Implementation of DNA Cryptography using IBROS Cypher

Abstract

This paper presents a new DNA cryptographic system based on IBROS Cypher. IBROS mainly deals with manipulation in the binary form of the plain text message to encrypt and decrypt it. IBROS uses a completely randomized two key system, which makes it hard to break. Even after such complex methods, the applicability of each method is simple which makes it a fast DNA cryptography system. IBROS is an abbreviation for the five steps used in this cypher. They are – ICFM (Index Comparison Flip Mutation), BFM (Bit Flip Mutation), RFS (Rail Fence Straightening), OMB (One-to-Many Breeding), and Swap Mutation. All of these five steps are inspired from different fields of computing and cryptography, yet they are completely unique as cryptographic method. ICFM is inspired by the working principles of a Turing Machine, whereas BFM, OMB, and Swap Mutation are inspired by Genetic Algorithms, the method named RFS is a modified form of the traditional Rail Fence Cypher. IBROS works by taking the binary form of the plain text message, then passing it through each step serially, and finally encoded in to DNA bases using one of the eight rules of DNA encoding. Some of the presented methods in IBROS can be used not only for binary data but also for normal text data. This new technique will prove to be promising in the field of DNA computing.

Country : India

1 Abhishek Pandey2 Sourav Chanda

  1. Department of Computer Science & Engineering, Swami Vivekananda Institute of Science & Technology, Kolkata, India
  2. Department of Computer Science & Engineering, Swami Vivekananda Institute of Science & Technology, Kolkata, India

IRJIET, Volume 7, Issue 8, August 2023 pp. 72-82

doi.org/10.47001/IRJIET/2023.708010

References

  1. A. Kahate, “Cryptography: Concepts and Techniques,” in CRYPTOGRAPHY AND NETWORK SECURITY, Second ed., NEW DELHI, Tata McGraw-Hill Publishing Company Limited, 2008, pp. 38-83..
  2. D. Tulpan, C. Regoui, G. Durand, L. Belliveau, S. Leger, “HyDEn: A Hybrid Steganocryptographic Approach for Data Encryption Using Randomized Error-Correcting DNA Codes,” BioMed Research International, vol. 2013, pp. 1-11, 29 June 2013..
  3. R. Terec, M. Vaida, L. Alboaie, L. Chiorean, “DNA Security using Symmetric and Asymmetric Cryptography,” International Journal on New Computer Architectures and Their Applications (IJNCAA), pp. 34-51..
  4. L. M. Adleman, “Molecular Computation of Solutions to Combinatorial Problems,” Science, vol. 266, no. 5187, pp. 1021-1024, 1994..
  5. R. J. Lipton, “Using DNA to Solve NP-Complete Problems,” Science, vol. 268(4), pp. 542-545, 1995..
  6. J. Chen, “A DNA-based, Biomolecular Cryptography Design,” in International Symposium on Circuits and Systems, 2003..
  7. A. Hazra, S. Ghosh, S. Jash, “A New DNA Cryptography Based Algorithm Involving the Fusion of Symmetric-Key Techniques,” in Advanced Computational and Communication Paradigms, Advances in Intelligent Systems and Computing, 2018..
  8. P. Roy, D. Dey, D. De, Swati Sinha, “DNA Cryptography,” in Handbook of Research on Natural Computing for Optimization Problems, vol. II, IGI Global, pp. 813-840..
  9. “The Structure of DNA,” in Molecular Biology of the Gene, 7 ed., Pearson, pp. 78-81..
  10. James D. Watson, Francis H. C. Crick, “MOLECULAR STRUCTURE OF NUCLEIC ACIDS,” NATURE, 1953..
  11. “The Mutability and Repair of DNA,” in Molecular Biology of the Gene, 7 ed., Pearson, pp. 313-314..
  12. G. Cui, L. Qin, Y. Wang, X. Zhang, “An Encryption Scheme Using DNA Technology,” IEEE, pp. 37-42, 2008..
  13. M. R. Abbasy, P. Nikfard, A. Ordi, M. R. N. Torkaman, “DNA Base Data Hiding Algorithm,” International Journal on New Computer Architectures and Their Applications, vol. 2, no. 1, pp. 183-192, 2012..
  14. S. Pramanik, S. K. Setua, “DNA Cryptography,” in International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, 2012..
  15. A. Atito, A. Khalifa, S. Z. Rida, “DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques,” Journal of Communication and Computer Engineering, vol. 2, no. 3, pp. 44-49, 2012..
  16. P. K. R. Dr. R.Surendiran, "A Fog Computing Approach for Securing IoT Devices Datausing DNA-ECC Cryptography," DS Journal of Digital Science and Technology, vol. 1, no. 1, pp. 1, 2, 2022.
  17. E. B. K. Rama Devi, "An Enhancement in Data Security Using Trellis Algorithmwith DNA Sequences in Symmetric DNA Cryptography," Wireless Personal Communications, p. 1, 2022.
  18. A. M. Turing, “ON COMPUTABLE NUMBERS, WITH AN APPLICATION TO THE ENTSCHEIDUNGSPROBLEM”, Journal of Communication and Computer Engineering, vol. 2, no. 3, pp. 230-265, 1936..
  19. Dr. M. Panda, Dr. M. R. Patra, “Genetic Algorithms,” in Soft Computing: Concepts and Techniques, Second ed., NEW DELHI, University Science Press, 2013, pp. 82-92.