Professional Documents
Culture Documents
Abstract— A shared secret key based symmetric Thymine (T), Cytosine (C) and Guanine (G), the bases
cryptographic algorithm using Diffie Hellman key sharing represent genetic code. Generally, DNA exists as double-
technique has been proposed in the paper. The shared secret key stranded molecules. Complementary form of two DNA
is used for encryption as well as decryption of the intended plain strands (A-T or C-G) gets hydrogen bonded together to form
text. But, we are not transferring the original shared secret key a double-helix structure. DNA was first discovered by
through the channel. We are using Diffie Hellman key sharing Friedrich Miescher and James D. Watson-Crick [3]
technique to generate the shared secret key in both the side by developed a pairing rule which defines that Adenine (A) can
exchanging the public key of the sender and receiver with each only pair with Thymine (T) as well as Cytosine(C) can only
other through the channel. DNA Hybridization technique has
pair with Guanine(G) for the formation of a hydrogen bond
been used to produce the cipher text from the DNA sequence of
with double helical structured DNA. DNA comprises of long
plain text and the shared secret key. A numerical study with the
basic parametric assumption confirms that the proposed
sequence and responsible to transfer the genetic information.
cryptosystem is very scalable, secure and robust to use in real Oligonucleotides or ssDNA is two long single sided
time system. structures which can be found when DNA can be separated
in a way where all of the hydrogen bonds between the
Keywords— DNA Hybridization; Encryption-Decryption; nucleotides get dissolved.
Prime; Diffie Hellman Key sharing
III. LITERATURE SURVEY
I. INTRODUCTION DNA cryptography has been discovered after the
Cryptology, the basis of security for all the information. research of Adleman [1]. Further, It has been extended by
The applications of cryptography are not limited to only Lipton [4], who solve NP complete problem using DNA
mailing, banking, defense, it has been extended to online computing. Boneh, Dunworth and Lipton [5] confirmed that
banking transactions and e-commerce, etc where the by using DNA computing, the Data Encryption Standard
sensitive information while transferring through channel can (DES) cryptographic protocol can be broken. DNA
be eavesdropped by the intruders. So, security only plays the molecules contain low energy efficiency, the huge
great role to prevent and detect the authenticated system, parallelism, and extraordinary large information storage
data and network. Now, cryptology combines two areas. The capacity [6, 7]. DNA cryptography [8, 9] can be added with
two important areas are cryptography is the art to DNA computing, where DNA will take the role of
communicate securely through the insuring communication information carrier and modern biological technologies will
medium, whereas cryptanalysis is the art to decipher the take the role of implementation tool. The important features
message who is not the intended receiver. Cryptography and of DNA molecule stated above can be used for security
steganography both the technique is used for providing purposes such as signature, authentication, encryption etc.
security, but they are not efficient enough. A new [10]. Various methods of DNA cryptography were invented
technology, DNA cryptography took birth by Adleman [1] in [11, 12] in recent years. No particular, specific theory is
DNA computing and Risca [2] in the DNA information available to apply DNA molecules in cryptography [13], [14]
project when the most popular cryptographic algorithms such but still researches are continuing their research on security
as Data Encryption Standard (DES) and Adi Shamir, Ron based on modern DNA technology for the successful
Rivest, and Len Adleman (RSA 768) being cracked. experimental results. In current years, the developed popular
DNA technologies are Polymerase Chain Reaction (PCR),
II. BASIC OF DNA CRYPTOGRAPHY DNA synthesis, and DNA digital coding [15]. According to
DNA is abbreviated as deoxyribonucleic acid. DNA is Watson-Crick complementary pair, PCR is a very fast DNA
important macromolecule (germ plasma) that is necessary for amplification technology. With the two primer pair’s namely
life consist of many nucleotides. Each nucleotide is on a forward and reverse primer, the plain text-encoded sequence
single base and there total four primary bases Adenine (A), can be amplified. DNA hybridization is also a popular
1. Encryption Process
V. The cipher text is then transferred through the
open communicatioon channel.
Encryption of the plain text into cipher text
t follows the
following steps: 2. Decryption Processs
I. The plain text is transferred into thhe DNA coded
output by following DNA coded set which was Decryption can be done by thhe following steps:
proposed by Clell and Risca [16]], where DNA
coding can be expressed only for capital letters, I. DNA hybridizatioon take place between the
digits, and for punctuation marks. The
T DNA coded received cipher teext and the DNA equivalent
set is as follows: sequence of the shaared secret key in the following
Table 1. DNA coded set
way: In the binary sequence,
s ‘1’ will be considered
if the every 10 bases of the cipher text is equal with
the complementaryy form of the 10 bases of the
shared secret key frrom the reverse order, otherwise
it will be consideredd as ‘0’.