Bit based symmetric encryption method using DNA Sequence

Author(s):  
Shipra Jain ◽  
Vishal Bhatnagar
Symmetry ◽  
2021 ◽  
Vol 13 (6) ◽  
pp. 1066
Author(s):  
Siyu Pang ◽  
Tingting Lin ◽  
Xuejia Lai ◽  
Zheng Gong

IDEA is a classic symmetric encryption algorithm proposed in 1991 and widely used in many applications. However, there is little research into white-box IDEA. In traditional white-box implementations of existing block ciphers, S-boxes are always converted into encoded lookup tables. However, the algebraic operations of IDEA without S-boxes, make the implementation not straight forward and challenging. We propose a white-box implementation of IDEA by applying a splitting symmetric encryption method, and verify its security against algebraic analysis and BGE-like attacks. Our white-box implementation requires an average of about 2800 ms to encrypt a 64-bit plaintext, about 60 times more than the original algorithm would take, which is acceptable for practical applications. Its storage requirements are only about 10 MB. To our knowledge, this is the first public white-box IDEA solution, and its design by splitting can be applied to similar algebraic encryption structures.


2017 ◽  
Vol 6 (1) ◽  
Author(s):  
Abdelkader Moumen ◽  
Hocine Sissaoui

AbstractVulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.


Known to date means of information protection does not have a high degree of noise immunity and reliability. This work is related to the development of a more effective way to protect the source information using a software-analytical method based on the Vigenère cipher. The best known and most widely used methods of symmetric encryption are DES and the Vigenère cipher. The Vigenère cipher is a polyalphabetic encryption method for alphabetic text by using key words. The Vigenère cipher requires a single key asked a set b of letters. These sets are signed with the repetition of the message, and then the generated sequence is added back to the plaintext on modul (the power of the alphabet). To achieve this goal we propose to use multiple iteration in which the corresponding algorithms of encryption and decryption consist of successive cycles of the same type of encryption. The developed mathematical model for block coding, as well as methods and algorithms for their decoding. Presented in a modified Vigenère algorithm with the use of a block cipher based on variation of number of iteration with shift key, allows, in contrast to the known algorithms that more reliably protect the data on the Web server.


Author(s):  
Ravinder Paspula ◽  
K Chiran jeevi ◽  
Krishna Kishor ◽  
B.Ramy sree

2021 ◽  
Vol 11 (4) ◽  
pp. 1781
Author(s):  
Peng Wang ◽  
Xiang Li

Recent years have seen an increasing emphasis on information security, and various encryption methods have been proposed. However, for symmetric encryption methods, the well-known encryption techniques still rely on the key space to guarantee security and suffer from frequent key updating. Aiming to solve those problems, this paper proposes a novel symmetry-key method for text encryption based on deep learning called TEDL, where the secret key includes hyperparameters in the deep learning model and the core step of encryption is transforming input data into weights trained under hyperparameters. Firstly, both communication parties establish a word vector table by training a deep learning model according to specified hyperparameters. Then, a self-update codebook is constructed on the word vector table with the SHA-256 function and other tricks. When communication starts, encryption and decryption are equivalent to indexing and inverted indexing on the codebook, respectively, thus achieving the transformation between plaintext and ciphertext. Results of experiments and relevant analyses show that TEDL performs well for security, efficiency, generality, and has a lower demand for the frequency of key redistribution. Especially, as a supplement to current encryption methods, the time-consuming process of constructing a codebook increases the difficulty of brute-force attacks, meanwhile, it does not degrade the efficiency of communications.


Author(s):  
Barbara Trask ◽  
Susan Allen ◽  
Anne Bergmann ◽  
Mari Christensen ◽  
Anne Fertitta ◽  
...  

Using fluorescence in situ hybridization (FISH), the positions of DNA sequences can be discretely marked with a fluorescent spot. The efficiency of marking DNA sequences of the size cloned in cosmids is 90-95%, and the fluorescent spots produced after FISH are ≈0.3 μm in diameter. Sites of two sequences can be distinguished using two-color FISH. Different reporter molecules, such as biotin or digoxigenin, are incorporated into DNA sequence probes by nick translation. These reporter molecules are labeled after hybridization with different fluorochromes, e.g., FITC and Texas Red. The development of dual band pass filters (Chromatechnology) allows these fluorochromes to be photographed simultaneously without registration shift.


Sign in / Sign up

Export Citation Format

Share Document