Skip to main content
Log in

An optimized DNA based encryption scheme with enforced secure key distribution

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

More and more sensitive information is transmitted and stored in computer networks. Security has become a critical issue. As traditional cryptographic systems are now vulnerable to attacks, DNA based cryptography has been identified as a promising technology because of the vast parallelism and extraordinary information density. While a body of research has proposed the DNA based encryption algorithm, no research has provided solutions to distribute complex and long secure keys. This paper introduces a Hamming code and a block cipher mechanism to ensure secure transmission of a secure key. The research overcomes the limitation on the length of the secure key represented by DNA strands. Therefore it proves that real biological DNA strands are useful for encryption computing. To evaluate our method, we apply the block cipher mechanism to optimize a DNA-based implementation of a conventional symmetric encryption algorithm, described as “yet another encryption algorithm”. Moreover, a maximum length matching algorithm is developed to provide immunity against frequency attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Gehani, A., LaBean, T., Reif, J.: DNA-Based Cryptography. Aspects of Molecular Computing. Springer, Berlin (2003)

    MATH  Google Scholar 

  2. Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266(11), 1021–1024 (1994)

    Article  Google Scholar 

  3. Alberts, B., et al.: Molecular Biology of the Cell. Garland Science, New York (2008)

    Google Scholar 

  4. Kari, L., Seki, S., Sosk, P.: DNA Computing—Foundations and Implications. Handbook of Natural Computing. Springer, Berlin (2012)

    Book  Google Scholar 

  5. Zhang, Y.P., Wang, Z.Z., Wang, Z.W., et al.: A new DNA cryptography algorithm based on the biological puzzle and DNA chip techniques. In: Proceedings of the 2016 International Conference on Biomedical and Biological Engineering (BBE2016) (2016)

  6. Wu, X., Kan, H., Kurths, J.: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl. Soft. Comput. 37, 24–39 (2015)

    Article  Google Scholar 

  7. Wang, X.Y., Zhang, H.L., Bao, X.M.: Color image encryption scheme using CML and DNA sequence operations. Biosystems 144, 18–26 (2016)

    Article  Google Scholar 

  8. Jain, A., Rajpal, N.: A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed. Tools Appl. 29(1), 1–18 (2015)

    Google Scholar 

  9. Norouzi, B., Mirzakuchaki, S.: An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed. Tools Appl. 76, 1–21 (2016)

    Google Scholar 

  10. Guesmi, R., Farah, M.A.B., Kachouri, A., et al.: A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn. 83(3), 1–14 (2015)

    MATH  MathSciNet  Google Scholar 

  11. Zhen, P., Zhao, G., Min, L., et al.: Chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 75, 1–17 (2015)

    Google Scholar 

  12. Ye, J., Xu, Z., et al.: Secure outsourcing of modular exponentiations under single untrused programme model. J. Comput. Syst. Sci. doi:10.1016/j.jcss.2016.11.005 (2016)

  13. Rehman, A., Liao, X.F., Kulsoom, A., et al.: Selective encryption for gray images based on chaos and DNA complementary rules. Multimed. Tools Appl. 74(13), 4655–4677 (2015)

    Article  Google Scholar 

  14. Chai, X.L., Chen, Y.R., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (2017)

    Article  Google Scholar 

  15. Wang, X.Y., Zhang, Y.Q., Bao, X.M.: A novel chaotic image encryption scheme using DNA sequence operations. Opt. Lasers Eng. 73, 53–61 (2015)

    Article  Google Scholar 

  16. Kalpana, J., Murali, P.: An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Optik 126(24), 5703–5709 (2015)

    Article  Google Scholar 

  17. Zhang, Y.Q., Wang, X.Y., Liu, J., et al.: An image encryption scheme based on the MLNCML system using DNA sequences. Opt. Lasers Eng. 82, 95–103 (2016)

    Article  Google Scholar 

  18. Kumar, M., Iqbal, A., Kumar, P.: A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process. 125, 187–202 (2016)

    Article  Google Scholar 

  19. Wang, Y., Lei, P., Yang, H.Q., et al.: Security analysis on a color image encryption based on DNA encoding and chaos map. Comput. Electr. Eng. 46, 433–446 (2015)

    Article  Google Scholar 

  20. Su, X., Li, W.H., Hu, H.G.: Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 76, 1–13 (2016)

    Google Scholar 

  21. Zeng, L., Liu, R.R.: Cryptanalyzing a novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik 126(24), 5022–5025 (2015)

    Article  Google Scholar 

  22. Jiron, I., et al.: A new DNA cryptosystem based on AG codes evaluated in Gaussian channels. Telecommun. Syst. 64, 1–13 (2016)

    Google Scholar 

  23. Kalyani, S., Gulati, N.: Pseudo DNA cryptography technique using OTP key for secure data transfer. Int. J. Eng. Sci. 6, 5657–5663 (2016)

    Google Scholar 

  24. Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson Education, India (2013)

    Google Scholar 

  25. Wang, M.Q., Wang, B., Liu, X.L.: Influences of storage time and temperature on the quality of DNA extracted from preserved animal tissues. J. Anhui Agric. 37(33), 16407–16409 (2009)

    Google Scholar 

  26. Amin, S.T., Saeb, M., El-Gindi, S.: A DNA-based implementation of YAEA encryption algorithm. Comput. Intell. 16, 120–125 (2006)

    Google Scholar 

  27. Saeb, M., Baith, A.: An encryption algorithm for data security. In: Mastorakis, N.E. (ed.) Recent Advances in Information Science & Technology. World Scientific Publishing Company, Singapore (1998)

    Google Scholar 

Download references

Acknowledgements

The research was funded by the National Research University Fund (NRUF) and 2015-2016 New Faculty Research Award. The proposal number is 110664 LINKED TO 105433 and 111277.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yunpeng Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Liu, X., Ma, Y. et al. An optimized DNA based encryption scheme with enforced secure key distribution. Cluster Comput 20, 3119–3130 (2017). https://doi.org/10.1007/s10586-017-1009-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1009-y

Keywords

Navigation