Advertisement

Natural Computing

, Volume 12, Issue 1, pp 101–107 | Cite as

A novel text and image encryption method based on chaos theory and DNA computing

  • Majid Babaei
Article

Abstract

In today’s world, the security of information is associated with valid and reliable encryption algorithms that we have used in our systems. Today, the latest methods for data encryption are based on DNA computing. In this paper, we consider a reliable data encryption algorithm (OTP) which is theoretically unbreakable, but it experiences some disadvantages in its algorithm. These drawbacks have prevented the common use of its scheme in modern cryptosystems. In this research, we include a logistic chaotic map as an input of OTP algorithm. So, the obtained result of ‘Matlab Simulation’ could prove the efficiency of proposed algorithm in image encryption. In addition to the cryptography of text files, we can propose an interesting encryption algorithm based on a chaotic selection between original message DNA strands and OTP DNA strands. Finally, the empirical results of our proposed algorithm will be compared with AES Open SSl algorithm.

Keywords

DNA computing One-Time-Pad algorithm Logistic chaotic map Image encryption Text encryption 

References

  1. Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Science 266:1021–1024CrossRefGoogle Scholar
  2. Babaei M, Farhadi M (2011) Introduction to Secure PRNGs. Int'l J Communi Network Sys Sci 4(10):616–621. doi: 10.4236/ijcns.2011.410074
  3. Babaei M, Ramyar M (2011) Improved performance of LFSR’s system with discrete chaotic iterations. Word Appl Sci J 13(7):1720–1725.Google Scholar
  4. Bancroft C, Bowler T, Bloom B et al (2001) Long-term storage of in-formation in DNA. Science 293:1763–1765CrossRefGoogle Scholar
  5. Cui G, Li C, Li H, Li X (2009) DNA computing and its application to information security field. In: International conference on natural computation, pp 148–152. doi: 10.1109/ICNC.2009.27
  6. Dove A (1999) DNA cryptography. J Nat Biotechnol 17:625. doi: 10.1038/10813 CrossRefGoogle Scholar
  7. El Gamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472. doi: 10.1109/TIT.1985.1057074 Google Scholar
  8. Gehani A, LaBean T, Reif J (1999) DNA-based cryptography. In: 5th annual DIMACS meeting on DNA based computers (DNA 5), MIT, Cambridge, MA, June 1999Google Scholar
  9. Hegedüs L, Nagy B, Eğecioğlu Ö (2011) Stateless multicounter 5′→3′ Watson-Crick automata: the deterministic case. Nat Comput. doi: 10.1007/s11047-011-9290-9
  10. Hirabayashi M, Kojima H, Oiwa K (2009) Effective algorithm to encrypt information based on self-assembly of DNA tiles. Oxford University Press, Nucleic Acids Symposium Series No. 53, 27th September 2009, pp 79–80. doi: 10.1093/nass/nrp040
  11. Ignatova Z, Martinez I, Zimmermann K (2008) DNA computing models. Springer book. doi: 10.1007/978-0-387-73637-2
  12. Leier A, Richter C, Banzhaf W, Rauhe H (2000) Special cryptography with DNA binary strands. J Biosyst 57(1):13–22CrossRefGoogle Scholar
  13. Ouyang Q, Kaplan PD, Liu S et al (1997) DNA solution of the maximal clique problem. Science 278:446–449CrossRefGoogle Scholar
  14. Rahimov H, Babaei M, Hassanabadi H (2011) Improving middle square method RNG using chaotic map. Int J Appl Math 137–141.doi: 10.4236/am.2011.24062
  15. Rahimov H, Babaei M, Farhadi M (2011) Cryptographic PRNG based on combination of LFSR and chaotic logistic map. Appl Math 2:1531–1534. doi: 10.4236/am.2011.212217 Google Scholar
  16. Sadeg S, Gougache M, Mansouri N, Drias H (2010) An encryption algorithm inspired from DNA., International Conference on Machine and Web Intelligence (ICMWI). doi: 10.1109/ICMWI.2010.5648076
  17. Sakamoto K, Gouzu H, Komiya K et al (2000) Molecular computation by DNA hairpin formation. Science 288:1223–1226CrossRefGoogle Scholar
  18. Tantau T (2011) The One-Time Pad algorithm—the simplest and most secure way to keep secrets. Book chapter, Algorithms Unplugged, Part 2, pp 141–146. doi: 10.1007/978-3-642-15328-0_15
  19. Xiao G, Lu M, Qin L, Lai X (2012) New field of cryptography: DNA cryptography. Chinese Sci Bull 51(12):1413–1420. doi: 10.1007/s11434-006-2012-5 Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2012

Authors and Affiliations

  1. 1.Department of Computer EngineeringShahrood University of TechnologyShahroodIran

Personalised recommendations