Deoxyribonucleic Acid (DNA) Computing using Two-by-Six Complementary and Color Code Cipher
Keywords:Deoxyribonucleic Acid, DNA Computing, Color, Cryptography, Eavesdropper
Information obnubilating hides information to obviate the information from being leaked into the subsisting networking in order to see the exact confidentiality of all their germane info, which plays a paramount part in Deoxyribonucleic Acid (DNA) cryptography. In this paper, DNA computing color code cryptographic strategy is proposed to ensure that the data protection out of the eavesdropper. The text message in format is encrypted into cipher shade utilizing DNA cryptography. There is a supersession procedure utilized to obnubilate the mystery message that was scrambled to some reference DNA. That is the bases of the benchmark DNA are superseded together with the generic DNA depending on a standard two-by-six complementary pair rule. Representation of text gives a color of universal and thus a little substantial difference in coloring is more complicated to understand than changes in brightness.
Adleman, L.M. (1994). Molecular Computation of Solutions to Combinatorial Problems, Science, 266(5187), 1021-4. https://doi.org/10.1126/science.7973651
Alberts, B., Johnson, A., Lewis, J., Raff, M., Roberts, K., and Walter, P. (2008). Molecular Biology of the Cell, 2nd, Garland Science. https://doi.org/10.1201/9780203833445
Chang, W., Guo, M., and Ho, M.S. (2005). Fast parallel molecular algorithms for DNA-based computation: factoring integers, NanoBioscience, 4, 149-163. https://doi.org/10.1109/TNB.2005.850474
Chen, Z., and Xu, I. (2008). One-Time-Pads encryption in the tile assembly model, Bio-Inspired Computing: Theories and Applications, 23-30.
Clelland, C. T., Risca, V., and Bancroft, C. (1999). Hiding messages in DNA microdots, Nature, 399, 533-534. https://doi.org/10.1038/21092
Cui, G., Li, C., Li, H., and Li, X. (2009). DNA Computing and Its Application to Information Security Field, IEEE International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/ICNC.2009.27
Fasila, K.A., Antony, D. (2014). A multiphase cryptosystem with secure key encapsulation scheme based on principles of DNA computing, IEEE International Conference on Advances in Computing and Communications (ICACC 2014). https://doi.org/10.1109/ICACC.2014.7
Gehani, A., LaBean, T., and Reif, J. (2004). DNA-based Cryptography, Lecture Notes in Computer Science, 2950, 167-188. https://doi.org/10.1007/978-3-540-24635-0_12
Hood, L., and Galas D. (2003). The digital code of DNA, Nature, 421. https://doi.org/10.1038/nature01410
Leier, A., Richter, C., Banzhaf, W., and Rauhe, H. (2000). Cryptography with DNA binary strands, Biosystems, 57, 13-22. https://doi.org/10.1016/S0303-2647(00)00083-6
Lu, M., Lai, X., Xiao, G., and Qin, L. (2007). Symmetric-key cryptosystem with DNA technology," Science China Information Sciences, 50, 324-333. https://doi.org/10.1007/s11432-007-0025-6
Ning, K. (2009). A pseudo DNA cryptography Method, DBLP: journals/corr/abs-0903-2693.
Popovici, C. (20l0). Aspects of DNA Cryptography, Annals of the University of Craiova, Mathematics and Computer Science Series, 37, 147-151.
Shanmuga, S. G., Pavithra, S., Arthi, A., Madubala, B., and Mahalakshmi, S., (2015). Cellular automata based DNA cryptography algorithm, IEEE conference on ISCO. https://doi.org/10.1109/ISCO.2015.7282333
Shiu, H. J., Ng, K L., Fang, J. F., Lee, R. C. T., and Huang, C. H. (2010). Data hiding methods based upon DNA sequences, Information Sciences, 180, 2196-2208. https://doi.org/10.1016/j.ins.2010.01.030
Suryavanshi, H., and Bansal, P. (2012). An Improved Cryptographic Algorithm using UNICODE and Universal Colors, WOCN-2012, 3, 1-3. https://doi.org/10.1109/WOCN.2012.6335543
Xiao, G., Lu, M., Qin, L., and Lai, X. (2006) New field of cryptography: DNA cryptography, Chinese Science Bulletin, 51, 1413-l420. https://doi.org/10.1007/s11434-006-2012-5
Yunpeng, Z., Yu, Z., Zhong, W., and Sinnott, R.O. (2011). Index-based symmetric DNA encryption algorithm, 4th International Congress on Image and Signal Processing, 5, pp.2290-2294. https://doi.org/10.1109/CISP.2011.6100690
Zhang, X., Niu, Y., and Cui, G. (2008). Breaking the NTRU public-key cryptosystem using self:assembly of DNA tilings, Chinese Journal of computers, 31, 2129-2137. https://doi.org/10.3724/SP.J.1016.2008.02129
How to Cite
Copyright (c) 2021 B Adithya, G Santhi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.