CFP last date
20 January 2025
Reseach Article

Secure Data Transfer through DNA Cryptography using Symmetric Algorithm

by Bonny B. Raj, J. Frank Vijay, T. Mahalakshmi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 2
Year of Publication: 2016
Authors: Bonny B. Raj, J. Frank Vijay, T. Mahalakshmi
10.5120/ijca2016907719

Bonny B. Raj, J. Frank Vijay, T. Mahalakshmi . Secure Data Transfer through DNA Cryptography using Symmetric Algorithm. International Journal of Computer Applications. 133, 2 ( January 2016), 19-23. DOI=10.5120/ijca2016907719

@article{ 10.5120/ijca2016907719,
author = { Bonny B. Raj, J. Frank Vijay, T. Mahalakshmi },
title = { Secure Data Transfer through DNA Cryptography using Symmetric Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 2 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number2/23758-2016907719/ },
doi = { 10.5120/ijca2016907719 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:30:01.105447+05:30
%A Bonny B. Raj
%A J. Frank Vijay
%A T. Mahalakshmi
%T Secure Data Transfer through DNA Cryptography using Symmetric Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 2
%P 19-23
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a novel symmetric algorithm in the area of DNA cryptography. Secure Data Transfer is an important factor for data transmission. The transmission of information can be of local or of global scope. But it is mandatory to secure information from unauthorized access. Security is very important factor encryption. This method proposes a secured symmetric key generation process which generates initial cipher and this initial cipher is then converted into final cipher using random key generated DNA sequences, so as to make it complicated.

References
  1. Adleman L M, Molecular Computation of Solutions to Combinatorial Problems, Science, Vol 266, pp 1021-1024, November 1994.
  2. K. Sireesha and V. Srujana, An overview and Analysis of Private & Public Key, International Journal of Technological Exploration & Learning, pp 281- 283, December 2013.
  3. Ayushi, A Symmetric Key Cryptographic Algorithm, International Journal of Computer Applications Vol 1, 2010.
  4. Bio-inspired computing: constituents and challenges, International Journal of Bio-Inspired Computation, Vol 1,pp 135-150, March 2009.
  5. Bonny B Raj and Panchami V, DNA Based Cryptography Using Permutation and Random Key Generation Method, International Journal of Innovative Research in Science, Engineering and Technology, Vol 3, pp 263-267, July 2014
  6. Gehani, T. LaBean, and J. Reif, DNA-Based Cryptography, Lecture Notes in Computer Science, Springer, Vol 2950, pp 167-188 2004.
  7. Rupali Soni and Gopal Prajapati, A Modern Review on Cryptographic Techniques, International Journal of Advanced Research in Computer Science and Software Engineering Vol 3, Issue 7, pp162-167 July 2013.
  8. http://www.blc.arizona.edu/molecular_graphics/dna_structure/dna_tutorial.html
  9. Shipra Jain and Dr. Vishal Bhatnagar, Analogy of Various DNA Based Security Algorithms Using Cryptography and Steganography, International Conference on Issues and Challenges in Intelligent Computing Techniques pp 285-291, 2014.
  10. Anu priya Agarwal, Praveen Kanth, Secure Data Transmission using DNA Encryption, Computer Engineering and Intelligent Systems Vol 5, pp 51-59, 2014.
  11. “Introduction to Public-Key Cryptography”, an article availabledeveloper.netscape.com/docs/manuals/security/pkin/contents.html.
  12. Olga Tornea, Monica Borda, Tatiana Hodorogea, and Mircea-Florin Vaida, Encryption System With Indexing Dna Chromosomes Cryptographic Algorithm, Proceedings of the 7th IASTED International Conference, pp12-1, February 2010.
  13. Sherif T. Amin , Magdy Saeb and Salah El-Gindi, A DNA-based Implementation of YAEA Encryption Algorithm.
  14. S. T. Amin, M. Saeb, S. El-Gindi, A DNA-base Implementation of YAEA Encryption Algorithm, IASTEDInternational Conference on Computational Intelligence,San Francisco, pp 120-125, 2006.
  15. Tatiana Hodorogea, Mircea-Florin Vaida, Alternate Cryptography Techniques, ICCC05, Miskolc-Lillafured, Hungary, Vol. 1, pp 513-518, 2005.
  16. R. K. Wilson, The sequence of Homo sapiens FOSMID clone ABC14-50190700J6, submitted to http://www.ncbi.nlm.nih.gov, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Bio-inspired computing Symmetric Encryption Random key Symmetric key.