Advanced Symmetric Key Cryptography Algorithm: Application of Pseudo Biotic DNA Method(ASKCA VER-1.0)
DOI:
https://doi.org/10.32628/CSEIT2063210Keywords:
Data security, DNA cryptography, crossover, mutation, transcription, splicing system, DNA Vigenere table, randomizationAbstract
In today’s world with advancement in technologies as networking is growing at a fast pace providing security to data becomes the biggest concern. Hence, cryptography is the major area of concern when it comes to data security. DNA cryptography is a promising approach in encrypting, storing and transmitting data over a network. In our work we will be trying to design an encryption and corresponding decryption algorithm based on pseudo biotic DNA cryptography method. The algorithm will make use of basic concepts of DNA cryptography, crossover, mutation, transcription, splicing system for get spliced key, DNA Vigenere table and also a lot of steps to perform randomization of the plain texts in order to produce cipher texts which cannot be easily breakable. The encryption algorithm can be used in cellular and electronic communication.This document provides some minimal guidelines (and requirements) for writing a research paper. Issues related to the contents, originality, contributions, organization, bibliographic information, and writing style are briefly covered. Evaluation criteria and due dates for the research paper are also provided.
References
- L.M. Adleman, Molecular Computation of solutions to combinatorial problems, 'Science', 266:10211024, November 1994
- Behnam Bazli, Mustafa Anil Tuncel and David Llewellyn-Jones,” DATA ENCRYPTION USING BIO MOLECULAR INFORMATION”, International Journal on Cryptography and Information Security (IJCIS), Vol. 4, No. 3, pp.21-33, September 2014
- A. Gehani, T. Labean, and J. Reif, “DNA-Based Cryptography,” pp. 1–17, 2000.
- Asoke Nath, Madhumita Santra, Supriya Maji and Kanij Fatema Aleya,”3-Dimensional Bit Level Encryption Algorithm Ver-1(3DBLEA-1)”, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol. 4, pp. 8611-8618 Issue 5, MAY 2016.
- Asoke Nath, Ayan Ghosh, Enakshi Ghoshand Jayisha Saha,”3-Dimensional Bit Level Encryption Algorithm Ver-2(3DBLEA-2)”, International Journal of Advanced Research in Computer Science and Management Studies (IJARCSMS), Vol. 5, pp. 30-37 Issue 7, JULY 2017
- Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian edition 2007, Tata McGraw Hill publishing company limited, pages - 2-13and 56-58
- Nath, Asoke & Ray, Soumyadip & Dhara, Salil & Hazra, Sourav. (2018). 3-DIMENSIONAL BIT LEVEL ENCRYPTION ALGORITHM VERSION-3 (3DBLEA-3).10. 10.21172/1.102.55.
- E. Suresh Babu, C. Naga Raju, and Munaga HM Krishna Prasad, “Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks”, International Journal of Network Security, Vol.18, No.2, PP.291-303, Mar. 2016
- Mohammadreza Najaftorkaman and Nazanin Sadat Kazazi,” A Method to Encrypt Information with DNA-Based Cryptography”, International Journal of Cyber-Security and Digital Forensics (IJCSDF), the Society of Digital Information and Wireless Communications, 2015 (ISSN: 2305-0012), pp. 417-426
- Ashish Kumar Kaundal and A.K Verma,”DNA Based Cryptography: A Review”, International Journal of Information& Computer Technology, Vol. 4, pp. 693-698 Issue 7,2014
- Hamdy M. Mousa, “DNA-Genetic Encryption Technique”, Computer Network And Information Security, pp. 1-9, Issue 7,2016
- P.Bharti Devi and Dr. R Kiran Kumar,”Inspired Fiestel DNA Based Crypto System Using D-Box”, International Journal of Applied Engineering Research (ISSN: 0973-4562), Vol. 13, pp. 2847-2856, Issue57,2018
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.