CFP last date
20 January 2025
Reseach Article

A Novel Approach to an Algorithm for Voice Encryption using DNA based Cryptography

Published on October 2013 by S.vajjiravelu, A. Punitha
National Conference on Recent Trends in Computer Applications
Foundation of Computer Science USA
NCRTCA - Number 1
October 2013
Authors: S.vajjiravelu, A. Punitha
13247867-aa98-4495-bab9-e6d44c9d3418

S.vajjiravelu, A. Punitha . A Novel Approach to an Algorithm for Voice Encryption using DNA based Cryptography. National Conference on Recent Trends in Computer Applications. NCRTCA, 1 (October 2013), 19-21.

@article{
author = { S.vajjiravelu, A. Punitha },
title = { A Novel Approach to an Algorithm for Voice Encryption using DNA based Cryptography },
journal = { National Conference on Recent Trends in Computer Applications },
issue_date = { October 2013 },
volume = { NCRTCA },
number = { 1 },
month = { October },
year = { 2013 },
issn = 0975-8887,
pages = { 19-21 },
numpages = 3,
url = { /proceedings/ncrtca/number1/13635-1306/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computer Applications
%A S.vajjiravelu
%A A. Punitha
%T A Novel Approach to an Algorithm for Voice Encryption using DNA based Cryptography
%J National Conference on Recent Trends in Computer Applications
%@ 0975-8887
%V NCRTCA
%N 1
%P 19-21
%D 2013
%I International Journal of Computer Applications
Abstract

Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Securing voice communication by providing end-to-end security becomes necessary, for this various cryptographic algorithms are evolved significantly with flaws. We identified that the concept of using DNA computing in the field of cryptography as a possible technology that brings forward a new hope for unbreakable algorithms. The voice will first get converted into digital format and then it will be encrypted using DNA Strands. We secretly select a reference DNA sequence S and incorporate the secret message M into it such that we obtain S'. We send this S', together with many other DNA, or DNA-like sequences to the receiver. The receiver is able to identify the particular sequence with M hidden in it and ignore all of the other sequences.

References
  1. Akanksha Agrawal, Akansha Bhopale, Jaya Sharma, Meer Shizan Ali, Divya Gautam, "Implementation of DNA algorithm for secure voice communication", International Journal of Scientific & Engineering Research Volume 3, Issue 6, June-2012, ISSN 2229-5518.
  2. Grasha Jacob, A. Murugan,"DNA based Cryptography: An Overview and Analysis", International Journal of Emerging Sciences. , 3(1), 36-27, March 2013.
  3. H. Z. Hsu and R. C. T. Lee, "DNA Based Encryption Methods", The 23rd workshop on Combinatorial mathematics and Computation Theory, 2012.
  4. Ashish Gehani, Thomas H. LaBean and John H. Reif "DNA-based Cryptography", 5th Annual DIMACS Meeting on DNA Based Computers (DNA 5), MIT, Cambridge, MA, June 1999.
  5. Parwinder pal singh Bhupinder singh Satinder pal Ahuja, " Need of Secure Voice Encryption and its Methods", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012.
  6. D. Ambika, V. Radha, " Secure Speech Communication – A Review", International Journal of Engineering Research and Applications, Vol. 2, Issue 5, September- October 2012, pp. 1044-1049.
  7. European Bioinformatics Institute, URL: http://www. ebi. ac. uk/.
Index Terms

Computer Science
Information Sciences

Keywords

Gsm Dna Strands Cryptography Voice Encryption.