SlideShare una empresa de Scribd logo
1 de 20
A New Dna Encryption Technique For Secure
Data Transmission With Authentication And
Confidentiality
Supervised by Presented by
Shyla Afroz Md. Sajedul karim
Lecturer Roll:083008
Dept. of CSE, RUET RUET
Outline

Objective

Background Study

Importance of DNA cryptography

Algorithm & Implementation

Proposed Model

Future work

References
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
2/20
Objective

Encrypt the plain text into DNA sequence(cipher
text ) using new DNA encryption technique.

Decrypt this cipher text using DNA decryption
technique.

Detect the limitation of this technique.

Propose a new model to solve this limitation.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
3/20
Background Study
 Nucleic Acid 2 types: DNA & RNA
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
4/20
Background Study
 Genetic Code: Information encoded within genetic
material (DNA or mRNA base) .
 DNA sequence : Order of nucleotide bases in
the DNA molecule.
ATTAGCCTTATGCATGAACC
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
5/20
Background Study
 Cryptography: The art of protecting information by
transforming Plain Text into an unreadable format.
 Those who possess the secret key can decrypt the
message .
 Encrypted messages can sometimes broken by
Cryptanalysis .
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
6/20
Symmetric Cipher Model
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
7/20
DNA Cryptography
First introduced by L. Adleman in 1990s.
Plaintext message Encoded into DNA
sequences.
Related fields are : information storage , massive
parallel processing , highly secured data
transmission and more.
Based on one-time-pads .
8/2011/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Importance of DNA Cryptography
Weakness of traditional cryptology.
Existing algorithms are no longer secure.
1995 , Bonech break the DES
Weng - Long Chang have designed integer
factorization which can break RSA.
Offer all feature of secure data transmission .
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
9/20
New DNA Encryption Technique

Introduce by R.S. Dhawan and Alice in 2012.

It is symmetric Algorithm.

Has three secret key.

Few mathematical computation is needed.

Encrypted data are DNA sequences.

Support all ASCII character.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
10/20
New DNA Encryption Technique

Key={Starting_Number,Modulus,Hyphen_Indices_ Array[ ] }

Starting_Number: Used to generate some sequential integer .

Substitution_Array: Contains sequential integer .It’s size is the
length of Plain text.
Substitution_Array[ i ]=Substitution_Array[i-1]+Modulus;

Modulus: Difference between each sequential integer in
Substitution_Array[ ]

Hyphen_Indices_ Array[ ] :Used to separate number from
sequence.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
11/20
StartStart
Set START_NUMBER , MODULO ;
SUBSTITUTION_ARRAY[0]=START_NUMBER;
FOR( i=1 TO (MSG_LENGTH-1) )
SUBSTITUTION_ARRAY[i]=SUBSTITUTION_ARR
AY[i-1]+ MODULO ;
Calculate Quotient and Remainder
FOR (i =1 TO (MSG_LENGTH-1) ) {
Quotient[i]= SUBSTITUTION_ARRAY[i]/ASCII[i]
Remind [i]= SUBSTITUTION_ARRAY[i]%ASCII[i] }
Total_ARRAY[]=Quotient[] followed
by Remind[];
Convert 10- Base number to 4-base
from TOTAL_ARRAY[]
to CONVERT_ARRAY[]
Calculate HYPHEN_INDICES[];
Replace:
0------ A 1------T
2-------C 3-----G
Cipher Text
Flow Chart Of Encryption Technique
STOPSTOP
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Input : Plain text;
Perform ASCII conversion into ASCII_ARRAY[]
12/20
Data Sheet And Output Of Encryption Technique
Character ASCII [ ] SUBSTITUTION
ARRAY [ ]
DIVISION Quotient[ ] Remainder[ ]
M 77 877 877/77 11 30
E 69 902 902/69 13 5
S 83 927 927/83 11 14
U 85 952 952/85 11 11
K 75 977 977/75 13 2
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
13/20
StartStart
Separate 4-base number Using
Hyphen_Indices Array
Calculate ASCII value:
For(i=0 to CIPHER_TEXT_LENGTH/2-1)
D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/
QUOTIENT[i]
Mapped ASCII value to CHARACTER
Convert 4- Base number to 10-base
from FOUR_BASE
_ARRAY[] to
TEN_BASE_ARRAY[]
Input : Cipher Text
Mapping:
A------ 0 T------1
C-------2 G-----3
Plain Text
Flow Chart Of Decryption Technique
STOPSTOP
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Make SUBSTITUTION_ARRAY[ ]
Separate REMIND[ ] and QUOTIENT[ ]
14/20
Table And Output Of Decryption Technique
QUOTIENT REMAINDER For(i=0 to cipher_text_length/2)
D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/
QUOTIENT[i]
Character
11 30 (877-30)/11= 77 M
13 5 (902-5)/13= 69 E
11 14 (927-14)/11= 83 S
11 11 (952-11)/11= 85 U
13 2 (977-2)/13 = 75 K
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
Cipher Text:TTTCCTTGGCATAAGTTGAC
15/20
Result Analysis

Can Encrypt and Decrypt all ASCII character.

Provide Avalanche effect.

Provide Confidentiality.

Limitations:

Can not provide Authentication property.

Can not detect Modification of message.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
16/20
Proposed Model
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
M ||
H
E D
M
C(K1,M)
H
Compare
K1
K2 K2
E(K2,[M||H(K1,M)]E
17/20
M=Plain Text
H=Hash
function
E=Encryption
D=Decryption
K1 , K2=Key
D
K1
Future Work

Provide Authentication property using Digital
Signature .

Add function that will detect Modification of
message.

Compare performance with Existing one.

Implement this approach in Programming
Language.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
18/20
REFERENCES
[1] RS Dhawan and Alice(2012). A new DNA
Encryption technique for secure data transmission.
Research Scholar , Kurukshetera University,
Haryana, India.
[2] Guangzhao Cui , Cuiling Li , Haobin Li ,
Xiaoguang Li (2009). DNA computing and its
application to information security field. Research
ScholarHenan key Lab of information-based
Electrical Application , Zhengzhou 450002.
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
19/20
REFERENCES
[3] Pankaj Rakheja(2012). Integrating DNA
computing in international data encryption
Algorithm(IDEA). Deep Institute of Engineering and
Technology, Haryana, India.
[4] Abdullah Al Mueen & Md. Nurul Amin
Applications of Graphs in Bioinformatics pp.16-50,
2006
11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With
Authentication And Confidentiality
20/20

Más contenido relacionado

La actualidad más candente

Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAdri Jovin
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyPopescu Petre
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVipin Tejwani
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardtarekiceiuk
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherGopal Sakarkar
 

La actualidad más candente (20)

Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Cryptography
CryptographyCryptography
Cryptography
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Unit 1
Unit 1Unit 1
Unit 1
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 

Destacado

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY Abhishek Majumdar
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
 
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...AlexACMSC
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
03 data transmission
03 data transmission03 data transmission
03 data transmissionOrbay Yeşil
 
10.data transmission
10.data transmission10.data transmission
10.data transmissionDeepak Sharma
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionBise Mond
 
Jonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ GenomeJonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ GenomeJonathan Eisen
 
The Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele ScottiThe Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele ScottiOpenKnowledge srl
 
The DNA Era: Why DNA is important in your life.
The DNA Era:  Why DNA is important in your life.The DNA Era:  Why DNA is important in your life.
The DNA Era: Why DNA is important in your life.Richard Brownell
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionlockyerj
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...IOSR Journals
 

Destacado (20)

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
Alexandria ACM Student Chapter | Specification & Verification of Data-Centric...
 
Data communications
Data communicationsData communications
Data communications
 
03 data transmission
03 data transmission03 data transmission
03 data transmission
 
10.data transmission
10.data transmission10.data transmission
10.data transmission
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
DNA Kriptografi
DNA KriptografiDNA Kriptografi
DNA Kriptografi
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
Data collection
Data collectionData collection
Data collection
 
Vanet titles
Vanet titlesVanet titles
Vanet titles
 
Jonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ GenomeJonathan Eisen talk on 1$ Genome
Jonathan Eisen talk on 1$ Genome
 
The Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele ScottiThe Digital DNA - Rosario Sica, Emanuele Scotti
The Digital DNA - Rosario Sica, Emanuele Scotti
 
The DNA Era: Why DNA is important in your life.
The DNA Era:  Why DNA is important in your life.The DNA Era:  Why DNA is important in your life.
The DNA Era: Why DNA is important in your life.
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 

Similar a A new DNA encryption technique for secure data transmission with authentication and confidentiality

A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption TechniqueSajedul Karim
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.Tuhin_Das
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyjournalBEEI
 
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...IRJET Journal
 
B03302007012
B03302007012B03302007012
B03302007012theijes
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAijsptm
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsCSCJournals
 

Similar a A new DNA encryption technique for secure data transmission with authentication and confidentiality (20)

A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
D017433134
D017433134D017433134
D017433134
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
Cryptanalysis of Cipher texts using Artificial Neural Networks: A comparative...
 
B03302007012
B03302007012B03302007012
B03302007012
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
 

Último

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Último (20)

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

A new DNA encryption technique for secure data transmission with authentication and confidentiality

  • 1. A New Dna Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Supervised by Presented by Shyla Afroz Md. Sajedul karim Lecturer Roll:083008 Dept. of CSE, RUET RUET
  • 2. Outline  Objective  Background Study  Importance of DNA cryptography  Algorithm & Implementation  Proposed Model  Future work  References 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 2/20
  • 3. Objective  Encrypt the plain text into DNA sequence(cipher text ) using new DNA encryption technique.  Decrypt this cipher text using DNA decryption technique.  Detect the limitation of this technique.  Propose a new model to solve this limitation. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 3/20
  • 4. Background Study  Nucleic Acid 2 types: DNA & RNA 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 4/20
  • 5. Background Study  Genetic Code: Information encoded within genetic material (DNA or mRNA base) .  DNA sequence : Order of nucleotide bases in the DNA molecule. ATTAGCCTTATGCATGAACC 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 5/20
  • 6. Background Study  Cryptography: The art of protecting information by transforming Plain Text into an unreadable format.  Those who possess the secret key can decrypt the message .  Encrypted messages can sometimes broken by Cryptanalysis . 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 6/20
  • 7. Symmetric Cipher Model 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 7/20
  • 8. DNA Cryptography First introduced by L. Adleman in 1990s. Plaintext message Encoded into DNA sequences. Related fields are : information storage , massive parallel processing , highly secured data transmission and more. Based on one-time-pads . 8/2011/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality
  • 9. Importance of DNA Cryptography Weakness of traditional cryptology. Existing algorithms are no longer secure. 1995 , Bonech break the DES Weng - Long Chang have designed integer factorization which can break RSA. Offer all feature of secure data transmission . 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 9/20
  • 10. New DNA Encryption Technique  Introduce by R.S. Dhawan and Alice in 2012.  It is symmetric Algorithm.  Has three secret key.  Few mathematical computation is needed.  Encrypted data are DNA sequences.  Support all ASCII character. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 10/20
  • 11. New DNA Encryption Technique  Key={Starting_Number,Modulus,Hyphen_Indices_ Array[ ] }  Starting_Number: Used to generate some sequential integer .  Substitution_Array: Contains sequential integer .It’s size is the length of Plain text. Substitution_Array[ i ]=Substitution_Array[i-1]+Modulus;  Modulus: Difference between each sequential integer in Substitution_Array[ ]  Hyphen_Indices_ Array[ ] :Used to separate number from sequence. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 11/20
  • 12. StartStart Set START_NUMBER , MODULO ; SUBSTITUTION_ARRAY[0]=START_NUMBER; FOR( i=1 TO (MSG_LENGTH-1) ) SUBSTITUTION_ARRAY[i]=SUBSTITUTION_ARR AY[i-1]+ MODULO ; Calculate Quotient and Remainder FOR (i =1 TO (MSG_LENGTH-1) ) { Quotient[i]= SUBSTITUTION_ARRAY[i]/ASCII[i] Remind [i]= SUBSTITUTION_ARRAY[i]%ASCII[i] } Total_ARRAY[]=Quotient[] followed by Remind[]; Convert 10- Base number to 4-base from TOTAL_ARRAY[] to CONVERT_ARRAY[] Calculate HYPHEN_INDICES[]; Replace: 0------ A 1------T 2-------C 3-----G Cipher Text Flow Chart Of Encryption Technique STOPSTOP 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Input : Plain text; Perform ASCII conversion into ASCII_ARRAY[] 12/20
  • 13. Data Sheet And Output Of Encryption Technique Character ASCII [ ] SUBSTITUTION ARRAY [ ] DIVISION Quotient[ ] Remainder[ ] M 77 877 877/77 11 30 E 69 902 902/69 13 5 S 83 927 927/83 11 14 U 85 952 952/85 11 11 K 75 977 977/75 13 2 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 13/20
  • 14. StartStart Separate 4-base number Using Hyphen_Indices Array Calculate ASCII value: For(i=0 to CIPHER_TEXT_LENGTH/2-1) D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/ QUOTIENT[i] Mapped ASCII value to CHARACTER Convert 4- Base number to 10-base from FOUR_BASE _ARRAY[] to TEN_BASE_ARRAY[] Input : Cipher Text Mapping: A------ 0 T------1 C-------2 G-----3 Plain Text Flow Chart Of Decryption Technique STOPSTOP 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Make SUBSTITUTION_ARRAY[ ] Separate REMIND[ ] and QUOTIENT[ ] 14/20
  • 15. Table And Output Of Decryption Technique QUOTIENT REMAINDER For(i=0 to cipher_text_length/2) D_ASCII[i]=(SUB_ARRAY[i]-REMIND[i])/ QUOTIENT[i] Character 11 30 (877-30)/11= 77 M 13 5 (902-5)/13= 69 E 11 14 (927-14)/11= 83 S 11 11 (952-11)/11= 85 U 13 2 (977-2)/13 = 75 K 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality Cipher Text:TTTCCTTGGCATAAGTTGAC 15/20
  • 16. Result Analysis  Can Encrypt and Decrypt all ASCII character.  Provide Avalanche effect.  Provide Confidentiality.  Limitations:  Can not provide Authentication property.  Can not detect Modification of message. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 16/20
  • 17. Proposed Model 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality M || H E D M C(K1,M) H Compare K1 K2 K2 E(K2,[M||H(K1,M)]E 17/20 M=Plain Text H=Hash function E=Encryption D=Decryption K1 , K2=Key D K1
  • 18. Future Work  Provide Authentication property using Digital Signature .  Add function that will detect Modification of message.  Compare performance with Existing one.  Implement this approach in Programming Language. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 18/20
  • 19. REFERENCES [1] RS Dhawan and Alice(2012). A new DNA Encryption technique for secure data transmission. Research Scholar , Kurukshetera University, Haryana, India. [2] Guangzhao Cui , Cuiling Li , Haobin Li , Xiaoguang Li (2009). DNA computing and its application to information security field. Research ScholarHenan key Lab of information-based Electrical Application , Zhengzhou 450002. 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 19/20
  • 20. REFERENCES [3] Pankaj Rakheja(2012). Integrating DNA computing in international data encryption Algorithm(IDEA). Deep Institute of Engineering and Technology, Haryana, India. [4] Abdullah Al Mueen & Md. Nurul Amin Applications of Graphs in Bioinformatics pp.16-50, 2006 11/9/2013 A New DNA Encryption Technique For Secure Data Transmission With Authentication And Confidentiality 20/20

Notas del editor

  1. 09/21/13