Visible to the public A DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem

TitleA DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem
Publication TypeConference Paper
Year of Publication2017
AuthorsBiswas, M. R., Alam, K. M. R., Akber, A., Morimoto, Y.
Conference Name2017 4th International Conference on Networking, Systems and Security (NSysS)
ISBN Number978-1-5386-3288-8
Keywordsasymmetric cryptosystem, Asymmetric Encryption, biocomputing, Ciphertext, compositionality, data secrecy, DNA, DNA bases, DNA cryptographic technique, DNA cryptography, dynamic DNA encoding, ElGamal, ElGamal cryptosystems, encoding, Encryption, equivalent ASCII values, equivalent binary value, finite values, fixed sized chunk, Human Behavior, Metrics, Paillier, Paillier cryptosystems, plaintext, pubcrawl, public key cryptography, random processes, random strings, Receivers, resilience, Resiliency, RSA, Transforms
Abstract

This paper proposes a new DNA cryptographic technique based on dynamic DNA encoding and asymmetric cryptosystem to increase the level of secrecy of data. The key idea is: to split the plaintext into fixed sized chunks, to encrypt each chunk using asymmetric cryptosystem and finally to merge the ciphertext of each chunk using dynamic DNA encoding. To generate chunks, characters of the plaintext are transformed into their equivalent ASCII values and split it into finite values. Now to encrypt each chunk, asymmetric cryptosystem is applied and the ciphertext is transformed into its equivalent binary value. Then this binary value is converted into DNA bases. Finally to merge each chunk, sufficient random strings are generated. Here to settle the required number of random strings, dynamic DNA encoding is exploited which is generated using Fibonacci series. Thus the use of finite chunks, asymmetric cryptosystem, random strings and dynamic DNA encoding increases the level of security of data. To evaluate the encryption-decryption time requirement, an empirical analysis is performed employing RSA, ElGamal and Paillier cryptosystems. The proposed technique is suitable for any use of cryptography.

URLhttps://ieeexplore.ieee.org/document/8267782/
DOI10.1109/NSYSS2.2017.8267782
Citation Keybiswas_dna_2017