Skip to main content

IBDNA – An Improved BDNA Algorithm Incorporating Huffman Coding Technique

  • Conference paper
  • First Online:
Proceedings of International Conference on Network Security and Blockchain Technology (ICNSBT 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 481))

Included in the following conference series:

  • 367 Accesses

Abstract

In recent days digital data transmission over the Internet has significantly increased. In this digital data transmission, security is the fundamental issue to be taken care of. Several cryptographic techniques are used for providing essential security goals such as confidentiality, integrity, and availability to the user. A reliable encryption algorithm is required for transmitting data to ensure data integrity as well as data confidentiality with better throughput and protecting data from any unauthorized access. To achieve this goal we have proposed a novel symmetric key cryptographic technique named IBDNA for the esteemed consumer’s data encryption that not only ensures secure data confidentiality but also drastically reduces the size of the ciphertext for faster data transmission. The proposed algorithm is an enhanced version of the multi-fold BDNA algorithm which is based on a well-known DNA cryptographic algorithm. Moreover, through experimental results, we demonstrates that the proposed algorithm outperforms existing encryption algorithms like BDNA, DNA, DES, AES, Blowfish, etc. in terms of encryption time, ciphertext size, and throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhardwaj, A., et al.: Security algorithms for cloud computing. Proc. Comput. Sci. 85, 535–542 (2016)

    Google Scholar 

  2. Chandra, S., et al.: Content based double encryption algorithm using symmetric key cryptography. Proc. Comput. Sci. 57, 1228–1234 (2015)

    Google Scholar 

  3. Forouzan, B.A.: Cryptography & Network Security. Special Indian Edition, Tata McGraw-Hill (2007)

    Google Scholar 

  4. Kahate, A.: Cryptography and Network Security, 2nd edn. Tata McGraw-Hill (2009)

    Google Scholar 

  5. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Pearson Education, Prentice Hall (2009)

    Google Scholar 

  6. Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security (Sie). McGraw-Hill Education (2011)

    Google Scholar 

  7. Sharma, M., Garg, R.B.: DES: the oldest symmetric block key encryption algorithm. In: 2016 International Conference System Modeling & Advancement in Research Trends (SMART). IEEE (2016)

    Google Scholar 

  8. Meyers, R.K., Desoky, A.H.: An implementation of the blowfish cryptosystem. In: 2008 IEEE International Symposium on Signal Processing and Information Technology. IEEE (2008)

    Google Scholar 

  9. Nie, T., Song, C., Zhi, X.: Performance evaluation of DES and blowfish algorithms. In: 2010 International Conference on Biomedical Engineering and Computer Science. IEEE (2010)

    Google Scholar 

  10. Kumar, P., Rana, S.B.: Development of modified AES algorithm for data security. Optik-Int. J. Light Electron Opt. 127(4), 2341–2345 (2016)

    Article  Google Scholar 

  11. Rajput, S., Dhobi, J.S., Gadhavi, L.J.: Enhancing data security using aes encryption algorithm in cloud computing. In: Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems, vol. 2, pp. 135–143. Springer, Cham (2016)

    Google Scholar 

  12. Bhardwaj, A., et al.: Security algorithms for cloud computing. Proc. Comput. Sci. 85, 535–542 (2016)

    Google Scholar 

  13. Hossain, E.M.S., et al.: A DNA cryptographic technique based on dynamic DNA sequence table. In: 2016 19th International Conference on Computer and Information Technology (ICCIT). IEEE (2016)

    Google Scholar 

  14. Sohal, M., Sharma, S.: Enhancement of cloud security using DNA inspired multifold cryptographic technique. Int. J. Secur. Appl. 11(12), 15–26 (2017)

    Google Scholar 

  15. Sohal, M., Sharma, S.: BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. J. King Saud Univ.-Comput. Inf. Sci. (2018)

    Google Scholar 

  16. Liu, Y.K., Žalik, B.: An efficient chain code with Huffman coding. Pattern Recog. 38(4), 553–557 (2005)

    Google Scholar 

  17. Tsai, C.-W., Wu, J.-L.: On constructing the Huffman-code-based reversible variable-length codes. IEEE Trans. Commun. 49(9), 1506–1509 (2001)

    Article  Google Scholar 

  18. Lathi, B.P.: Modern Digital and Analog Communication Systems 3e Osece. Oxford University Press, Inc. (1998)

    Google Scholar 

  19. Haykin, S.S., Moher, M., Song, T.: An introduction to analog and digital communications, vol. 1. Wiley, New York (1989)

    Google Scholar 

  20. Sathishkumar, G.A., Bagan, K.B.: A novel image encryption algorithm using pixel shuffling and base 64 encoding based chaotic block cipher (IMPSBEC). WSEAS Trans. Comput. 10(6), 169–178 (2011)

    Google Scholar 

Download references

Acknowledgment

The research work is supported by the Ministry of Education, Govt. of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipanwita Sadhukhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, M., Sadhukhan, D., Ray, S. (2022). IBDNA – An Improved BDNA Algorithm Incorporating Huffman Coding Technique. In: Giri, D., Mandal, J.K., Sakurai, K., De, D. (eds) Proceedings of International Conference on Network Security and Blockchain Technology. ICNSBT 2021. Lecture Notes in Networks and Systems, vol 481. Springer, Singapore. https://doi.org/10.1007/978-981-19-3182-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-3182-6_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-3181-9

  • Online ISBN: 978-981-19-3182-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics