Deoxyribonucleic Acid (DNA) Computing using Two-by-Six Complementary and Color Code Cipher
Keywords:Deoxyribonucleic Acid, DNA Computing, Color, Cryptography, Eavesdropper
Information obnubilating hides information to obviate the information from being leaked into the subsisting networking in order to see the exact confidentiality of all their germane info, which plays a paramount part in Deoxyribonucleic Acid (DNA) cryptography. In this paper, DNA computing color code cryptographic strategy is proposed to ensure that the data protection out of the eavesdropper. The text message in format is encrypted into cipher shade utilizing DNA cryptography. There is a supersession procedure utilized to obnubilate the mystery message that was scrambled to some reference DNA. That is the bases of the benchmark DNA are superseded together with the generic DNA depending on a standard two-by-six complementary pair rule. Representation of text gives a color of universal and thus a little substantial difference in coloring is more complicated to understand than changes in brightness.
Adleman, L.M. (1994). Molecular Computation of Solutions to Combinatorial Problems, Science, 266(5187), 1021-4. doi: 10.1126/science.7973651.
Alberts, B., Johnson, A., Lewis, J., Raff, M., Roberts, K., and Walter, P. (2008). Molecular Biology of the Cell, 2nd, Garland Science.
Hood, L., and Galas D. (2003). The digital code of DNA, Nature, 421.
Leier, A., Richter, C., Banzhaf, W., and Rauhe, H. (2000). Cryptography with DNA binary strands, Biosystems, 57, 13-22.
Gehani, A., LaBean, T., and Reif, J. (2004). DNA-based Cryptography, Lecture Notes in Computer Science, 2950, 167-188.
Chang, W., Guo, M., and Ho, M.S. (2005). Fast parallel molecular algorithms for DNA-based computation: factoring integers, NanoBioscience, 4, 149-163.
Xiao, G., Lu, M., Qin, L., and Lai, X. (2006) New field of cryptography: DNA cryptography, Chinese Science Bulletin, 51, 1413-l420.
Lu, M., Lai, X., Xiao, G., and Qin, L. (2007). Symmetric-key cryptosystem with DNA technology," Science China Information Sciences, 50, 324-333.
Chen, Z., and Xu, I. (2008). One-Time-Pads encryption in the tile assembly model, Bio-Inspired Computing: Theories and Applications, 23-30.
Zhang, X., Niu, Y., and Cui, G. (2008). Breaking the NTRU public-key cryptosystem using self:assembly of DNA tilings, Chinese Journal of computers, 31, 2129-2137.
Popovici, C. (20l0). Aspects of DNA Cryptography, Annals of the University of Craiova, Mathematics and Computer Science Series, 37, 147-151.
Shanmuga, S. G., Pavithra, S., Arthi, A., Madubala, B., and Mahalakshmi, S., (2015). Cellular automata based DNA cryptography algorithm, IEEE conference on ISCO. doi: 10.1109/ISCO.2015.7282333
Fasila, K.A., Antony, D. (2014). A multiphase cryptosystem with secure key encapsulation scheme based on principles of DNA computing, IEEE International Conference on Advances in Computing and Communications (ICACC 2014). doi: 10.1109/ICACC.2014.7
Suryavanshi, H., and Bansal, P. (2012). An Improved Cryptographic Algorithm using UNICODE and Universal Colors, WOCN-2012, 3, 1–3. doi:10.1109/WOCN.2012.6335543
Yunpeng, Z., Yu, Z., Zhong, W., and Sinnott, R.O. (2011). Index-based symmetric DNA encryption algorithm, 4th International Congress on Image and Signal Processing, 5, pp.2290-2294.
Ning, K. (2009). A pseudo DNA cryptography Method, DBLP: journals/corr/abs-0903-2693.
Shiu, H. J., Ng, K L., Fang, J. F., Lee, R. C. T., and Huang, C. H. (2010). Data hiding methods based upon DNA sequences, Information Sciences, 180, 2196-2208.
Cui, G., Li, C., Li, H., and Li, X. (2009). DNA Computing and Its Application to Information Security Field, IEEE International Conference on Computing, Networking and Communications (ICNC). doi: 10.1109/ICNC.2009.27
Clelland, C. T., Risca, V., and Bancroft, C. (1999). Hiding messages in DNA microdots, Nature, 399, 533-534.
How to Cite
Copyright (c) 2021 B Adithya, G Santhi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.