24/7 writing help on your phone
Save to my list
Remove from my list
Recent research trends have focused on Introducing DNA medium so as to obtain complex computation in the process of achieving the cipher text. DNA cryptography is the new field of interest in the com-mon PKI scenario, where it is possible to follow the pattern of PKI, while also exploiting the inherent massively-parallel computing properties of DNA bonding to perform the encryption and decryption of the public and private keys. The resulting encryption algorithm used in the transaction is much more complex than the one used by conventional encryption methods.
Public Key Cryptography is one setoff cryptographic techniques for providing confidentiality, preventing data compromise, detecting alter-action of data and verifying its authenticity. By the use of DNA computing, the Data Encryption Standard (DES) cryptographic protocol can be broken. The one-time pad cryptography with DNA strands, and the research on DNA steganography (hiding messages in DNA). Essential parts of what we may call data security, specifically confidentiality and authentication, are achieved using cryptography, which has a long and fascinating history.
In this paper, the proposed algorithm takes its basic idea from the way DNA encodes the genetic information in the codons (i.e. each codon holds the information of a particular protein to be synthesized). So, using this idea any plaintext can be encoded with a one-time codebook.
Example of one-time code for the plain text GAUTAM the cipher text could be ATACAQPCDAUG. With this idea, a substitution algorithm is being proposed that is discussed in this paper. The scheme is principally asymmetric key algorithm, except that the sender initially has only part of the keys, and he generates the rest part of the keys.
Symmetrickeybasedencryptionistheonlywayforsecurecommunicationbetweennodes. However, to do that, two nodes should agree upon a common key first. For this, various key distribution schemes have been proposed in the literature. Eschenauer and Gligor proposed a random key pre distribution scheme, referred to as the basic scheme or EG scheme. Based on this scheme, various improvements have been proposed in the literature.
In the era of information technology, the possibility that the information stored in a person’s computer or the information that are being transferred through network of computers or internet being read by other people is very high. This causes a major concern for privacy, identity theft, electronic payments, corporate security, military communications and many others. We need an efficient and simple way of securing the electronic documents from being read or used by people other than who are authorized to do it.
Cryptography is a standard way of securing the electronic documents. Basic idea of Cryptography: Basic idea of cryptography is to mumble-jumble the original message into something that is unread-able or to something that is readable but makes no sense of what the original message is. To retrieve the original message again, we have to transform the mumble-jumbled message back into the original.
Cryptographic algorithms are mathematical functions that are used in the encryption and decryption process. A cryptographic algorithm works in combination with a key (a number, word or phrase), to encrypt the plain text. Same plain text encrypts to different cipher texts for different keys. Strength of a cryptosystems depends on the strength of the algorithm and the secrecy of the key. Two Kinds of Cryptography Systems: There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Symmetric cryptosystems are also called as private key cryptosystems and asymmetric cryptosystems are also called as public key cryptosystems.
In private-key cryptography, the sender and recipient agree beforehand on a secret private key. The plaintext is somehow combined with the key to create the cipher text. The method of combination is such that, it is hoped, an adversary could not determine the meaning of the message without decrypting the message, for which he needs the key.
To break a message encrypted with private-key cryptography, an adversary must either exploit a weakness in the encryption algorithm itself, or else try an exhaustive search of all possible keys (brute force method). If the key is large enough (e.g., 128 bits), such a search would take a very long time (few years), even with very powerful computers. Private-key methods are efficient and difficult to break. However, one major drawback is that the key must be exchanged between the sender and recipient beforehand, raising the issue of how to protect the secrecy of the key. When the President of the United States exchanges launch codes with a nuclear weapons site under his command, the key is accompanied by a team of armed couriers. Banks likewise use high security in transferring their keys between branches. These types of key exchanges are not practical, however, for e-commerce between, say, amazon.com and a casual web surfer.
Public Key cryptography uses two keys Private key (known only by the recipient) and a Public key (known to everybody). The public key is used to encrypt the message and then it is sent to the recipient who can decrypt the message using the private key. The message encrypted with the public key cannot be decrypted with any other key except for its corresponding private key.
The public-key algorithm uses a one-way function to translate plaintext to ciphertext. Then, without the private key, it is very difficult for anyone (including the sender) to reverse the process (i.e. translate the ciphertext back to plaintext). A one-way function is a function that is easy to apply, but extremely difficult to invert. The most common one-way function used in public-key cryptography involves factoring very large numbers. The idea is that it is relatively easy to multiply numbers, even large ones, with a computer; however, it is very difficult to factor large numbers. The only known algorithms basically have to do a sort of exhaustive search with numbers 128 bits long, such a search requires performing as many tests as there are particles in the universe.
For instance, someone wishing to receive encrypted messages can multiply two very large numbers together. She keeps the two original numbers a secret, but sends the product to anyone who wishes to send her a message. The encryption/decryption algorithm is based upon combining the public number with the plaintext. Because it is a one-way function, the only way to reverse the process is to use one of the two original numbers. However, assuming the two original numbers are very large, their product is even bigger; it would be impractical for an adversary to try every possibility to determine what the two original numbers were.
Text From plain text (PT) the primary cipher text (CT) is obtained by using the encryption algorithm and the 1st level key (PK1). Abbreviations used are: CT-PRIMARY CIPHER TEXT, AUT-AUTHENTICATION CODE (ENCRYPTED FORM), INTR-INTEGRITY CODE (ENCRYPTED FORM), FT-FILE TYPE CODE (ENCRYPTED FORM), SPM-STARTING PRIMER (GARBAGE), EPM-ENDING PRIMER (GARBAGE), OCT-ORIGINAL CI-PHER TEXT FORMAT. The following steps are to be followed to obtain the final cipher text.
Senders side computation:
Receivers side computation:
Procedure Encryption:
Procedure Decryption:
The level (2) private key gives the information about the length of the primer and the positions of introns (fixed length garbage text, AUT, SPM, FT, EPM, INTR). The primers are added at the starting and at the ending of primary cipher text (CT), introns are inserted within the cipher text at positions as described by the Level (2) key. The sender file length is chosen as level2 key. The sum of the digits of the senders file length is taken as the input to decide the primer length. Introns positions are taken on the basis of the individual digits of the file length. But the sender should not send the raw file length (i.e. level2 key) to the receiver even though it is sending through secret channel so it has to be encoded using the following procedure:
Chosen key for encryption and decryption process is: “Sword”
A T T A C K S O U T H W H E N S U N R I S E
S W O R D S W O R D S W O R D S W O R D S W
S P H R F C O C L W Z S V V Q K Q B I L K A
plaintext for encryption and decryption process is: “Attack South when Sunrise”
Procedure: Start Wizard > Encryption/Decryption > Classic Encryption/Decryption > Encrypt using the key and plaintext mentioned above > Click Next, output is printed as following:
Encrypted message output is: “Sphrfc Oclwz svvq Kqbilka”
FLOWCHARTS:
XOR operation of the PK
Key Transmitionright02514600
Encryption Decryption
Network Security and Cryptography is a concept to protect network and data transmission over wire-less network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches many areas including secure communication channel, strong data encryption technique and trusted third party to maintain the database. The rapid development in information technology, the secure transmission of confidential data herewith gets a great deal of attention. The conventional methods of encryption can only maintain the data security.
The information could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption/decryption methods to enhance data security. Strong cryptography or cryptographically strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis. Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring extensive testing and reviews, preferably in a public forum. Good algorithms and protocols are required, and good system design and implementation is needed as well.
For instance, the operating system on which the crypto software runs should be as carefully secured as possible. DNA computational logic can be used in cryptography for encrypting, storing and transmitting the information, as well as for computation. Although in its primitive stage, DNA cryptography is shown to be very effective. In this paper, a proposal is given where the concept of DNA is being used in the encryption and decryption process. The theoretical analysis and implementations show this method to be efficient in computation, storage and transmission; and it is very powerful against certain attacks. This paper also proposes a unique cipher text generation procedure as well as a new key generation procedure. Finally, to demonstrate the performance of the proposed method, its implementation is explained and the results are analyzed.
DNA Cryptography: Revolutionizing Data Security with Biological Computing. (2024, Feb 21). Retrieved from https://studymoose.com/document/dna-cryptography-revolutionizing-data-security-with-biological-computing
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.
get help with your assignment