Abstract
Due to the rapid growth of computer networks, more sensitive information is being exchanged over such networks. Securing information from unauthorized parties has become a critical issue in the field of securing information technology. DNA cryptography is a promising technology in the cryptographic field which enables users to encrypt data securely based on the real biological DNA strands. Although there are many DNA encryption algorithms, there is still room for security improvement. In this paper, we introduce a symmetric DNA binary cryptography algorithm to encrypt and decrypt plaintext information. the contribution of this paper are twofold: First, we introduce a mathematical algorithm to generate strong secret key from the DNA of different multiple living creatures. Second, the encryption process is implemented using another 16 keys which randomly generated from the secret key. The efficiency and confidence of the proposed algorithm is examined in terms of encryption and decryption time, avalanche effect and the resistance of the secret key against the attack. Keyword-DNA cryptography, Symmetric encryption, Block cipher, Data security. I. INTRODUCTION Currently, computer networks are rapidly growth and more new services are emerged. As a result, a very large amount of information is being transmitted over such networks [1]. Usually, transmissions over different networks are not secure due to the presence of hackers who wait for a chance to gain access to private information [2] [3]. Hence, the private information needs a certain level of communication and computer protection. Encryption is the process of converting plaintext or information into an unintelligible form for the purpose of hiding this data [4]. There are many techniques used to transforming information (i.e., plain text) into unreadable format (i.e., cipher text). Cryptography is one of such techniques which information is hidden by a secret key with a specific algorithm [5][6]. The secret key is the password used in the encryption or decryption algorithm and only those authorized parties can know it [7]. While the algorithm is the steps needed to achieve the cryptography process. Confidentiality, integrity, authentication and Non-repudiation are four main objectives behind the use of cryptography [8]. Cryptography can be symmetric or asymmetric [9][10]. Symmetric makes use of a single key for both the encryption and decryption process. Some of the encryption algorithms that use symmetric keys include: AES, Blowfish, DES, Triple DES, Serpent, and Twofish, which are modern, sophisticated and proven in today's encryption field [11]. On the other hand, asymmetric is based on two keys: the public key and the privet key, where the public key is used to encrypt messages and the private key is used to decrypt messages. Systems that use this type of encryption are PGP, DSA, Deffie-Hellman, Elgamal, RSA [12]. The cryptography is typically classified into three approaches: modern cryptography, quantum cryptography, and DNA cryptography [13]. DNA cryptogra...
Cite
CITATION STYLE
Al-Mahdi, H., R.Shahin, O., Fouad, Y., & Alkhaldi, K. (2018). Design and analysis of DNA Binary Cryptography Algorithm for Plaintext. International Journal of Engineering and Technology, 10(3), 699–706. https://doi.org/10.21817/ijet/2018/v10i3/181003055
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.