scholarly journals Transmission of Data in Secure Manner With DNA Sequence

Author(s):  
Ravinder Paspula ◽  
K. Chiranjeevi ◽  
S. Laxman Kumar

A new-promising technology called DNA-Cryptography is emerged in the area of DNA- Computing field.DNA useful for store, sending the data and also to perform computation. Even it is under primal level, DNA-Based molecular Cryptography system is shows extremely efficient. This technique offers a unique cipher-text generation process and a new key generation practice. This method used to implement a procedure which includes two stages. First stage generates a session key and encryption key and it uses cipher block chaining mode-CBC, the secrete number(s) and incorporate plain-text M into level-1 cipher-text. The last stage converts the level-1 cipher-text into level-2 cipher-text (s). The level-2 cipher-text is again transformed into human made DNA-sequence (S’) and is given to the receiver along with many other DNA-sequence. By this process it will become a more complicated for un-authorized user to gain original information. The receiver will apply the process to identify the human made DNA sequence with M hidden in it and extract the original message M.

An enhanced technique to generate unique code using DNA sequences that encrypt and decrypt plaintext of characters, text file(.txt,.doc,.docx),image (jpg, jpeg), audio(.mp3) and video(.mp4) using a dynamic DNA key-based cryptography. Cryptography is always considered as secured way for transferring information over insecure channel by achieving confidentiality, privacy and integrity. Since last 10 years traditional cryptography approaches are been replaced with more efficient and effective cryptographic systems like DNA Cryptography. This system takes the DNA sequence as the input and generates a key randomly and is used to decrypt the data without non-integrity of data. This system provides two stages of data security using DNA sequences.


A novel cryptographic algorithm, namely Significant Secure Biometric Key (SSBK) algorithm is proposed.The novel algorithm is compared with the existing cryptographic algorithms like Advanced Encryption Standard (AES), key exchange algorithm like Diffie-Helman and also with Symmetric Random Biometric Key (SRBK) algorithm, and finally we prove the proposed algorithm is superior than existing algorithm based on few parameters. A sample plain text is taken and converted to cipher text and the key from the biometric feature is used for encryption and decryption. In the key generation process, the bi-modal biometrics, namely Ear and Lip features are taken. The concatenated key values obtained from ear and lip can be of minimum 8 bits to the maximum of 1024 bits based on the type of algorithm used.


2020 ◽  
Vol 4 (2) ◽  
pp. 92-97
Author(s):  
Abd Charis Fauzan ◽  
Veradella Yuelisa Mafula

Security and confidentiality of documents stored on a computer is an important aspect in the field of computer or information system security. Documents will no longer be useful if they are intercepted or hijacked by unauthorized people, they will even endanger the document owner, if documents containing important information are misused by irresponsible people. Therefore the documents on the computer must be preserved so that they are only accepted and used by interested persons. One of the solutions to prevent eavesdropping of documents is to use cryptography. This study aims to increase cryptographic complexity using a combination of hill cipher algorithms and block chaining cipher modes. The combination of the two methods is expected to be able to cover the shortcomings of each method so that the cryptographic complexity can be increased. The method in this study consists of two stages, namely the document encryption and document decryption stages. The encryption stage is to change the plaintext document into a ciphertext document, on the other hand, the decryption stage is to change the ciphertext document back into a plaintext document. The stages for document encryption include; 1) retrieve plain text messages in the document so that they can be processed by the system (parsing); 2) encryption to convert plaintext documents into ciphertext documents using the hill cipher algorithm; 3) encryption to convert plaintext documents into cipher text documents using cipher block chaining mode. While the methods for decryption are 1) taking the ciphertext message in the document so that it can be processed by the system (parsing); 2) decryption to convert ciphertext documents into plaintext documents using cipher block chaining mode; 3) decryption to convert ciphertext documents into plaintext documents using a hill cipher.


2015 ◽  
Vol 28 (2) ◽  
pp. 20-31 ◽  
Author(s):  
Shipra Jain ◽  
Vishal Bhatnagar

In today's era, the traditional cryptographic methods are not sufficient to provide security to the data. Everyone wants to secure their data whether the data is bank transaction, email transaction, personal data or the data related to work. To provide security to the data, DNA cryptography emerges as a new field. DNA cryptography is a new branch of cryptography. It provides security to the data by converting the data in the form of DNA sequence. A lot of research has been done in the area of this cryptography. It consists of various stages like converting data in the form of DNA, reverse conversion, various methods of encryption etc. Various methods of encryption are present until now in the DNA cryptography. But the problem with them is that they all have more emphasis on biological encryption methods. There is a need of methods which make use of simple biological methods and complex binary or other number system encryption. In this paper, the authors are proposing a new algorithm for providing security to the data at two levels. The authors propose a parabolic transposition in a circular arrangement of data. In the proposed algorithm, data is arranged in a circular way. The number of rows and columns acts as a key for binary encryption. For encrypting the DNA sequence, the authors convert the DNA sequence into amino acid. This amino acid sequence will act as a cipher text and send to the receiver through the open environment. The proposed algorithm is a type of block cipher. It is a transposition cipher. It changes the position of data for binary encryption.


2020 ◽  
Vol 8 (5) ◽  
pp. 2355-2359

Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method in which user’s confidential data or private data is encoded to cipher text and this text can be read only if it is decrypted by authorized user using the right key. Cipher text can be decoded back to plain text, only by the authorized users using a right key. Various encryption algorithm are used to encrypt the plain text to cipher text and the cipher text is decrypted back to plain text by authorized user using right key. The symmetric key algorithm uses the same key to encrypt the plain text and decrypt the cipher text. In this paper we have proposed new symmetric algorithm using ASCII value. The plain text using key and ASCII values is converted to cipher text. Encryption algorithm sends cipher text and minimum value to the authorized receiver. Receiver decrypts the cipher text to plain text using same key and minimum value. In this algorithm sequence of five pseudo random number is generated and sum of this five pseudo random number is added to the obtained decimal value. Seed to generate common sequence of pseudo random number is kept secret between sender and receiver. Proposed algorithm support variable key length and plain text size. This algorithms performs faster when text is small message, but the execution time increases as the plain text size increases. This algorithm can be used to send small messages in a secured way. .


Author(s):  
B. Murali Krishna ◽  
CH. Surendra ◽  
K. Mani Varma ◽  
K. Mani Kanta ◽  
S.K. Shabbeer ◽  
...  

<p>To convey the information safely DNA grouping mechanisms are used. There are many methods used by DNA sequences. The proposed method is of both encryption and information concealing utilizing a few properties of Deoxyribonucleic Acid (DNA) groupings. This technique is highlighted that DNA groupings have many more intriguing properties which are used for concealing the information. There are three strategies in this encryption strategy: the Insertion Technique, the Complimentary Pair Technique and the Substitution Strategy .For every single strategy, a specific reference DNA grouping P is chosen and then the taken sequence is changed over with the mystery message M and is consolidated, so that P0 is acquired. P0 is then sent to the collector and the beneficiary can recognize and separate the message M covered up in P. This technique is proposed to utilize INSERTION Strategy. Subsequently, the proposed plan comprises for the most part of two stages. In the principal stage, the mystery information is encoded utilizing a DNA Sequence. In the second stage the encoded information is steganographically covered up into some reference DNA grouping utilizing an insertion strategy. The effectiveness of this security algorithm is seen with many merits and limitations. A, C, G, and T are the 4 nucleotides which are taken for this project.</p>


2018 ◽  
Vol 5 (2) ◽  
pp. 7 ◽  
Author(s):  
Ahmad Aunur Rohman
Keyword(s):  
Level 1 ◽  

Penelitian ini dimaksudkan untuk mengetahui bagaimana kemampuan komunikasi matematis mahasiswa terhadap pemahaman statistika. Data dalam penelitian ini berupa hasil pekerjaan tes tertulis tentang kemampuan komunikasi matematis dan wawancara terhadap subjek penelitian. Pengumpulan data diperoleh dengan tes dan wawancara. Uji keabsahan data yang digunakan adalah triangulasi. Data penelitan yang terkumpul dianalisis dengan analisis data non statistik yang terdiri dari tiga alur, yaitu reduksi data, penyajian data, dan penarikan kesimpulan/verifikasi data. Hasil penelitian menunjukkan bahwa 1) Terdapat 5 mahasiswa yang berada pada level 0 (sangat kurang baik); 2) 24 mahasiswa berada pada level 1 (kurang baik); 3) 6 mahasiswa berada pada level 2 (cukup baik); Penelitian ini diharapkan dapat memacu individu lain untuk melakukan penelitian yang lebih baik dan mendalam tentang kemampuan komunikasi matematis.


Author(s):  
Lania Muharsih ◽  
Ratih Saraswati

This study aims to determine the training evaluation at PT. Kujang Fertilizer. PT. Pupuk Kujang is a company engaged in the field of petrochemicals. Evaluation sheet of PT. Fertilizer Kujang is made based on Kirkpatrick's theory which consists of four levels of evaluation, namely reaction, learning, behavior, and results. At level 1, namely reaction, in the evaluation sheet is in accordance with the theory of Kirkpatrick, at level 2 that is learning should be held pretest and posttest but only made scale. At level 3, behavior, according to theory, but on assessment factor number 3, quantity and work productivity should not need to be included because they are included in level 4. At level 4, that is the result, here is still lacking to get a picture of the results of the training that has been carried out because only based on answers from superiors without evidence of any documents.   Keywords: Training Evaluation, Kirkpatrick Theory.    Penelitian ini bertujuan mengetahui evaluasi training di PT. Pupuk Kujang. PT. Pupuk Kujang merupakan perusahaan yang bergerak di bidang petrokimia. Lembar evaluasi PT. Pupuk Kujang dibuat berdasarkan teori Kirkpatrick yang terdiri dari empat level evaluasi, yaitu reaksi, learning, behavior, dan hasil. Pada level 1 yaitu reaksi, di lembar evaluasi tersebut sudah sesuai dengan teori dari Kirkpatrick, pada level 2 yaitu learning seharusnya diadakan pretest dan posttest namun hanya dibuatkan skala. Pada level 3 yaitu behavior, sudah sesuai teori namun pada faktor penilaian nomor 3 kuantitas dan produktivitas kerja semestinya tidak perlu dimasukkan karena sudah termasuk ke dalam level 4. Pada level 4 yaitu hasil, disini masih sangat kurang untuk mendapatkan gambaran hasil dari pelatihan yang sudah dilaksanakan karena hanya berdasarkan dari jawaban atasan tanpa bukti dokumen apapun.   Kata kunci: Evaluasi Pelatihan, Teori Kirkpatrick.


Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


Author(s):  
Christian Huber ◽  
Philipp Nicolay ◽  
Simone Weber

ZusammenfassungSchulleistungen und soziale Integration sind im deutschen Schulsystem eng miteinander verbunden. Unklar ist, welche Rolle die Leistungs- und Verhaltensheterogenität für diesen Zusammenhang spielt. Vertreter*innen eines klassischen sozialpsychologischen Zugangs sagen für eine hohe Leistungs- und Verhaltensheterogenität eine Erhöhung des Risikos auf soziale Ausgrenzung (Risikohypothese) voraus, Vertreter*innen eines inklusionspädagogischen Zugangs eine Schutzfunktion (Schutzhypothese). Die vorliegende Studie untersucht, inwieweit die Leistungs- und Verhaltensheterogenität den Zusammenhang zwischen einem Förderbedarf in den Bereichen Lernen/Verhalten und sozialer Integration moderiert und ob die Richtung dieses Modertoreffekt im Sinne der Schutz- oder der Risikohypothese gedeutet werden kann. Hierzu wurden N = 1352 Grundschüler*innen in drei unterschiedlich heterogenen Schulsystemen (jahrgangsgetrennt, 1/2/3/4; teilweise jahrgangsübergreifend, 1–2/3–4; jahrgangsübergreifend, 1–4) in einer Querschnittstudie untersucht. Erhoben wurden, neben der sozialen Integration, Informationen über einen besonderen Förderbedarf in den Bereichen Lernen und Verhalten und Schulleistung. Das Schulsystem ging als unabhängige Variable auf Level 2, der Förderbedarf als unabhängige Variable auf Level 1 und die soziale Integration als abhängige Variable in die mehrebenenanalytische Auswertung ein. Analog zu bisher vorliegenden Befunden wurde ein signifikanter Haupteffekt beider Förderbedarfe auf die soziale Integration gefunden. Ferner zeigten vier von sechs Cross-Level-Effekten für den Förderbedarf Lernen Hinweise auf eine Gültigkeit der Schutzhypothese, kein Cross-Level-Effekt war im Sinne der Risikohypothese interpretierbar. Dieser Befund war nicht auf den Förderbedarf Verhalten übertragbar. Die Ergebnisse legen nahe, dass sich der Zusammenhang zwischen sozialer Integration und Förderbedarf Lernen mit zunehmender Leistungs- und Verhaltensheterogenität abschwächt. Gleichzeitig zeigte sich in den stark heterogenen Lerngruppen ein insgesamt erhöhtes Ausgrenzungsrisiko aller Schüler*innen unabhängig ihres Förderbedarfs. Die Ergebnisse lassen den Schluss zu, dass sich für Schüler*innen mit erhöhtem Förderbedarf Lernen im jahrgangsübergreifenden Lernen eine höhere Chance für eine gute soziale Integration einstellen könnte.


Sign in / Sign up

Export Citation Format

Share Document