We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Analysis on DNA based Cryptography to Secure Data Transmission

by S.Jeevidha, Dr.M.S.Saleem Basha, Dr.P.Dhavachelvan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 8
Year of Publication: 2011
Authors: S.Jeevidha, Dr.M.S.Saleem Basha, Dr.P.Dhavachelvan
10.5120/3584-4964

S.Jeevidha, Dr.M.S.Saleem Basha, Dr.P.Dhavachelvan . Analysis on DNA based Cryptography to Secure Data Transmission. International Journal of Computer Applications. 29, 8 ( September 2011), 16-20. DOI=10.5120/3584-4964

@article{ 10.5120/3584-4964,
author = { S.Jeevidha, Dr.M.S.Saleem Basha, Dr.P.Dhavachelvan },
title = { Analysis on DNA based Cryptography to Secure Data Transmission },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 8 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number8/3584-4964/ },
doi = { 10.5120/3584-4964 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:15:16.014756+05:30
%A S.Jeevidha
%A Dr.M.S.Saleem Basha
%A Dr.P.Dhavachelvan
%T Analysis on DNA based Cryptography to Secure Data Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 8
%P 16-20
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The biological research in the field of information technology paves the exploitation of storing capabilities, parallelism and also in conservative cryptography which enhances the security features for data transmission. DNA is the gene information which encodes information of all living beings. Though the DNA computing has its application in the field of huge information storage, massive parallel processing, low energy consumption which have been proposed and proved by the researchers and soon the molecular computer can replace the existing silicon computer and it exploits the world smallest computer. The combination of DNA molecules can be interpreted as a result to give a solution to a specific problem. The DNA strands can be replicated 500 times per second with greater accuracy. It can also be used in the field of cryptography based upon the vast parallelism which is used to break the existing cryptographic approach. This paper analysis an existing approach to the DNA computing method and DNA based cryptographic approach which provides the clear idea and limitations of existing research works.

References
  1. Leonard M. Adleman “Molecular Computation of solution to combinatorial problems” Science, New Series, Vol. 266, No. 5187. pp. 1021-1024 Nov. 11, 1994
  2. R. J. Lipton,” Using DNA to Solve NP-Complete problems," Science, vol. 268, pp. 542 545, 1995
  3. J. D. Watson, F. H. C. Crick, “A structure for de oxy ribose nucleic acid”, Nature, vol. 25, pp. 737-738, 1953
  4. Taylor Clelland, “Hiding messages in DNA Microdots”. Nature Magazine vol.399,June 1999
  5. D. Boneh, “Breaking DES using Molecular computer”, American Mathematical Society, pp 37-65, 1995
  6. Guangzhou Cui “An Encryption scheme using DNA Technology”,IEEE pg 37-42 ,2008
  7. A. Gehani, T. LaBean, and J. Reif, “DNA-Based Cryptography”, Lecture Notes in Computer Science, Springer. 2004.
  8. Zhihua Chen. “Efficient DNA Sticker Algorithm for DES” pg 15-22.IEEE 2008.
  9. Ning Kang, A pseudo DNA cryptography Method, http://arxiv.org/abs/0903.2693 ,2009
  10. L.M Adleman “On Applying Molecular Computation to the Data Encryption Standard.” Journal of Computational Biology, 6 (1). pp. 53-63. 1999
  11. G. Z. Cui, L. M. Qin, Y. F Wang and X. C. Zhang, “Information Security Technology Based on DNA Computing,”IEEE International Workshop on Anti-counterfeiting Security, , pp. 288–291, 2007
  12. G. Z. Cui, “New Direction of Data Storage: DNA Molecular Storage Technology,” Computer Engineering and Applications, vol. 42, pp. 29–32, 2006.
  13. Souhila Sadeg “ An Encryption algorithm inspired from DNA” IEEE pp 344 - 349 November 2010
  14. Sherif T. Amin, Magdy Saeb, Salah El-Gindi, "A DNA-based Implementation of YAEA Encryption Algorithm," IASTED International Conference on Computational Intelligence,2006
  15. Monica BORDA “DNA secret writing Techniques” IEEE conferences 2010
  16. LU MingXin, “Symmetric Key Cryptosystem With Dna Technology” Science China pp 324-333,June 2007
  17. J Chen “A DNA-based, Bimolecular Cryptography Design”ISCAS'03.Proceedings2003
  18. LAI XueJia, LU MingXin “Asymmetric encryption and signature method with DNA technology” Vol. 53 No. 3: 506–514 March 2010.
Index Terms

Computer Science
Information Sciences

Keywords

DNA DNA Computing DNA Cryptography