International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 98 - Number 16 |
Year of Publication: 2014 |
Authors: Snehal Javheri, Rahul Kulkarni |
10.5120/17271-7733 |
Snehal Javheri, Rahul Kulkarni . Secure Data communication and Cryptography based on DNA based Message Encoding. International Journal of Computer Applications. 98, 16 ( July 2014), 35-40. DOI=10.5120/17271-7733
Information flows throughout the network that may be of local or of global scope. It is mandatory to secure that information to prevent from unauthorized access of it by any node in the path. There are various users and organizations who want to prevent their crucial data from attackers and hackers. Also we need to ensure privacy, integrity and confidentiality about data in the network for it to be a reliable. Thus to achieve security it is very necessary to encode the data before sending it through the various unreliable communication channels available to make it unreadable. This is where the Cryptography comes into picture. Various cryptographic systems were developed in the past year but now the latest development on this field is DNA Cryptography. This concept has emerged after the disclosure of computational ability of Deoxyribo Nucleic Acid (DNA). In this field of DNA Cryptography many research work is going on to make the computational process more complex to the unauthorized user. Well, presently it is in the development phase and requires a lot of work and research to reach an established stage. In this paper; a proposal is given where the concept of DNA is being used in encryption and decryption process. The theoretical analysis shows this method to be efficient in computation, storage and transmission; and it is very powerful in certain attacks. This paper also proposes a secured symmetric key generation scheme which generates primary cipher and this primary cipher is then converted into final cipher using DNA sequences, so as to make it again more complicated in reading. Finally, the implementation methodology and experimental results are presented. And then conclusion with future work is described in the last section.