DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyAM Publications
Data security is now a crucial issue now in our day to day life. The protection of personal identity, personal finances depend on the protection of important and irreplaceable information. Cryptography is the science of converting some readable information into something unreadable format, which are hard to decipher. In modern times, cryptography has adopted a new medium: human DNA. At a time when conventional cryptography has been losing strength to more advanced cryptanalysis, DNA cryptography has added more elements of confusion and diffusion. The use of DNA sequences to encrypt data has strengthened the existing classical encryption algorithms. Thus, DNA cryptography has added another dimension to conventional cryptography. In the present paper the authors have made a systematics study on DNA encryption algorithms and how it can be used along with standard classical encryption algorithms.
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
Hyperelliptic Curve Cryptography (HECC) is a Public
Key Cryptographic technique which is required for secure
transmission. HECC is better than the existing public key
cryptography technique such as RSA, DSA, AES and ECC in
terms of smaller key size. DNA cryptography is a next
generation security mechanism, storing almost a million
gigabytes of data inside DNA strands. Existing DNA based
Elliptic Curve Cryptographic technique require larger key
size to encrypt and decrypt the message resulting in increased
processing time, more computational and memory overhead.
To overcome the above limitations, DNA strands are used to
encode the data to provide first level of security and HECC
encryption algorithm is used for providing second level of
security. Hence this proposed integration of DNA computing
based HECC provides higher level of security with less
computational and memory overhead.
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyAM Publications
Data security is now a crucial issue now in our day to day life. The protection of personal identity, personal finances depend on the protection of important and irreplaceable information. Cryptography is the science of converting some readable information into something unreadable format, which are hard to decipher. In modern times, cryptography has adopted a new medium: human DNA. At a time when conventional cryptography has been losing strength to more advanced cryptanalysis, DNA cryptography has added more elements of confusion and diffusion. The use of DNA sequences to encrypt data has strengthened the existing classical encryption algorithms. Thus, DNA cryptography has added another dimension to conventional cryptography. In the present paper the authors have made a systematics study on DNA encryption algorithms and how it can be used along with standard classical encryption algorithms.
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
Hyperelliptic Curve Cryptography (HECC) is a Public
Key Cryptographic technique which is required for secure
transmission. HECC is better than the existing public key
cryptography technique such as RSA, DSA, AES and ECC in
terms of smaller key size. DNA cryptography is a next
generation security mechanism, storing almost a million
gigabytes of data inside DNA strands. Existing DNA based
Elliptic Curve Cryptographic technique require larger key
size to encrypt and decrypt the message resulting in increased
processing time, more computational and memory overhead.
To overcome the above limitations, DNA strands are used to
encode the data to provide first level of security and HECC
encryption algorithm is used for providing second level of
security. Hence this proposed integration of DNA computing
based HECC provides higher level of security with less
computational and memory overhead.
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
One of the essential challenges nowadays; is how to secure data with the increase of its volume as well as its transmission rate. The most frequent approach used to give a high degree of protection, preserve data from hackers, and accomplish multilayer security is steganography combined with encryption. DNA (Deoxyribonucleic Acid) is considered as a new promising carrier for data security while achieving powerful security and maximum protection. In this paper, a secure DNA cryptosystem model which combines steganography with encryption is introduced and categorized into two layers. The original data are hidden in the first layer into a reference DNA based on the insertion method to obtain a fake DNA sequence. In the second layer, this fake DNA sequence, which is the first layer's output, is encrypted using an indexing cipher to produce an encrypted message in the form of indexes. The proposed model guarantees multilayer security to the secret data with high performance and low-time wasting. It addresses the long-generation key problem of the DNA cryptography. The experimental results assess and validate the theoretical security analysis and model performance.
Literature Review on DNA based Audio Steganographic TechniquesRashmi Tank
Steganography is the technique of hiding secret
message in a cover medium in such a way that only the sender and the intended recipient knows the existence of
communication. DNA due to its immense storage capacity and high randomness is used now in the field of steganography. Audio steganography is concerned with hiding information in a cover (host) audio signal in an imperceptible way. In this paper, various techniques using DNA Sequences and audio files for data hiding is discussed for secure data transmission and reception.
Comparative Study of Three DNA-based Information Hiding MethodsCSCJournals
Cryptography is the science of protecting information by transforming data into formats that cannot be recognized by unauthorized users. Steganography is the science of hiding information using different media such as image, audio, video, text, and deoxyribonucleic acid (DNA) sequence. The DNA-based steganography is a newly discovered information security technology characterized by high capacity, high randomization, and low modification rate that leads to increased security. There are various DNA-based methods for hiding information.. In this paper, we compared three DNA-based techniques (substitution, insertion, and complementary) in terms of its capacity, cracking property, Bit Per Nucleotide (BPN), and payload. The selected algorithms combine DNA-based steganography and cryptography techniques. The results show that the substitution technique offers the best BPN for short secret messages and offers the best imperceptibility feature. We also found that both the substitution and the complementary method have a threshold BPN. On the other hand, the insertion method does not have a threshold BPN and it is more difficult to crack.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
In this paper, we present an improved Paillier Cryptosystem for a secured data transmission based on the
Residue Number System (RNS). The current state of Paillier Cryptosystem allows the computation of the
plaintext from the cipher text without solving its security assumption of Decisional Composite Residuosity
or the knowledge of its private keys under mathematical attacks
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
Innovative field of cryptography: DNA cryptography cscpconf
DNA cryptography is a new instinctive cryptographic field emerged with the research of DNA
computing, in which DNA is used as information shipper and the modern biological technology is
used as accomplishment tool. The speculative study and implementation shows method to be
efficient in computation, storage and transmission and it is very powerful against certain attacks.
The contemporary main difficulty of DNA cryptography is the lack of effective protected theory
and simple achievable method. The most important aim of the research of DNA cryptography is
explore peculiarity of DNA molecule and reaction, establish corresponding theory, discovering
possible development directions, searching for simple methods of understand DNA cryptography,
and Laing the basis for future development. DNA cryptography uses DNA as the computational
tool along with several molecular techniques to manipulate it. Due to very high storage capacity of DNA, this field is becoming very talented. Presently it is in the development phase and it requires a lot of work and research to reach a established stage. By reviewing all the prospective and acerbic edge technology of current research, this paper shows the guidelines that need to be deal with development in the field of DNA cryptography.
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
Abstract: The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences
to increase the confidentiality and complexity by using software point of view in cloud computing environments.
By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in
cloud. The algorithm which has been proposed here is based on binary coding and complementary pair rules.
Therefore, DNA reference sequence is chosen and a secret data M is hidden into it as well. As result of applying
some steps, M´´´ is come out to upload to cloud environments. The process of identifying and extracting the
original data M, hidden in DNA reference sequence begins once clients decide to use data. Furthermore,
security issues are demonstrated to inspect the complexity of the algorithm. In addition, providing better privacy
as well as ensure data availability, can be achieved by dividing the user’s data block into data pieces and
distributing them among the available SPs in such a way that no less than a threshold number of SPs can take
part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multicloud
storage (SCMCS) model in cloud computing which holds an economical distribution of data among the
available SPs in the market, to provide customers with data availability as well as secure storage.
Keywords: DNA sequence; DNA base pairing rules; complementary rules; DNA binary coding; cloud service
provider.
A comparative review on symmetric and asymmetric DNA-based cryptographyjournalBEEI
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algorithms. The first case concerned on symmetric cryptography that involved DNA coding with OTP (one time pad) algorithms. Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. As observed, the computational time of RSA algorithm combined with DNA coding was longer. In order to alleviate this problem, data redundancy was reduced by activating the GZIP compressed algorithm. The present experimental results showed that DNA symmetric cryptography worked quite well in both time and size analyses. Nevertheless, it was less efficient than the compressed DNA asymmetric cryptography.
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
One of the essential challenges nowadays; is how to secure data with the increase of its volume as well as its transmission rate. The most frequent approach used to give a high degree of protection, preserve data from hackers, and accomplish multilayer security is steganography combined with encryption. DNA (Deoxyribonucleic Acid) is considered as a new promising carrier for data security while achieving powerful security and maximum protection. In this paper, a secure DNA cryptosystem model which combines steganography with encryption is introduced and categorized into two layers. The original data are hidden in the first layer into a reference DNA based on the insertion method to obtain a fake DNA sequence. In the second layer, this fake DNA sequence, which is the first layer's output, is encrypted using an indexing cipher to produce an encrypted message in the form of indexes. The proposed model guarantees multilayer security to the secret data with high performance and low-time wasting. It addresses the long-generation key problem of the DNA cryptography. The experimental results assess and validate the theoretical security analysis and model performance.
Literature Review on DNA based Audio Steganographic TechniquesRashmi Tank
Steganography is the technique of hiding secret
message in a cover medium in such a way that only the sender and the intended recipient knows the existence of
communication. DNA due to its immense storage capacity and high randomness is used now in the field of steganography. Audio steganography is concerned with hiding information in a cover (host) audio signal in an imperceptible way. In this paper, various techniques using DNA Sequences and audio files for data hiding is discussed for secure data transmission and reception.
Comparative Study of Three DNA-based Information Hiding MethodsCSCJournals
Cryptography is the science of protecting information by transforming data into formats that cannot be recognized by unauthorized users. Steganography is the science of hiding information using different media such as image, audio, video, text, and deoxyribonucleic acid (DNA) sequence. The DNA-based steganography is a newly discovered information security technology characterized by high capacity, high randomization, and low modification rate that leads to increased security. There are various DNA-based methods for hiding information.. In this paper, we compared three DNA-based techniques (substitution, insertion, and complementary) in terms of its capacity, cracking property, Bit Per Nucleotide (BPN), and payload. The selected algorithms combine DNA-based steganography and cryptography techniques. The results show that the substitution technique offers the best BPN for short secret messages and offers the best imperceptibility feature. We also found that both the substitution and the complementary method have a threshold BPN. On the other hand, the insertion method does not have a threshold BPN and it is more difficult to crack.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
In this paper, we present an improved Paillier Cryptosystem for a secured data transmission based on the
Residue Number System (RNS). The current state of Paillier Cryptosystem allows the computation of the
plaintext from the cipher text without solving its security assumption of Decisional Composite Residuosity
or the knowledge of its private keys under mathematical attacks
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
Innovative field of cryptography: DNA cryptography cscpconf
DNA cryptography is a new instinctive cryptographic field emerged with the research of DNA
computing, in which DNA is used as information shipper and the modern biological technology is
used as accomplishment tool. The speculative study and implementation shows method to be
efficient in computation, storage and transmission and it is very powerful against certain attacks.
The contemporary main difficulty of DNA cryptography is the lack of effective protected theory
and simple achievable method. The most important aim of the research of DNA cryptography is
explore peculiarity of DNA molecule and reaction, establish corresponding theory, discovering
possible development directions, searching for simple methods of understand DNA cryptography,
and Laing the basis for future development. DNA cryptography uses DNA as the computational
tool along with several molecular techniques to manipulate it. Due to very high storage capacity of DNA, this field is becoming very talented. Presently it is in the development phase and it requires a lot of work and research to reach a established stage. By reviewing all the prospective and acerbic edge technology of current research, this paper shows the guidelines that need to be deal with development in the field of DNA cryptography.
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
Abstract: The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences
to increase the confidentiality and complexity by using software point of view in cloud computing environments.
By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in
cloud. The algorithm which has been proposed here is based on binary coding and complementary pair rules.
Therefore, DNA reference sequence is chosen and a secret data M is hidden into it as well. As result of applying
some steps, M´´´ is come out to upload to cloud environments. The process of identifying and extracting the
original data M, hidden in DNA reference sequence begins once clients decide to use data. Furthermore,
security issues are demonstrated to inspect the complexity of the algorithm. In addition, providing better privacy
as well as ensure data availability, can be achieved by dividing the user’s data block into data pieces and
distributing them among the available SPs in such a way that no less than a threshold number of SPs can take
part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multicloud
storage (SCMCS) model in cloud computing which holds an economical distribution of data among the
available SPs in the market, to provide customers with data availability as well as secure storage.
Keywords: DNA sequence; DNA base pairing rules; complementary rules; DNA binary coding; cloud service
provider.
A comparative review on symmetric and asymmetric DNA-based cryptographyjournalBEEI
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algorithms. The first case concerned on symmetric cryptography that involved DNA coding with OTP (one time pad) algorithms. Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. As observed, the computational time of RSA algorithm combined with DNA coding was longer. In order to alleviate this problem, data redundancy was reduced by activating the GZIP compressed algorithm. The present experimental results showed that DNA symmetric cryptography worked quite well in both time and size analyses. Nevertheless, it was less efficient than the compressed DNA asymmetric cryptography.
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONijcisjournal
Cryptography is a field, which makes the transmitted message unreadable to unauthorised users. In this
work we take inspiration from DNA encryption schemes and use of biological alphabets to manipulate
information by employing the DNA sequence reaction, to autonomously make a copy of its threads as an
extended encryption key. Information is converted from plain text to several formats and then follows the
stages of protein formation from DNA sequences to generate an extended key using chemical property and
attributes to be used in encryption mechanism. This technique will enhance the security of the encryption
mechanism by substitution, manipulation, and complexity. Furthermore this technique can be used in many
applications of informat
A Study on DNA based Computation and Memory DevicesEditor IJCATR
The present study delineates Deoxyribonucleic Acid (DNA) based computing and storage devices which have good future in the vast era of information technology. The traditional devices mostly used are made up of silicon. The devices are costly and have physical limitations to cause leakage of electrons and circuit to shorten. So, there is a need of materials which are capable of doing fast processing and have vast memory storage. DNA which is a bio-molecule has all these characteristics capable of providing ample storage. In classical computing devices, electronic logic gates are elements which allow storing and transforming of information. Designing of an appropriate sequence or a net of “store” and “transform” operations (in a sense of building a device or writing a program) is equivalent to preparing some computations. In DNA based computation, the situation is analogous. The main difference is the type of computing devices since in this new method of computing instead of electronic gates, DNA molecules have been deployed for the processing of dossier. Moreover, the inherent massive parallelism of DNA computing may lead to methods solving some intractable computational problems. The aim of this research study is to analyze the logical features and memory formation using DNA bio molecules in order to achieve proliferated speed, accuracy and vast storage.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data protection based neural cryptography and deoxyribonucleic acidIJECEIAES
The need to a robust and effective methods for secure data transferring makes the more credible. Two disciplines for data encryption presented in this paper: machine learning and deoxyribonucleic acid (DNA) to achieve the above goal and following common goals: prevent unauthorized access and eavesdropper. They used as powerful tool in cryptography. This paper grounded first on a two modified Hebbian neural network (MHNN) as a machine learning tool for message encryption in an unsupervised method. These two modified Hebbian neural nets classified as a: learning neural net (LNN) for generating optimal key ciphering and ciphering neural net CNN) for coding the plaintext using the LNN keys. The second granulation using DNA nucleated to increase data confusion and compression. Exploiting the DNA computing operations to upgrade data transmission security over the open nets. The results approved that the method is effective in protect the transferring data in a secure manner in less time
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAijsptm
DNA Cryptography is a new born cryptographic field emerged with the research of DNA Computing in which DNA is used as an Information carrier. Cellular automata is dynamic in nature so it provide dynamic behavior in the system which may increase the security in the system. DNA cryptography is
provide a secure way to encrypt the text and automata changes the state of the system based on the present
state, it will occur in discrete time. These qualities are most impressive in these techonology which help us to provide a highly secured security system for the users. Most of the encryption techniques based on the cellular automata have limitations. To overcome this lacuna, we propose a novel DNA cryptography algorithm with cellular automata to achieve randomness, parallelism, uniformity, reversibility and stable.
An algorithm implemented and its results obtained are depicts here, and a result analysis is done with other algorithms.
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS ijwmn
A number of various techniques have been already developed for providing security in sensor networks. It
may be anticipated that these techniques provide less secure sensor network which has numerous adverse
effects associated with them. Thus there is a sufficient scope for improvement of secure electronic
communication, as the proficiency of attacks is growing rapidly in wireless sensor networks. DNA
steganography is a technique of covered writing, which provides secure system in sensor network to some
extent. Steganography is more effective over cryptography as later one only conceals information but
steganography obscures the information, as well as camouflage the data to various attackers. DNA
steganography is an inventive approach to reduce the popularity of public key cryptography over the
wireless sensor networks. In the proposed work, a secret key is introduced which is purely based on DNA
sequence named as DNA stego key and is only known to sender and receiver. This DNA stego key is used to
hide information and is stored in a carrier. The proposed technique is implemented using java to verify its
correctness.
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSijwmn
A number of various techniques have been already developed for providing security in sensor networks. It may be anticipated that these techniques provide less secure sensor network which has numerous adverse effects associated with them. Thus there is a sufficient scope for improvement of secure electronic communication, as the proficiency of attacks is growing rapidly in wireless sensor networks. DNA steganography is a technique of covered writing, which provides secure system in sensor network to some
extent. Steganography is more effective over cryptography as later one only conceals information but steganography obscures the information, as well as camouflage the data to various attackers. DNA steganography is an inventive approach to reduce the popularity of public key cryptography over the wireless sensor networks. In the proposed work, a secret key is introduced which is purely based on DNA
sequence named as DNA stego key and is only known to sender and receiver. This DNA stego key is used to
hide information and is stored in a carrier. The proposed technique is implemented using java to verify its
correctness
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS ijwmn
A number of various techniques have been already developed for providing security in sensor networks. It
may be anticipated that these techniques provide less secure sensor network which has numerous adverse
effects associated with them. Thus there is a sufficient scope for improvement of secure electronic
communication, as the proficiency of attacks is growing rapidly in wireless sensor networks. DNA
steganography is a technique of covered writing, which provides secure system in sensor network to some
extent. Steganography is more effective over cryptography as later one only conceals information but
steganography obscures the information, as well as camouflage the data to various attackers. DNA
steganography is an inventive approach to reduce the popularity of public key cryptography over the
wireless sensor networks. In the proposed work, a secret key is introduced which is purely based on DNA
sequence named as DNA stego key and is only known to sender and receiver. This DNA stego key is used to
hide information and is stored in a carrier. The proposed technique is implemented using java to verify its
correctness.
Abstract DNA cryptography the new era of cryptography enhanced the cryptography in terms of time complexity as well as capacity. It uses the DNA strands to hide the information. The repeated sequence of the DNA makes highly difficult for unintended authority to get the message. The level of security can be increased by using the more than one cover medium. This paper discussed a technique that uses two cover medium to hide the message one is DNA and the other is image. The message is encrypted and converted to faked DNA then this faked DNA is hided to the image. Keywords: DNA, cryptography, DNA cryptography
Significant features for steganography techniques using deoxyribonucleic acid...nooriasukmaningtyas
Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new aspect to achieve better security. In this paper, a survey of more recent DNA based on data hiding algorithms are covered. With particular emphasis of different parameters several data hiding algorithms based on DNA has been reviewed. To present a more secure an efficient data hiding algorithms based on DNA for future works, this willbe helpful.
Features of genetic algorithm for plain text encryption IJECEIAES
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed processing.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.