Skip to main content

A Novel Level-Based DNA Security Algorithm Using DNA Codons

  • Chapter
  • First Online:
Computational Intelligence and Big Data Analytics

Part of the book series: SpringerBriefs in Applied Sciences and Technology ((BRIEFSFOMEBI))

Abstract

Providing security to the information has become more prominent due to the extensive usage of the Internet. The risk of storing the data has become a serious problem as the numbers of threats have increased with the growth of the emerging technologies. To overcome this problem, it is essential to encrypt the information before sending it to the communication channels to display it as a code. The silicon computers may be replaced by DNA computers in the near future as it is believed that DNA computers can store the entire information of the world in few grams of DNA. Hence, researchers attributed much of their work in DNA computing. One of the new and emerging fields of DNA computing is DNA cryptography which plays a vital role. In this paper, we proposed a DNA-based security algorithm using DNA Codons. This algorithm uses substitution method in which the substitution is done based on the Lookup table which contains the DNA Codons and their corresponding equivalent alphabet values. This table is randomly arranged, and it can be transmitted to the receiver through the secure media. The central idea of DNA molecules is to store information for long term. The test results proved that it is more powerful and reliable than the existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adleman LM (1994) Molecular computation of solution to combinatorial problems. Science, New Series, 266(5187):1021–1024

    Google Scholar 

  2. Gehani A, Thomas L, Reif J (2004) DNA-based cryptography-in aspects of molecular computing. Springer, Berlin, Heiderlberg, pp 167–188

    Google Scholar 

  3. Nixon D (2003) DNA and DNA computing in security practices-is the future in our genes? Global information assurance certification paper, Ver.1.3

    Google Scholar 

  4. Popovici C (2010) Aspects of DNA cryptography. Ann Univ Craiova, Math Comput Sci Ser 37(3):147–151

    Google Scholar 

  5. Babu ES, Nagaraju C, Krishna Prasad MHM (2015) Light-weighted DNA based hybrid cryptographic mechanism against chosen cipher text attacks. Int J Inf Process 9(2):57–75

    Google Scholar 

  6. http://www.chemguide.co.uk/organicprops/aminoacids/doublehelix.gif

  7. Yamuna M, Bagmar N (2013) Text Encryption using DNA steganography. Int J Emerg Trends Technol Comput Sci (IJETTCS) 2(2)

    Google Scholar 

  8. Reddy RPK, Nagaraju C, Subramanyam N (2014) Text Encryption through level based privacy using DNA Steganography. Int J Emerg Trends Technol Comput Sci (IJETTCS) 3(3):168–172

    Google Scholar 

  9. http://www.chemguide.co.uk/organicprops/aminoacids/dnacode.gif

  10. Sabry M, Hasheem M, Nazmy T, Khalifa ME (2010) A DNA and amino acids-based implementation of playfair cipher. Int J Comput Sci Inf Secur 8(3)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bharathi Devi Patnala .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Patnala, B.D., Kiran Kumar, R. (2019). A Novel Level-Based DNA Security Algorithm Using DNA Codons. In: Computational Intelligence and Big Data Analytics. SpringerBriefs in Applied Sciences and Technology(). Springer, Singapore. https://doi.org/10.1007/978-981-13-0544-3_1

Download citation

Publish with us

Policies and ethics