SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3987
DNA CRYPTOGRAPHY
Karthiga S1, Murugavalli E2
1PG Scholar, Department of ECE, Thiagarajar college of Engineering, Madurai, India
2 Assistant Professor, Department of ECE, Thiagarajar college of Engineering, Madurai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - As traditional encryption algorithm have severe
security problems. The field of information security give
importance to the new way of protecting the data. The DNA
based cryptography has identified as new way of secure data
in the form DNA molecules which uses DNA strands to hidethe
information. The main objective of DNA cryptography is to
provide confidentiality when the persons sends data over a
network. This paper discuss about DNA Cryptography,
difference between traditional cryptography and DNA
Cryptography, various works done in the field of DNA
Cryptography
Key Words: Adenine, Thymine, Guanine, Cytosine,
Polymerase Chain Reaction, Primer
1. Introduction
In the digital world, data plays a vital importance in
the field of business, military etc… if the data is highly
sensitive and confidential it is necessary to protect the data.
Different techniques has been used to keeptheunauthorized
uses away such as cryptography, data hiding etc…
Cryptography is essential in both network and computer
security. It is the art of secret writing to protect the
information between two communication parties which
converts plain text into cipher text so that unauthorized
person cannot access the data. Traditional cryptography
applies complex and mathematical procedure to secure and
store the information. Due to this complex nature DNA
cryptosystem emerges. DNA Cryptosystem is the new
innovative approach used to encrypt the data in terms of
DNA sequence.
2. DNA & DNA Cryptography:
DNA (Deoxyribonucleic Acid) is a nucleic acid is the
backbone of all the living organisms. The DNA holds the
necessary genetic information which can help tobuild other
cellslike proteins and RNA (RibonucleicAcid),DNAisdouble
helix structure in which two strandsare coiled to each other
and it is made of nucleotidesThere are 4 basesin nucleotide
which are named as Adenine (A), Thymine (T), Guanine (G)
and Cytosine (C) Shown in Fig-1. In DNA Cryptography base
pairs forms an information carrier. DNA Cryptosystem
encrypts the data in the form of A, T, C, G which is the
combination of 0’s and 1’s such as 00-A, 01-T, 10-C 11-
G.Hybridization in which double stranded DNA molecules
uses single stranded DNA molecules. In this processAdenine
always pair with Thymine while Guanine always pair with
Cytosine. Polymerase Chain Reaction (PCR) isthe processof
amplifying a single or multiple copies to produce millions of
copies of DNA sequence. Primer is a strand of nucleic acid
that functions as a beginning point for DNA synthesis.
Transcription and Splicing is the process of removing the
non-coding areas and rejoining the remaining coding areas
and the information of DNA is moved into mRNA.
Translation in which the information of mRNA sequence is
translated into amino acid which is protein made.
Fig -1: DNA Cryptography
3. Traditional Cryptography:
Cryptography is the technique for protecting adata.
It is capable of keeping a data in secret form while savingthe
information in unsafe network like internet, this is done to
secure the data from the adversaries and to make it
understandable to the intended receiver Shown in Fig-2.
Fig -2: Traditional Cryptography
Plaintext: It is source message or information which isused
as an input to the encryption process.
Encryption: An approach or method which is performed by
data hiding algorithms to convert plaintext into cipher text.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3988
Cipher text: An encrypted message which sends to the
receiver using private or public channel.
Decryption: An inverse encryption process applies on
cipher text at receiver end for obtaining original message.
Table -1: Comparison of Traditional Cryptography and
DNA Cryptography
Table -2: Advantages and Disadvantage of different
Algorithm
4. Types of Cryptography:
There are three prominent branches or sub fields of
cryptography named as:
1) Modern Cryptography
2) Quantum Cryptography
3) DNA Cryptography.
These three fields depend upon different difficult problems
concerning to different disciplines for which there is no
known solution until now. The modern cryptography is
based upon the difficult mathematical problems such as
prime factorization, elliptic curve problem,forwhichthereis
no known solution found so far. Quantum cryptography
which is also relatively a new field, is based upon the
Heisenberg uncertainty principle of Physics, and DNA
cryptography dependsupon the difficultbiologicalprocesses
concerning to the field of DNA technology.
Table -3: Difference between Classical and Modern
Cryptography
5. Survey on DNA Cryptography:
Adelman [1] laid the foundationof DNA computing bygiving
solutions to the combinatorial problems using molecular
computation, one of which is “Hamiltonian path” problem.
He solved the instance of graph containing seven verticesby
encoding it into the molecular form by using an algorithm
and then computationaloperationswereperformedwiththe
help of some standard enzymes. This was solved by brute
force method.
Lipton [2] extended the work of Adleman by solvinganother
NP-complete problem called “satisfaction” by using DNA
molecules in a test tube to encode the graph for 2 bit
numbers.
Dan Boneh et al. applied the approaches of DNA computing
used by Adleman and Lipton, in order to break one of the
symmetric key algorithm used for cryptographic purposes
known asDES (Data Encryption Standard). They performed
biologicaloperations on the DNA strands in a test tube, such
as extraction, polymerization via DNA polymerase,
amplification via PCR and perform operations on the DNA
strandswhich have the encoding of binary strings.ThenDES
attack is planned by generating the DES-1 solution, due to
which key can be easily guessed from the ciphertext and
further evaluate the DES circuit, lookup table and XOR gates.
By using their molecular approach they broke DES inmerely
4 months[3]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3989
Table -4: Survey on DNA Cryptography
Qi Ouyang et al. applied the approaches of DNA molecular
theory in order to generate the solution for maximal clique
problem, which is another NP-complete problem. Thus
shows the efficiency of DNA: to solve Hard-problems and
vast parallelism inherent in it which makes the operations
fast.[4]
Chen et al. Proposed that hard problem can be solved by
DNA computing using various DNA operations. They solved
DES by using the DNA computing. [5]Chen et al.’s proposed
algorithm included three functions: initial function for
initialization of the key space with every possibility,
Encryption process, and third is to detect right
corresponding key. Algorithm referred as molecular sticker
algorithm which includes enzymes, short memory strands,
and tubes
MingXin et al. Introduced a symmetric-key DNA
cryptosystem using the inclusion of DNA biotechnology,
microarray into the cryptography technologies. In MingXin
et al.’s algorithm, encryption and decryption key formed by
use of DNA probes and ciphertext embeddedintomicroarray
(DNA chip). Security of algorithm based on theadvancement
of DNA chip.[6]
Shiu et al. Introduced three cryptographic approaches such
as Insertion method, Complementary pair method, and
Substitution method using the propertiesof DNA sequences.
They showed that substitution method is better than other
two approaches.
Liu et al. proposed a new data hiding approach using DNA
sequence and encrypted each character of ciphertext in a
word file. In Liu et al.’s algorithm, plaintext got convert into
DNA sequence using DNA coding. Chebyshev mapsgenerate
two pseudorandom DNA sequence XXOR and YPrimer, and
generate one time key using selected DNA sequence key.
XXOR added with message DNA sequence and then YPrimer
got attach with generated output. Aftersomeshiftoperations
had applied to the previous output, they got ciphertext. This
ciphertext encrypted in the word file and after conversionof
word to PDF. The generated PDF sent to the receiver as final
ciphertext.
Guangzhao Cui et al. proposed the public key encryption
technique that uses DNA synthesis, DNA digital coding and
PCR amplification to provide the security safeguard during
the communication. This encryption scheme has high
confidential strength.
Deepak Kumar and Shailendra Singh proposed a new secret
data writing techniquesbased on DNA sequences.Theyhave
explained this algorithm by using a simple example of
“HELLO” as a plaintext and generate a ssDNA One-time pad
key of 350 bits which is 70 times longer than the plaintext
and perform encryption and decryption on the plaintext
using symmetric key cryptography. So to find the exact key,
adversary hasto search among 4310 differentssDNAstrings
which is almost impossible [8].
Sabari Pramanik and Sanjit Kumar Setua proposed a new
parallel DNA cryptography technique using DNA molecular
structure and hybridization technique which certainly
minimize the time requirement. They have explained how
message is exchanging safely between sender and receiver
with an example.
Yunpeng Zhang et al. proposed a DNA cryptography based
on DNA fragment assembly.[10] In their algorithmtheyhave
clearly mentioned how sender converts the plaintext into
binary sequence and then into long chain of DNA, which is
further fragmented into small DNA chains.Keyofshortchain
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3990
implantation takes place in the fragmentsandforwardtothe
receiver as a ciphertext and then receiver deciphers it and
starts fragment reassembly to obtain the plaintext.
Sadeg et al. worked on Central Dogma of Molecular Biology
(CDMB) and designed an algorithm that works better than
AES algorithm under various attacks. This proposed
algorithm involves three phases. In the first phase, plaintext
get convert into bits using the XOR operation with sub key
that was generated by sub key generator.Insecondandthird
phase long sequence of bits converted into ciphertext by
Transposition, CDMB, Permutation, and XOR operations.
Olga Tornea and Monica E. Borda [11] proposed a DNA
based cipher which is based on DNA indexing. They take the
random DNA sequence from the genetic database and useas
a One-time pad key, which is send to the receiver by a secure
communication channel. The encryption mechanisms takes
place by converting the plaintext into itsASCIIcodeandthen
converts it into the binary format which isconvertedintothe
DNA sequence (A, C, G, and T). Now DNA sequence formed is
search in the key sequence and writes down the index
numbers. The array of integer numbers obtained are our
ciphertext which is decrypted by the receiver only using the
key and index pointer.
6. Time Analysis:
Cryptographic techniques such as RSA, DES AES, Elliptical
Curve Cryptography etc., are not secure enough and it also
take much time for the processto take place. Due tothistime
complexity DNA Cryptography is emerged and time analysis
of different cryptographic technique is shown in Chart-1.
Elliptical Curve Cryptography technique consumes more
time for both encryption and decryption when comparing
with other cryptographic techniques DNA consumes less
time for encryption and decryption.
Chart -1: Time Analysis
7. Conclusion:
The world of information security is always on the pay
attention to protect the data that we transmit over non
secured communication. The attractiveness of these DNA
research trendsisfound the possibility ofprotectingthedata
and it also solve many difficult problems. With the
summarization of the progress of DNA cryptographic
research, the advantages, futuretrendsandseveralproblems
have also been identified. All the three kindsofcryptography
have their own advantages and disadvantages and can be
treated as the complement of each other in future security
applications. However, the difficulties that are identified in
other cryptography is overcomebyDNAcryptographywhich
can readily be implemented in the field of security.
REFERENCES
[1] Adleman. M. L (1994), Molecular Computation of
Solutions to Combinatorial Problems, Science, vol. 266,
pp. 1021- 1024.
[2] J. Lipton. R (1995), Using DNA to solve NP Complete
problems, Science, Vol. 268, pp. 542-545.
[3] Boneh. D (1996), Breaking DES using Molecular
computer, American Mathematical Society, pp 37-65.
[4] Ouyang Qi, D. Peter Kaplan, Liu Shumao and Albert
Libchaber (1997), DNA solution of the maximal clique
problem, Science 278, 5337, 446-449.
[5] Chen Jie (2003), A DNA-based bio molecular
cryptography design, Proceedingsof IEEE International
Symposium, Vol. 3, pp. III-822.
[6] Lai XueJia, MingXin Lu, Lei Qin, Han JunSong, and Fang
XiWen (2010),Asymmetric encryption and signature
method with DNA technology, Science China
Information Sciences 53, no. 3, pp. 506-514.
[7] Cui Guangzhao, Limin Qin, Yanfeng Wang, and Xuncai
Zhang (2008), An encryption scheme using DNA
technology, In Bio-Inspired Computing: Theories and
Applications, BICTA, 3rd IEEE International Conference
on, pp.37-42
[8] Deepak Kumar, and Shailendra Singh(2011),Secretdata
writing using DNA sequences, In Emerging Trends in
Networksand Computer CommunicationsETNCC),IEEE
International Conference on, pp. 402-405.
[9] Yunpeng Zhang, Bochen Fu, and Xianwei Zhang (2012),
DNA cryptography based on DNA Fragment assembly,
Information Science and Digital Content Technology
(ICIDT), 8th IEEE International Conference, Vol. 1, pp.
179-182.
[10] Olga Tornea, and Borda E. Monica (2013), Security and
complexity of a DNA-based cipher, In Roedunet
International Conference (Roedunet), 11thEEE
International Conference, pp. 1-5.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3991
[11] G. Cui, L. Cuiling, L. Haobin, and L. Xiaoguang, “DNA
computing and its application to information security
field”, IEEE Fifth International Conference on Natural
Computation, Tianjian, China, Aug. 2009, pp. 148 - 152.
[12] G. Cui, L. Qin, Y. Wang, and X. Zhang, “An encryption
scheme using DNA technology”, IEEE 3rd International
conference on Bio-Inspired Computing: Theories and
Applications (BICTA08), Adelaid, SA,Australia,2008,pp.
37–420.
[13] X. Guozhen, L. Mingxin, Q. Lei, and L. Xuejia,“Newfieldof
cryptography: DNA cryptography” Chinese Sience
Bulletin, Springer Verlag, Germany, vol. 51, 2006, pp.
1413–1420.
[14] Noorul Hussain Ubaidur Rahman, Chithralekha,
Balamurugan, Rajapandian, and Mariappan, "A Novel
DNA Computing based Encryption and Decryption
Algorithm", IEEE, 2015.
[15] G. Shanmuga Sundaram, S. Pavithra, A. Arthi, B. Madhu
Bala and S. Mahalakshmi, “Cellular AutomatabasedDNA
Cryptography Algorithm”, ISCO, IEEE, 2015.
[16] Asish Aich, Alo Sen, Satya Ranjan Dash, and
Satchidananda Dehuri, "A Symmetric Key Cryptosystem
using DNA Sequence with OTP Key", Springer, 2015.
[17] Ravi Gupta and Rahul Kumar Singh, "An Improved
Substitution method for Data Encryption using DNA
Sequence and CDMB", Springer, 2015.
[18] Samiha Marwan, Ahmed Shawish, Khaled Nagaty,“DNA-
based cryptographic method for data hiding in DNA
media”, Elsevier,2016.
[19] Tushar Mandge, and Vijay Choudhary, "A DNA
Encryption Technique Based on Matrix Manipulation
and Secure key Generation Scheme", IEEE, 2013.

More Related Content

What's hot

DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
Sajedul Karim
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
IRJET Journal
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
IJNSA Journal
 
C010521418
C010521418C010521418
C010521418
IOSR Journals
 
Literature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesLiterature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic Techniques
Rashmi Tank
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
CSCJournals
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
IJERA Editor
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6
sophiabelthome
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
caijjournal
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451IJRAT
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
ijcisjournal
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
cscpconf
 

What's hot (20)

DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
C010521418
C010521418C010521418
C010521418
 
Literature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic TechniquesLiterature Review on DNA based Audio Steganographic Techniques
Literature Review on DNA based Audio Steganographic Techniques
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
International journal of engineering issues vol 2015 - no 2 - paper6
International journal of engineering issues   vol 2015 - no 2 - paper6International journal of engineering issues   vol 2015 - no 2 - paper6
International journal of engineering issues vol 2015 - no 2 - paper6
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 

Similar to IRJET- DNA Cryptography

Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
IOSR Journals
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
journalBEEI
 
An Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyAn Survey On DNA Based Cryptography
An Survey On DNA Based Cryptography
Yasmine Anino
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA Cryptography
BALAKUMARC1
 
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONDATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
ijcisjournal
 
Report dna
Report dnaReport dna
Report dna
DrAliKMattar
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
IRJET Journal
 
A Study on DNA based Computation and Memory Devices
A Study on DNA based Computation and Memory DevicesA Study on DNA based Computation and Memory Devices
A Study on DNA based Computation and Memory Devices
Editor IJCATR
 
D017433134
D017433134D017433134
D017433134
IOSR Journals
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
IJERA Editor
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
IJECEIAES
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
ijsptm
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
ijwmn
 
Double layered dna based cryptography
Double layered dna based cryptographyDouble layered dna based cryptography
Double layered dna based cryptography
eSAT Journals
 
Significant features for steganography techniques using deoxyribonucleic acid...
Significant features for steganography techniques using deoxyribonucleic acid...Significant features for steganography techniques using deoxyribonucleic acid...
Significant features for steganography techniques using deoxyribonucleic acid...
nooriasukmaningtyas
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
IJECEIAES
 

Similar to IRJET- DNA Cryptography (20)

Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
An Survey On DNA Based Cryptography
An Survey On DNA Based CryptographyAn Survey On DNA Based Cryptography
An Survey On DNA Based Cryptography
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA Cryptography
 
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONDATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
 
Report dna
Report dnaReport dna
Report dna
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
A Study on DNA based Computation and Memory Devices
A Study on DNA based Computation and Memory DevicesA Study on DNA based Computation and Memory Devices
A Study on DNA based Computation and Memory Devices
 
D017433134
D017433134D017433134
D017433134
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
Double layered dna based cryptography
Double layered dna based cryptographyDouble layered dna based cryptography
Double layered dna based cryptography
 
Significant features for steganography techniques using deoxyribonucleic acid...
Significant features for steganography techniques using deoxyribonucleic acid...Significant features for steganography techniques using deoxyribonucleic acid...
Significant features for steganography techniques using deoxyribonucleic acid...
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 

IRJET- DNA Cryptography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3987 DNA CRYPTOGRAPHY Karthiga S1, Murugavalli E2 1PG Scholar, Department of ECE, Thiagarajar college of Engineering, Madurai, India 2 Assistant Professor, Department of ECE, Thiagarajar college of Engineering, Madurai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - As traditional encryption algorithm have severe security problems. The field of information security give importance to the new way of protecting the data. The DNA based cryptography has identified as new way of secure data in the form DNA molecules which uses DNA strands to hidethe information. The main objective of DNA cryptography is to provide confidentiality when the persons sends data over a network. This paper discuss about DNA Cryptography, difference between traditional cryptography and DNA Cryptography, various works done in the field of DNA Cryptography Key Words: Adenine, Thymine, Guanine, Cytosine, Polymerase Chain Reaction, Primer 1. Introduction In the digital world, data plays a vital importance in the field of business, military etc… if the data is highly sensitive and confidential it is necessary to protect the data. Different techniques has been used to keeptheunauthorized uses away such as cryptography, data hiding etc… Cryptography is essential in both network and computer security. It is the art of secret writing to protect the information between two communication parties which converts plain text into cipher text so that unauthorized person cannot access the data. Traditional cryptography applies complex and mathematical procedure to secure and store the information. Due to this complex nature DNA cryptosystem emerges. DNA Cryptosystem is the new innovative approach used to encrypt the data in terms of DNA sequence. 2. DNA & DNA Cryptography: DNA (Deoxyribonucleic Acid) is a nucleic acid is the backbone of all the living organisms. The DNA holds the necessary genetic information which can help tobuild other cellslike proteins and RNA (RibonucleicAcid),DNAisdouble helix structure in which two strandsare coiled to each other and it is made of nucleotidesThere are 4 basesin nucleotide which are named as Adenine (A), Thymine (T), Guanine (G) and Cytosine (C) Shown in Fig-1. In DNA Cryptography base pairs forms an information carrier. DNA Cryptosystem encrypts the data in the form of A, T, C, G which is the combination of 0’s and 1’s such as 00-A, 01-T, 10-C 11- G.Hybridization in which double stranded DNA molecules uses single stranded DNA molecules. In this processAdenine always pair with Thymine while Guanine always pair with Cytosine. Polymerase Chain Reaction (PCR) isthe processof amplifying a single or multiple copies to produce millions of copies of DNA sequence. Primer is a strand of nucleic acid that functions as a beginning point for DNA synthesis. Transcription and Splicing is the process of removing the non-coding areas and rejoining the remaining coding areas and the information of DNA is moved into mRNA. Translation in which the information of mRNA sequence is translated into amino acid which is protein made. Fig -1: DNA Cryptography 3. Traditional Cryptography: Cryptography is the technique for protecting adata. It is capable of keeping a data in secret form while savingthe information in unsafe network like internet, this is done to secure the data from the adversaries and to make it understandable to the intended receiver Shown in Fig-2. Fig -2: Traditional Cryptography Plaintext: It is source message or information which isused as an input to the encryption process. Encryption: An approach or method which is performed by data hiding algorithms to convert plaintext into cipher text.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3988 Cipher text: An encrypted message which sends to the receiver using private or public channel. Decryption: An inverse encryption process applies on cipher text at receiver end for obtaining original message. Table -1: Comparison of Traditional Cryptography and DNA Cryptography Table -2: Advantages and Disadvantage of different Algorithm 4. Types of Cryptography: There are three prominent branches or sub fields of cryptography named as: 1) Modern Cryptography 2) Quantum Cryptography 3) DNA Cryptography. These three fields depend upon different difficult problems concerning to different disciplines for which there is no known solution until now. The modern cryptography is based upon the difficult mathematical problems such as prime factorization, elliptic curve problem,forwhichthereis no known solution found so far. Quantum cryptography which is also relatively a new field, is based upon the Heisenberg uncertainty principle of Physics, and DNA cryptography dependsupon the difficultbiologicalprocesses concerning to the field of DNA technology. Table -3: Difference between Classical and Modern Cryptography 5. Survey on DNA Cryptography: Adelman [1] laid the foundationof DNA computing bygiving solutions to the combinatorial problems using molecular computation, one of which is “Hamiltonian path” problem. He solved the instance of graph containing seven verticesby encoding it into the molecular form by using an algorithm and then computationaloperationswereperformedwiththe help of some standard enzymes. This was solved by brute force method. Lipton [2] extended the work of Adleman by solvinganother NP-complete problem called “satisfaction” by using DNA molecules in a test tube to encode the graph for 2 bit numbers. Dan Boneh et al. applied the approaches of DNA computing used by Adleman and Lipton, in order to break one of the symmetric key algorithm used for cryptographic purposes known asDES (Data Encryption Standard). They performed biologicaloperations on the DNA strands in a test tube, such as extraction, polymerization via DNA polymerase, amplification via PCR and perform operations on the DNA strandswhich have the encoding of binary strings.ThenDES attack is planned by generating the DES-1 solution, due to which key can be easily guessed from the ciphertext and further evaluate the DES circuit, lookup table and XOR gates. By using their molecular approach they broke DES inmerely 4 months[3]
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3989 Table -4: Survey on DNA Cryptography Qi Ouyang et al. applied the approaches of DNA molecular theory in order to generate the solution for maximal clique problem, which is another NP-complete problem. Thus shows the efficiency of DNA: to solve Hard-problems and vast parallelism inherent in it which makes the operations fast.[4] Chen et al. Proposed that hard problem can be solved by DNA computing using various DNA operations. They solved DES by using the DNA computing. [5]Chen et al.’s proposed algorithm included three functions: initial function for initialization of the key space with every possibility, Encryption process, and third is to detect right corresponding key. Algorithm referred as molecular sticker algorithm which includes enzymes, short memory strands, and tubes MingXin et al. Introduced a symmetric-key DNA cryptosystem using the inclusion of DNA biotechnology, microarray into the cryptography technologies. In MingXin et al.’s algorithm, encryption and decryption key formed by use of DNA probes and ciphertext embeddedintomicroarray (DNA chip). Security of algorithm based on theadvancement of DNA chip.[6] Shiu et al. Introduced three cryptographic approaches such as Insertion method, Complementary pair method, and Substitution method using the propertiesof DNA sequences. They showed that substitution method is better than other two approaches. Liu et al. proposed a new data hiding approach using DNA sequence and encrypted each character of ciphertext in a word file. In Liu et al.’s algorithm, plaintext got convert into DNA sequence using DNA coding. Chebyshev mapsgenerate two pseudorandom DNA sequence XXOR and YPrimer, and generate one time key using selected DNA sequence key. XXOR added with message DNA sequence and then YPrimer got attach with generated output. Aftersomeshiftoperations had applied to the previous output, they got ciphertext. This ciphertext encrypted in the word file and after conversionof word to PDF. The generated PDF sent to the receiver as final ciphertext. Guangzhao Cui et al. proposed the public key encryption technique that uses DNA synthesis, DNA digital coding and PCR amplification to provide the security safeguard during the communication. This encryption scheme has high confidential strength. Deepak Kumar and Shailendra Singh proposed a new secret data writing techniquesbased on DNA sequences.Theyhave explained this algorithm by using a simple example of “HELLO” as a plaintext and generate a ssDNA One-time pad key of 350 bits which is 70 times longer than the plaintext and perform encryption and decryption on the plaintext using symmetric key cryptography. So to find the exact key, adversary hasto search among 4310 differentssDNAstrings which is almost impossible [8]. Sabari Pramanik and Sanjit Kumar Setua proposed a new parallel DNA cryptography technique using DNA molecular structure and hybridization technique which certainly minimize the time requirement. They have explained how message is exchanging safely between sender and receiver with an example. Yunpeng Zhang et al. proposed a DNA cryptography based on DNA fragment assembly.[10] In their algorithmtheyhave clearly mentioned how sender converts the plaintext into binary sequence and then into long chain of DNA, which is further fragmented into small DNA chains.Keyofshortchain
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3990 implantation takes place in the fragmentsandforwardtothe receiver as a ciphertext and then receiver deciphers it and starts fragment reassembly to obtain the plaintext. Sadeg et al. worked on Central Dogma of Molecular Biology (CDMB) and designed an algorithm that works better than AES algorithm under various attacks. This proposed algorithm involves three phases. In the first phase, plaintext get convert into bits using the XOR operation with sub key that was generated by sub key generator.Insecondandthird phase long sequence of bits converted into ciphertext by Transposition, CDMB, Permutation, and XOR operations. Olga Tornea and Monica E. Borda [11] proposed a DNA based cipher which is based on DNA indexing. They take the random DNA sequence from the genetic database and useas a One-time pad key, which is send to the receiver by a secure communication channel. The encryption mechanisms takes place by converting the plaintext into itsASCIIcodeandthen converts it into the binary format which isconvertedintothe DNA sequence (A, C, G, and T). Now DNA sequence formed is search in the key sequence and writes down the index numbers. The array of integer numbers obtained are our ciphertext which is decrypted by the receiver only using the key and index pointer. 6. Time Analysis: Cryptographic techniques such as RSA, DES AES, Elliptical Curve Cryptography etc., are not secure enough and it also take much time for the processto take place. Due tothistime complexity DNA Cryptography is emerged and time analysis of different cryptographic technique is shown in Chart-1. Elliptical Curve Cryptography technique consumes more time for both encryption and decryption when comparing with other cryptographic techniques DNA consumes less time for encryption and decryption. Chart -1: Time Analysis 7. Conclusion: The world of information security is always on the pay attention to protect the data that we transmit over non secured communication. The attractiveness of these DNA research trendsisfound the possibility ofprotectingthedata and it also solve many difficult problems. With the summarization of the progress of DNA cryptographic research, the advantages, futuretrendsandseveralproblems have also been identified. All the three kindsofcryptography have their own advantages and disadvantages and can be treated as the complement of each other in future security applications. However, the difficulties that are identified in other cryptography is overcomebyDNAcryptographywhich can readily be implemented in the field of security. REFERENCES [1] Adleman. M. L (1994), Molecular Computation of Solutions to Combinatorial Problems, Science, vol. 266, pp. 1021- 1024. [2] J. Lipton. R (1995), Using DNA to solve NP Complete problems, Science, Vol. 268, pp. 542-545. [3] Boneh. D (1996), Breaking DES using Molecular computer, American Mathematical Society, pp 37-65. [4] Ouyang Qi, D. Peter Kaplan, Liu Shumao and Albert Libchaber (1997), DNA solution of the maximal clique problem, Science 278, 5337, 446-449. [5] Chen Jie (2003), A DNA-based bio molecular cryptography design, Proceedingsof IEEE International Symposium, Vol. 3, pp. III-822. [6] Lai XueJia, MingXin Lu, Lei Qin, Han JunSong, and Fang XiWen (2010),Asymmetric encryption and signature method with DNA technology, Science China Information Sciences 53, no. 3, pp. 506-514. [7] Cui Guangzhao, Limin Qin, Yanfeng Wang, and Xuncai Zhang (2008), An encryption scheme using DNA technology, In Bio-Inspired Computing: Theories and Applications, BICTA, 3rd IEEE International Conference on, pp.37-42 [8] Deepak Kumar, and Shailendra Singh(2011),Secretdata writing using DNA sequences, In Emerging Trends in Networksand Computer CommunicationsETNCC),IEEE International Conference on, pp. 402-405. [9] Yunpeng Zhang, Bochen Fu, and Xianwei Zhang (2012), DNA cryptography based on DNA Fragment assembly, Information Science and Digital Content Technology (ICIDT), 8th IEEE International Conference, Vol. 1, pp. 179-182. [10] Olga Tornea, and Borda E. Monica (2013), Security and complexity of a DNA-based cipher, In Roedunet International Conference (Roedunet), 11thEEE International Conference, pp. 1-5.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3991 [11] G. Cui, L. Cuiling, L. Haobin, and L. Xiaoguang, “DNA computing and its application to information security field”, IEEE Fifth International Conference on Natural Computation, Tianjian, China, Aug. 2009, pp. 148 - 152. [12] G. Cui, L. Qin, Y. Wang, and X. Zhang, “An encryption scheme using DNA technology”, IEEE 3rd International conference on Bio-Inspired Computing: Theories and Applications (BICTA08), Adelaid, SA,Australia,2008,pp. 37–420. [13] X. Guozhen, L. Mingxin, Q. Lei, and L. Xuejia,“Newfieldof cryptography: DNA cryptography” Chinese Sience Bulletin, Springer Verlag, Germany, vol. 51, 2006, pp. 1413–1420. [14] Noorul Hussain Ubaidur Rahman, Chithralekha, Balamurugan, Rajapandian, and Mariappan, "A Novel DNA Computing based Encryption and Decryption Algorithm", IEEE, 2015. [15] G. Shanmuga Sundaram, S. Pavithra, A. Arthi, B. Madhu Bala and S. Mahalakshmi, “Cellular AutomatabasedDNA Cryptography Algorithm”, ISCO, IEEE, 2015. [16] Asish Aich, Alo Sen, Satya Ranjan Dash, and Satchidananda Dehuri, "A Symmetric Key Cryptosystem using DNA Sequence with OTP Key", Springer, 2015. [17] Ravi Gupta and Rahul Kumar Singh, "An Improved Substitution method for Data Encryption using DNA Sequence and CDMB", Springer, 2015. [18] Samiha Marwan, Ahmed Shawish, Khaled Nagaty,“DNA- based cryptographic method for data hiding in DNA media”, Elsevier,2016. [19] Tushar Mandge, and Vijay Choudhary, "A DNA Encryption Technique Based on Matrix Manipulation and Secure key Generation Scheme", IEEE, 2013.