as well     cryptography. Also, such technology is very hard to
as the labor intensive extrapolation means so far.      use outside laboratories currently, both getting the
These make the efficient use of DNA cryptography        DNA strands, and extracting the results.
difficult in the security world now.                    Generally, such a scheme can be formulated as
          The concept of DNA cryptography is for        below (M and C are for plaintext and cipher text,
very powerful and unbreakable encryption                respectively) [2]
technology. That can be used in systems.                          Encryption key E1 = (the starting and
                                                        pattern codes of the introns, the places of the
II. LITERATURE REVIEW                                   introns)
         The research paper that helped in              Encryption key E2 = (the codon-amino acids
understanding      the    concepts   about    DNA       mapping)
cryptography. DNA-Based Cryptography by Ashish          Decryption key D1 = E2
Gehani, Thomas LaBean, and John Reif. This paper        Decryption key D2 = E1
explains the basic or fundamental approach about        C’ = E1 (M), C = E2 (C’)
                                                        M’ = D1(C), M = D2 (M’)



                                                                                            1358 | P a g e
Anup R. Nimje / International Journal of Engineering Research and Applications (IJERA)
  ISSN: 2248-9622 www.ijera.com Vol. 2, Issue5, September- October 2012, pp.1358-1359




The scheme is principally a symmetric key                 language. The hardware implementation can be easy
algorithm, except that the sender initially has only      based on these simple principles, and it can also be
part of the keys, and he generates the rest part of the   very efficient. With today’s advanced hardware
keys. It is obvious that such a scheme is essentially a   technology, the multiple rounds can be easily
2 step substitution process, though                       implemented, and the security can be relatively
they are substitutions in a general sense (not letter-    reasonable. These benefits show that this method is
by-letter substitution).                                  very suitable for software and hardware
          The DNA cryptography method that we             implementation. The further analysis and
have proposed is not constraint to the encryption         experiments on these factors is very interesting
and decryption area, but also such areas like             topics in the future works. As this technique would
massage authentication. Indeed, the encryption            be implemented for confidentiality, integrity and
process of the method can be very powerful and            authentication in cloud systems.
more effective if it is used as a hash function for
generating message authentication code (MAC). By          ACKNOWLEDGEMENTS
this means, only the initial key is needed, and the                Author is thankful to all of the professors
encryption process can be fast. If multiple rounds        and colleagues who helped directly or indirectly for
are used, the security may also be satisfactory.          working on this paper.
The problem is that the length of the resulting MAC
is hard to control, and one of the solutions to this      REFERENCES
problem is to do multiple round of the process,             [1]   DNA-Based Cryptography by Ashish
together with padding to get the MAC with fix                     Gehani, Thomas LaBean, and John Reif.
length. If using real DNA data, the steganography           [2]   A Pseudo DNA Cryptography Method-
can be implemented, especially for image                          Kang Ning
steganography. The use of this method to do
message authentication, as well as its other usages,
will also be examined in the future.

IV. FUTURE VIEWS
This method based on the central dogma has its
nature advantage in software and hardware
applications. Since only 4 nucleotides are involved
in encipher and decipher process of the plaintext, the
program can be turned to be a very efficient
program based on primitive codes in C or assembly



                                                                                             1359 | P a g e

More Related Content

What's hot

Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
cscpconf
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
NidhinRaj Saikripa
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
kartikeya upadhyay
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
Mahmut Yildiz
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
International Journal of Science and Research (IJSR)
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
Aparna Nk
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
Rajan Yadav
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
Steganography
SteganographySteganography
Steganography
Zuala Khawlhring
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
IRJET Journal
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
Mohit Goel
 

What's hot (19)

Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Steganography
SteganographySteganography
Steganography
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
 

Viewers also liked

Case study- Assignment Relates to the Overall Performances on Starter Motor a...
Case study- Assignment Relates to the Overall Performances on Starter Motor a...Case study- Assignment Relates to the Overall Performances on Starter Motor a...
Case study- Assignment Relates to the Overall Performances on Starter Motor a...Anzis Lim 镇星
 
Zahira nazra
Zahira nazraZahira nazra
Zahira nazra
Zahira Nazra
 
Profile Serana
Profile SeranaProfile Serana
Profile Serana
T V Ramakrishna
 
Birkman - Scheibmeir Results
Birkman - Scheibmeir ResultsBirkman - Scheibmeir Results
Birkman - Scheibmeir Results
Jim Scheibmeir
 
Julie e ana luiza corrigido ok
Julie e ana luiza corrigido okJulie e ana luiza corrigido ok
Julie e ana luiza corrigido ok
Nute JPA
 
Organizacion y sistemas de infomacion diapositiva
Organizacion y sistemas de infomacion diapositivaOrganizacion y sistemas de infomacion diapositiva
Organizacion y sistemas de infomacion diapositiva
leandro uzcategui
 

Viewers also liked (6)

Case study- Assignment Relates to the Overall Performances on Starter Motor a...
Case study- Assignment Relates to the Overall Performances on Starter Motor a...Case study- Assignment Relates to the Overall Performances on Starter Motor a...
Case study- Assignment Relates to the Overall Performances on Starter Motor a...
 
Zahira nazra
Zahira nazraZahira nazra
Zahira nazra
 
Profile Serana
Profile SeranaProfile Serana
Profile Serana
 
Birkman - Scheibmeir Results
Birkman - Scheibmeir ResultsBirkman - Scheibmeir Results
Birkman - Scheibmeir Results
 
Julie e ana luiza corrigido ok
Julie e ana luiza corrigido okJulie e ana luiza corrigido ok
Julie e ana luiza corrigido ok
 
Organizacion y sistemas de infomacion diapositiva
Organizacion y sistemas de infomacion diapositivaOrganizacion y sistemas de infomacion diapositiva
Organizacion y sistemas de infomacion diapositiva
 

Similar to Hn2513581359

A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
Sajedul Karim
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
D017433134
D017433134D017433134
D017433134
IOSR Journals
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
IRJET Journal
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
ChandniA5
 
Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
Mayukh Maitra
 
Report dna
Report dnaReport dna
Report dna
DrAliKMattar
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
IJERA Editor
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
IDES Editor
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
IJECEIAES
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
journalBEEI
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
ijsptm
 
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET Journal
 

Similar to Hn2513581359 (20)

A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
D017433134
D017433134D017433134
D017433134
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
Dna cryptography
Dna cryptographyDna cryptography
Dna cryptography
 
Report dna
Report dnaReport dna
Report dna
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
 
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Hn2513581359

  • 1. Anup R. Nimje / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue5, September- October 2012, pp.1358-1359 Cryptography In Cloud-Security Using DNA (Genetic) Techniques Anup R. Nimje* *(Student of Master Of Engineering, Computer Engineering, College Of Engineering and Technology, Amravati) ABSTRACT The security concerns would be still DNA cryptography. Using Chip Based Micro array there in cloud systems. Cryptography consists of technology. the encryption-decryption techniques. There are many schemes, algorithms those can be used for III. CONCEPT security purposes. DNA is now mostly a The chip-based micro-array technology, theoretical concept but if implemented in future and can be generally expressed below [1]: would be providing most strong and secure Encryption: Plaintext to cipher text conversion: system. In this paper it has been proposed that 1. DNA structure has two strands. Take one or DNA cryptographic algorithms are adopted for more input DNA strands it can be considered to the optimization of data security in cloud be the plaintext message. security. So that cloud system would be most 2. Append to them one or more randomly secure. constructed “secret key” strands. 3. Resulting “tagged plaintext” DNA strands are Keywords – Cipher text, Decryption, DNA, hidden by mixing them within many other Encryption, Key, Plaintext, Proteins, Strands. additional “distracter” DNA strands which might also be constructed by random assembly. I. INTRODUCTION Decryption: Recovery of plaintext from cipher text: In Cloud computing security mechanisms 1. Given knowledge of the “secret key” strands. would be a challenge. The most serious concerns are 2. Resolution of DNA strands can be decrypted by a the possibility of lack of confidentiality, integrity number of possible known recombinant DNA and authentication among the cloud users and separation methods: Plaintext message strands service providers. The key intent of this research may be separated out by hybridization with the paper is to represent a new techniques for security complements of the “secret key” strands might be schemes and to ensure data confidentiality, integrity placed in solid support on magnetic beads or on a and authentication. prepared surface. In this paper it has been proposed that This process is used in 2D image DNA cryptographic algorithms are adopted for the encryption. They also suggested the use of DNA optimization of data security in cloud computing. computing on steganography. The method with DNA can be used in cryptography for storing and improved security is also suggested by researchers. transmitting the information, as well as for [2] computation. Although in its primitive stage, DNA It is easy to see that DNA computing is just cryptography is shown to be very effective. classical computing, highly parallelized and mass Theoretical analysis should be performed before its storage. Thus the idea of this form of DNA real applications, because it requires high tech lab computing is at great risk in the field of requirements and computational limitations, as well cryptography. Also, such technology is very hard to as the labor intensive extrapolation means so far. use outside laboratories currently, both getting the These make the efficient use of DNA cryptography DNA strands, and extracting the results. difficult in the security world now. Generally, such a scheme can be formulated as The concept of DNA cryptography is for below (M and C are for plaintext and cipher text, very powerful and unbreakable encryption respectively) [2] technology. That can be used in systems. Encryption key E1 = (the starting and pattern codes of the introns, the places of the II. LITERATURE REVIEW introns) The research paper that helped in Encryption key E2 = (the codon-amino acids understanding the concepts about DNA mapping) cryptography. DNA-Based Cryptography by Ashish Decryption key D1 = E2 Gehani, Thomas LaBean, and John Reif. This paper Decryption key D2 = E1 explains the basic or fundamental approach about C’ = E1 (M), C = E2 (C’) M’ = D1(C), M = D2 (M’) 1358 | P a g e
  • 2. Anup R. Nimje / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue5, September- October 2012, pp.1358-1359 The scheme is principally a symmetric key language. The hardware implementation can be easy algorithm, except that the sender initially has only based on these simple principles, and it can also be part of the keys, and he generates the rest part of the very efficient. With today’s advanced hardware keys. It is obvious that such a scheme is essentially a technology, the multiple rounds can be easily 2 step substitution process, though implemented, and the security can be relatively they are substitutions in a general sense (not letter- reasonable. These benefits show that this method is by-letter substitution). very suitable for software and hardware The DNA cryptography method that we implementation. The further analysis and have proposed is not constraint to the encryption experiments on these factors is very interesting and decryption area, but also such areas like topics in the future works. As this technique would massage authentication. Indeed, the encryption be implemented for confidentiality, integrity and process of the method can be very powerful and authentication in cloud systems. more effective if it is used as a hash function for generating message authentication code (MAC). By ACKNOWLEDGEMENTS this means, only the initial key is needed, and the Author is thankful to all of the professors encryption process can be fast. If multiple rounds and colleagues who helped directly or indirectly for are used, the security may also be satisfactory. working on this paper. The problem is that the length of the resulting MAC is hard to control, and one of the solutions to this REFERENCES problem is to do multiple round of the process, [1] DNA-Based Cryptography by Ashish together with padding to get the MAC with fix Gehani, Thomas LaBean, and John Reif. length. If using real DNA data, the steganography [2] A Pseudo DNA Cryptography Method- can be implemented, especially for image Kang Ning steganography. The use of this method to do message authentication, as well as its other usages, will also be examined in the future. IV. FUTURE VIEWS This method based on the central dogma has its nature advantage in software and hardware applications. Since only 4 nucleotides are involved in encipher and decipher process of the plaintext, the program can be turned to be a very efficient program based on primitive codes in C or assembly 1359 | P a g e