An Enhanced DNA Sequence Table for Improved Security and Reduced Computational Complexity of DNA Cryptography

Author(s):  
Maria Imdad ◽  
Sofia Najwa Ramli ◽  
Hairulnizam Mahdin ◽  
Boppana Udaya Mouni ◽  
Shakira Sahar
2018 ◽  
pp. 846-855
Author(s):  
Shipra Jain ◽  
Vishal Bhatnagar

In today's era, the traditional cryptographic methods are not sufficient to provide security to the data. Everyone wants to secure their data whether the data is bank transaction, email transaction, personal data or the data related to work. To provide security to the data, DNA cryptography emerges as a new field. DNA cryptography is a new branch of cryptography. It provides security to the data by converting the data in the form of DNA sequence. A lot of research has been done in the area of this cryptography. It consists of various stages like converting data in the form of DNA, reverse conversion, various methods of encryption etc. Various methods of encryption are present until now in the DNA cryptography. But the problem with them is that they all have more emphasis on biological encryption methods. There is a need of methods which make use of simple biological methods and complex binary or other number system encryption. In this paper, the authors are proposing a new algorithm for providing security to the data at two levels. The authors propose a parabolic transposition in a circular arrangement of data. In the proposed algorithm, data is arranged in a circular way. The number of rows and columns acts as a key for binary encryption. For encrypting the DNA sequence, the authors convert the DNA sequence into amino acid. This amino acid sequence will act as a cipher text and send to the receiver through the open environment. The proposed algorithm is a type of block cipher. It is a transposition cipher. It changes the position of data for binary encryption.


An enhanced technique to generate unique code using DNA sequences that encrypt and decrypt plaintext of characters, text file(.txt,.doc,.docx),image (jpg, jpeg), audio(.mp3) and video(.mp4) using a dynamic DNA key-based cryptography. Cryptography is always considered as secured way for transferring information over insecure channel by achieving confidentiality, privacy and integrity. Since last 10 years traditional cryptography approaches are been replaced with more efficient and effective cryptographic systems like DNA Cryptography. This system takes the DNA sequence as the input and generates a key randomly and is used to decrypt the data without non-integrity of data. This system provides two stages of data security using DNA sequences.


2015 ◽  
Vol 28 (2) ◽  
pp. 20-31 ◽  
Author(s):  
Shipra Jain ◽  
Vishal Bhatnagar

In today's era, the traditional cryptographic methods are not sufficient to provide security to the data. Everyone wants to secure their data whether the data is bank transaction, email transaction, personal data or the data related to work. To provide security to the data, DNA cryptography emerges as a new field. DNA cryptography is a new branch of cryptography. It provides security to the data by converting the data in the form of DNA sequence. A lot of research has been done in the area of this cryptography. It consists of various stages like converting data in the form of DNA, reverse conversion, various methods of encryption etc. Various methods of encryption are present until now in the DNA cryptography. But the problem with them is that they all have more emphasis on biological encryption methods. There is a need of methods which make use of simple biological methods and complex binary or other number system encryption. In this paper, the authors are proposing a new algorithm for providing security to the data at two levels. The authors propose a parabolic transposition in a circular arrangement of data. In the proposed algorithm, data is arranged in a circular way. The number of rows and columns acts as a key for binary encryption. For encrypting the DNA sequence, the authors convert the DNA sequence into amino acid. This amino acid sequence will act as a cipher text and send to the receiver through the open environment. The proposed algorithm is a type of block cipher. It is a transposition cipher. It changes the position of data for binary encryption.


Author(s):  
Ravinder Paspula ◽  
K. Chiranjeevi ◽  
S. Laxman Kumar

A new-promising technology called DNA-Cryptography is emerged in the area of DNA- Computing field.DNA useful for store, sending the data and also to perform computation. Even it is under primal level, DNA-Based molecular Cryptography system is shows extremely efficient. This technique offers a unique cipher-text generation process and a new key generation practice. This method used to implement a procedure which includes two stages. First stage generates a session key and encryption key and it uses cipher block chaining mode-CBC, the secrete number(s) and incorporate plain-text M into level-1 cipher-text. The last stage converts the level-1 cipher-text into level-2 cipher-text (s). The level-2 cipher-text is again transformed into human made DNA-sequence (S’) and is given to the receiver along with many other DNA-sequence. By this process it will become a more complicated for un-authorized user to gain original information. The receiver will apply the process to identify the human made DNA sequence with M hidden in it and extract the original message M.


Author(s):  
B. Murali Krishna ◽  
CH. Surendra ◽  
K. Mani Varma ◽  
K. Mani Kanta ◽  
S.K. Shabbeer ◽  
...  

<p>To convey the information safely DNA grouping mechanisms are used. There are many methods used by DNA sequences. The proposed method is of both encryption and information concealing utilizing a few properties of Deoxyribonucleic Acid (DNA) groupings. This technique is highlighted that DNA groupings have many more intriguing properties which are used for concealing the information. There are three strategies in this encryption strategy: the Insertion Technique, the Complimentary Pair Technique and the Substitution Strategy .For every single strategy, a specific reference DNA grouping P is chosen and then the taken sequence is changed over with the mystery message M and is consolidated, so that P0 is acquired. P0 is then sent to the collector and the beneficiary can recognize and separate the message M covered up in P. This technique is proposed to utilize INSERTION Strategy. Subsequently, the proposed plan comprises for the most part of two stages. In the principal stage, the mystery information is encoded utilizing a DNA Sequence. In the second stage the encoded information is steganographically covered up into some reference DNA grouping utilizing an insertion strategy. The effectiveness of this security algorithm is seen with many merits and limitations. A, C, G, and T are the 4 nucleotides which are taken for this project.</p>


Author(s):  
Barbara Trask ◽  
Susan Allen ◽  
Anne Bergmann ◽  
Mari Christensen ◽  
Anne Fertitta ◽  
...  

Using fluorescence in situ hybridization (FISH), the positions of DNA sequences can be discretely marked with a fluorescent spot. The efficiency of marking DNA sequences of the size cloned in cosmids is 90-95%, and the fluorescent spots produced after FISH are ≈0.3 μm in diameter. Sites of two sequences can be distinguished using two-color FISH. Different reporter molecules, such as biotin or digoxigenin, are incorporated into DNA sequence probes by nick translation. These reporter molecules are labeled after hybridization with different fluorochromes, e.g., FITC and Texas Red. The development of dual band pass filters (Chromatechnology) allows these fluorochromes to be photographed simultaneously without registration shift.


2012 ◽  
pp. n/a-n/a
Author(s):  
Qian-Quan Li ◽  
Min-Hui Li ◽  
Qing-Jun Yuan ◽  
Zhan-Hu Cui ◽  
Lu-Qi Huang ◽  
...  

1997 ◽  
Vol 77 (05) ◽  
pp. 1034-1035 ◽  
Author(s):  
Tomohiro Hayashi ◽  
Keijiroh Suzuki ◽  
Akito Yahagi ◽  
Jiroh Akiba ◽  
Katsushi Tajima ◽  
...  

CounterText ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 63-77
Author(s):  
Louis Armand
Keyword(s):  

This essay examines the convergence of conceptualist poetics with evolutionary code as a form of ‘becoming alien’. The focus is Christian Bök's The Xenotext project: an attempt at translating a ‘short verse about language and genetics’, using a chemical alphabet, into a DNA sequence implanted into the genome of a polyextremophile bacterium capable of enduring conditions in outerspace. Bök describes the project as, ‘in effect, engineering a life-form so that it becomes not only a durable archive for storing a poem, but also as an operant machine for writing a poem – one that can persist on the planet until the sun itself explodes …’. The concrete, constraint-based character of Bök's project evokes a mode of writing between posthumanist aesthetics and a positivist grammatology by turns deconstructive and itself requiring of deconstruction.


Sign in / Sign up

Export Citation Format

Share Document