Design of Extra Layer of Security Key Generating Algorithm Based on DNA Cryptography Using VLSI

Abstract

This work represents the design of a Key Generating Algorithm based on DNA Cryptography focused on providing an extra layer of security for protecting the key. An illegal proficient exercise, i.e., data theft during communications, is still going on and attempts are constantly being made in this area to break the encrypted data before reaching it to the authorized destination by some Cryptanalyst. On the other end, there is a lot of research going on to render the data safe through encrypting them during communication and a complex key generation process for decrypting encrypted data. Many latest attacks are made by learning the patterns of the key. So, to improve the security and to optimize the design, this approach generates DNA string as the key that provides enhanced security. The notion of using DNA computing in cryptography has been recognized as a potential breakthrough that might meet a new need for unbreakable algorithms. DNA Key Generating Algorithm has been developed for more secure data concealing and symmetric key generation utilizing genetic databases. The proposed algorithm is implemented using Verilog coding, simulated using Vivado simulator and synthesized using Vivado 2017.4. 

Country : India

1 Dr. I. Selvamani

  1. Professor, Department of Electronics and Communication Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India

IRJIET, Volume 3, Issue 10, October 2019 pp. 56-59

.

References

  1. Bahubali Akiwate, Latha Parthiban, “A Dynamic DNA for Key-based Cryptography”, 2018.
  2. Anupam Das, Shikhar Kumar Sarma, Shrutimala Deka, “Data Security with DNA Cryptography”, 2019.
  3. Thockchom Birjit Singha, Roy Paily Palathinkal, Shaik Rafi Ahamed, “Implementation of AES Using Composite Field Arithmetic for IoT Applications”, 2020.
  4. Bhavani, Sai Srikar Puppala, B.Jaya Krishna, Srija Madarapu, “Modified AES using Dynamic S-Box and DNA Cryptography”, 2019.
  5. William Stallings, “Cryptography and Network Security: Principles and Practice”.