Deoxyribonucleic Acid (DNA) Computing using Two-by-Six Complementary and Color Code Cipher


  • B Adithya Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry-605014
  • G Santhi Department of Information Technology, Pondicherry Engineering College, Puducherry-605014


Deoxyribonucleic Acid, DNA Computing, Color, Cryptography, Eavesdropper


Information obnubilating hides information to obviate the information from being leaked into the subsisting networking in order to see the exact confidentiality of all their germane info, which plays a paramount part in Deoxyribonucleic Acid (DNA) cryptography. In this paper, DNA computing color code cryptographic strategy is proposed to ensure that the data protection out of the eavesdropper. The text message in format is encrypted into cipher shade utilizing DNA cryptography.   There is a supersession procedure utilized to obnubilate the mystery message that was scrambled to some reference DNA. That is the bases of the benchmark DNA are superseded together with the generic DNA depending on a standard two-by-six complementary pair rule. Representation of text gives a color of universal and thus a little substantial difference in coloring is more complicated to understand than changes in brightness. 


Download data is not yet available.


Adleman, L.M. (1994). Molecular Computation of Solutions to Combinatorial Problems, Science, 266(5187), 1021-4.

Alberts, B., Johnson, A., Lewis, J., Raff, M., Roberts, K., and Walter, P. (2008). Molecular Biology of the Cell, 2nd, Garland Science.

Chang, W., Guo, M., and Ho, M.S. (2005). Fast parallel molecular algorithms for DNA-based computation: factoring integers, NanoBioscience, 4, 149-163.

Chen, Z., and Xu, I. (2008). One-Time-Pads encryption in the tile assembly model, Bio-Inspired Computing: Theories and Applications, 23-30.

Clelland, C. T., Risca, V., and Bancroft, C. (1999). Hiding messages in DNA microdots, Nature, 399, 533-534.

Cui, G., Li, C., Li, H., and Li, X. (2009). DNA Computing and Its Application to Information Security Field, IEEE International Conference on Computing, Networking and Communications (ICNC).

Fasila, K.A., Antony, D. (2014). A multiphase cryptosystem with secure key encapsulation scheme based on principles of DNA computing, IEEE International Conference on Advances in Computing and Communications (ICACC 2014).

Gehani, A., LaBean, T., and Reif, J. (2004). DNA-based Cryptography, Lecture Notes in Computer Science, 2950, 167-188.

Hood, L., and Galas D. (2003). The digital code of DNA, Nature, 421.

Leier, A., Richter, C., Banzhaf, W., and Rauhe, H. (2000). Cryptography with DNA binary strands, Biosystems, 57, 13-22.

Lu, M., Lai, X., Xiao, G., and Qin, L. (2007). Symmetric-key cryptosystem with DNA technology," Science China Information Sciences, 50, 324-333.

Ning, K. (2009). A pseudo DNA cryptography Method, DBLP: journals/corr/abs-0903-2693.

Popovici, C. (20l0). Aspects of DNA Cryptography, Annals of the University of Craiova, Mathematics and Computer Science Series, 37, 147-151.

Shanmuga, S. G., Pavithra, S., Arthi, A., Madubala, B., and Mahalakshmi, S., (2015). Cellular automata based DNA cryptography algorithm, IEEE conference on ISCO.

Shiu, H. J., Ng, K L., Fang, J. F., Lee, R. C. T., and Huang, C. H. (2010). Data hiding methods based upon DNA sequences, Information Sciences, 180, 2196-2208.

Suryavanshi, H., and Bansal, P. (2012). An Improved Cryptographic Algorithm using UNICODE and Universal Colors, WOCN-2012, 3, 1-3.

Xiao, G., Lu, M., Qin, L., and Lai, X. (2006) New field of cryptography: DNA cryptography, Chinese Science Bulletin, 51, 1413-l420.

Yunpeng, Z., Yu, Z., Zhong, W., and Sinnott, R.O. (2011). Index-based symmetric DNA encryption algorithm, 4th International Congress on Image and Signal Processing, 5, pp.2290-2294.

Zhang, X., Niu, Y., and Cui, G. (2008). Breaking the NTRU public-key cryptosystem using self:assembly of DNA tilings, Chinese Journal of computers, 31, 2129-2137.



How to Cite

Adithya, B., & Santhi, G. (2021). Deoxyribonucleic Acid (DNA) Computing using Two-by-Six Complementary and Color Code Cipher. Bulletin of Computer Science and Electrical Engineering, 2(1). Retrieved from