Deoxyribonucleic Acid (DNA) Computing using Two-by-Six Complementary and Color Code Cipher

Authors

  • B Adithya Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry-605014
  • G Santhi Department of Information Technology, Pondicherry Engineering College, Puducherry-605014

Keywords:

Deoxyribonucleic Acid, DNA Computing, Color, Cryptography, Eavesdropper

Abstract

Information obnubilating hides information to obviate the information from being leaked into the subsisting networking in order to see the exact confidentiality of all their germane info, which plays a paramount part in Deoxyribonucleic Acid (DNA) cryptography. In this paper, DNA computing color code cryptographic strategy is proposed to ensure that the data protection out of the eavesdropper. The text message in format is encrypted into cipher shade utilizing DNA cryptography.   There is a supersession procedure utilized to obnubilate the mystery message that was scrambled to some reference DNA. That is the bases of the benchmark DNA are superseded together with the generic DNA depending on a standard two-by-six complementary pair rule. Representation of text gives a color of universal and thus a little substantial difference in coloring is more complicated to understand than changes in brightness. 

Downloads

Download data is not yet available.

References

Adleman, L.M. (1994). Molecular Computation of Solutions to Combinatorial Problems, Science, 266(5187), 1021-4. https://doi.org/10.1126/science.7973651

Alberts, B., Johnson, A., Lewis, J., Raff, M., Roberts, K., and Walter, P. (2008). Molecular Biology of the Cell, 2nd, Garland Science. https://doi.org/10.1201/9780203833445

Chang, W., Guo, M., and Ho, M.S. (2005). Fast parallel molecular algorithms for DNA-based computation: factoring integers, NanoBioscience, 4, 149-163. https://doi.org/10.1109/TNB.2005.850474

Chen, Z., and Xu, I. (2008). One-Time-Pads encryption in the tile assembly model, Bio-Inspired Computing: Theories and Applications, 23-30.

Clelland, C. T., Risca, V., and Bancroft, C. (1999). Hiding messages in DNA microdots, Nature, 399, 533-534. https://doi.org/10.1038/21092

Cui, G., Li, C., Li, H., and Li, X. (2009). DNA Computing and Its Application to Information Security Field, IEEE International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/ICNC.2009.27

Fasila, K.A., Antony, D. (2014). A multiphase cryptosystem with secure key encapsulation scheme based on principles of DNA computing, IEEE International Conference on Advances in Computing and Communications (ICACC 2014). https://doi.org/10.1109/ICACC.2014.7

Gehani, A., LaBean, T., and Reif, J. (2004). DNA-based Cryptography, Lecture Notes in Computer Science, 2950, 167-188. https://doi.org/10.1007/978-3-540-24635-0_12

Hood, L., and Galas D. (2003). The digital code of DNA, Nature, 421. https://doi.org/10.1038/nature01410

Leier, A., Richter, C., Banzhaf, W., and Rauhe, H. (2000). Cryptography with DNA binary strands, Biosystems, 57, 13-22. https://doi.org/10.1016/S0303-2647(00)00083-6

Lu, M., Lai, X., Xiao, G., and Qin, L. (2007). Symmetric-key cryptosystem with DNA technology," Science China Information Sciences, 50, 324-333. https://doi.org/10.1007/s11432-007-0025-6

Ning, K. (2009). A pseudo DNA cryptography Method, DBLP: journals/corr/abs-0903-2693.

Popovici, C. (20l0). Aspects of DNA Cryptography, Annals of the University of Craiova, Mathematics and Computer Science Series, 37, 147-151.

Shanmuga, S. G., Pavithra, S., Arthi, A., Madubala, B., and Mahalakshmi, S., (2015). Cellular automata based DNA cryptography algorithm, IEEE conference on ISCO. https://doi.org/10.1109/ISCO.2015.7282333

Shiu, H. J., Ng, K L., Fang, J. F., Lee, R. C. T., and Huang, C. H. (2010). Data hiding methods based upon DNA sequences, Information Sciences, 180, 2196-2208. https://doi.org/10.1016/j.ins.2010.01.030

Suryavanshi, H., and Bansal, P. (2012). An Improved Cryptographic Algorithm using UNICODE and Universal Colors, WOCN-2012, 3, 1-3. https://doi.org/10.1109/WOCN.2012.6335543

Xiao, G., Lu, M., Qin, L., and Lai, X. (2006) New field of cryptography: DNA cryptography, Chinese Science Bulletin, 51, 1413-l420. https://doi.org/10.1007/s11434-006-2012-5

Yunpeng, Z., Yu, Z., Zhong, W., and Sinnott, R.O. (2011). Index-based symmetric DNA encryption algorithm, 4th International Congress on Image and Signal Processing, 5, pp.2290-2294. https://doi.org/10.1109/CISP.2011.6100690

Zhang, X., Niu, Y., and Cui, G. (2008). Breaking the NTRU public-key cryptosystem using self:assembly of DNA tilings, Chinese Journal of computers, 31, 2129-2137. https://doi.org/10.3724/SP.J.1016.2008.02129

Published

2021-03-16

How to Cite

Adithya, B., & Santhi, G. (2021). Deoxyribonucleic Acid (DNA) Computing using Two-by-Six Complementary and Color Code Cipher. Bulletin of Computer Science and Electrical Engineering, 2(1). Retrieved from http://bcsee.org/index.php/bcsee/article/view/1138