Advanced Symmetric Key Cryptography Algorithm: Application of Pseudo Biotic DNA Method(ASKCA VER-1.0)

Authors

  • Asoke Nath  Department of Computer Science, St. Xavier's College(Autonomous), Kolkata, west Bengal, India
  • Ankita Kedia  Department of Computer Science, St. Xavier's College(Autonomous), Kolkata, west Bengal, India
  • Sunanda Pal  Department of Computer Science, St. Xavier's College(Autonomous), Kolkata, west Bengal, India
  • Moumita Sen  Department of Computer Science, St. Xavier's College(Autonomous), Kolkata, west Bengal, India

DOI:

https://doi.org/10.32628/CSEIT2063210

Keywords:

Data security, DNA cryptography, crossover, mutation, transcription, splicing system, DNA Vigenere table, randomization

Abstract

In today’s world with advancement in technologies as networking is growing at a fast pace providing security to data becomes the biggest concern. Hence, cryptography is the major area of concern when it comes to data security. DNA cryptography is a promising approach in encrypting, storing and transmitting data over a network. In our work we will be trying to design an encryption and corresponding decryption algorithm based on pseudo biotic DNA cryptography method. The algorithm will make use of basic concepts of DNA cryptography, crossover, mutation, transcription, splicing system for get spliced key, DNA Vigenere table and also a lot of steps to perform randomization of the plain texts in order to produce cipher texts which cannot be easily breakable. The encryption algorithm can be used in cellular and electronic communication.This document provides some minimal guidelines (and requirements) for writing a research paper. Issues related to the contents, originality, contributions, organization, bibliographic information, and writing style are briefly covered. Evaluation criteria and due dates for the research paper are also provided.

References

  1. L.M. Adleman, Molecular Computation of solutions to combinatorial problems, 'Science', 266:10211024, November 1994
  2. Behnam Bazli, Mustafa Anil Tuncel and David Llewellyn-Jones,” DATA ENCRYPTION USING BIO MOLECULAR INFORMATION”, International Journal on Cryptography and Information Security (IJCIS), Vol. 4, No. 3, pp.21-33, September 2014
  3. A. Gehani, T. Labean, and J. Reif, “DNA-Based Cryptography,” pp. 1–17, 2000.
  4. Asoke Nath, Madhumita Santra, Supriya Maji and Kanij Fatema Aleya,”3-Dimensional Bit Level Encryption Algorithm Ver-1(3DBLEA-1)”, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol. 4, pp. 8611-8618 Issue 5, MAY 2016.
  5. Asoke Nath, Ayan Ghosh, Enakshi Ghoshand Jayisha Saha,”3-Dimensional Bit Level Encryption Algorithm Ver-2(3DBLEA-2)”, International Journal of Advanced Research in Computer Science and Management Studies (IJARCSMS), Vol. 5, pp. 30-37 Issue 7, JULY 2017
  6. Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian edition 2007, Tata McGraw Hill publishing company limited, pages - 2-13and 56-58
  7. Nath, Asoke & Ray, Soumyadip & Dhara, Salil & Hazra, Sourav. (2018). 3-DIMENSIONAL BIT LEVEL ENCRYPTION ALGORITHM VERSION-3 (3DBLEA-3).10. 10.21172/1.102.55.
  8. E. Suresh Babu, C. Naga Raju, and Munaga HM Krishna Prasad, “Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks”, International Journal of Network Security, Vol.18, No.2, PP.291-303, Mar. 2016
  9. Mohammadreza Najaftorkaman and Nazanin Sadat Kazazi,” A Method to Encrypt Information with DNA-Based Cryptography”, International Journal of Cyber-Security and Digital Forensics (IJCSDF), the Society of Digital Information and Wireless Communications, 2015 (ISSN: 2305-0012), pp. 417-426
  10. Ashish Kumar Kaundal and A.K Verma,”DNA Based Cryptography: A Review”, International Journal of Information& Computer Technology, Vol. 4, pp. 693-698 Issue 7,2014
  11. Hamdy M. Mousa, “DNA-Genetic Encryption Technique”, Computer Network And Information Security, pp. 1-9, Issue 7,2016
  12. P.Bharti Devi and Dr. R Kiran Kumar,”Inspired Fiestel DNA Based Crypto System Using D-Box”, International Journal of Applied Engineering Research (ISSN: 0973-4562), Vol. 13, pp. 2847-2856, Issue57,2018

Downloads

Published

2020-06-30

Issue

Section

Research Articles

How to Cite

[1]
Asoke Nath, Ankita Kedia, Sunanda Pal, Moumita Sen, " Advanced Symmetric Key Cryptography Algorithm: Application of Pseudo Biotic DNA Method(ASKCA VER-1.0) " International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 3, pp.884-895, May-June-2020. Available at doi : https://doi.org/10.32628/CSEIT2063210