CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Three Reversible Data Encoding Algorithms based on DNA and Amino Acids' Structure

by Mona Sabry, Mohamed Hashem, Taymoor Nazmy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 8
Year of Publication: 2012
Authors: Mona Sabry, Mohamed Hashem, Taymoor Nazmy
10.5120/8588-2339

Mona Sabry, Mohamed Hashem, Taymoor Nazmy . Three Reversible Data Encoding Algorithms based on DNA and Amino Acids' Structure. International Journal of Computer Applications. 54, 8 ( September 2012), 24-30. DOI=10.5120/8588-2339

@article{ 10.5120/8588-2339,
author = { Mona Sabry, Mohamed Hashem, Taymoor Nazmy },
title = { Three Reversible Data Encoding Algorithms based on DNA and Amino Acids' Structure },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 8 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number8/8588-2339/ },
doi = { 10.5120/8588-2339 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:55:11.268354+05:30
%A Mona Sabry
%A Mohamed Hashem
%A Taymoor Nazmy
%T Three Reversible Data Encoding Algorithms based on DNA and Amino Acids' Structure
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 8
%P 24-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The field of using biology in cryptography is a new and very promising direction in cryptographic research. Although in its primitive stage, DNA cryptography is shown to be very effective. Currently, several DNA computing algorithms are proposed for quite some cryptography, cryptanalysis and steganography problems, and they are very powerful in these areas. In this paper, we introduce three methods of encoding inspired from the DNA (or RNA) structure and its relation to the amino acids in the standard genetic code table. The paper explains three techniques to convert data from binary form to DNA (or RNA) form then to amino acids' form and the reverse. We proved they are applicable and correctly reversible. The algorithms can serve in DNA computers and biological experiments by representing data in the form of amino acids. They also can be viewed as a simple algorithm to convert data from a form to another completely different form with the ability to convert it back to the initial form. Although they don't include the use of secret key but they can also be used as an auxiliary factor in data integrity and digital signature applications.

References
  1. L. Kari, "DNA Computing: Arrival of Biological Mathematics," The Mathematical Tntelligencer, vol. 19, pp. 9–22, 1997.
  2. S. V. Kartalopoulos, "DNA-inspired cryptographic method in optical communications," in authentication and data mimicking Military Communications Conference, 2005, pp. 774–779.
  3. G. Z. Cui, L. M. Qin, Y. F Wang and X. C. Zhang, "Information Security Technology Based on DNA Computing," 2007 IEEE International Workshop on Anti-counterfeiting Security, Identification. , 2007, pp. 288–291.
  4. A. Leier, C. Richter and W. Banzhaf, "Cryptography with DNA binary strands," Biosystems, vol. 57, pp. 13–22, 2000.
  5. M. X. Lu, "Symmetric-key cryptosystem with DNA technology, "Science in China Series F: Information Sciences, vol. 3, pp. 324–333, 2007.
  6. A. Gehani, T. H. LaBean and J. H. Reif, "DNA-based cryptography,"DNA Based Computers V. Providence: American Mathematical society, vol. 54, pp. 233–249, 2000.
  7. C. T. Celland, V. Risca and Bancroft C. "Hiding messages in DNA microdots," Nature, vol. 399, pp. 533–534, 1999.
  8. KANG Ning, "A Pseudo DNA Cryptography Method", Independent Research Study Project for CS5231, October 2004.
  9. Sherif T. Amin, Magdy Saeb, Salah El-Gindi, "A DNA-based Implementation of YAEA Encryption Algorithm," IASTED International Conference on Computational Intelligence (CI 2006), San Francisco, Nov. 20, 2006.
  10. O. Tornea and M. E. Borda," DNA Cryptographic Algorithms", MEDITECH 2009, IFMBE Proceedings 26, pp. 223–226, 2009.
  11. Guangzhao Cui, Limin Qin, Yanfeng Wang, Xuncai Zhang," An Encryption Scheme Using DNA Technology", 3rd international conference on Bio-Inspired Computing: Theories and Applications, BICTA 2008, pp. 37 – 42, Oct. 1 2008.
  12. William Stallings. "Cryptography and Network Security", Third Edition, Prentice Hall International, 2003.
  13. Mona Sabry, Mohamed Hashem, Taymoor Nazmy, Mohamed Essam Khalifa, "A DNA and Amino Acids-Based Implementation of Playfair Cipher",(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 3, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

DNA RNA Amino acids codons encryption digital signature algorithm encoding transformation cryptography authentication confidentiality