Advertisement

A Symmetric Key Cryptosystem Using DNA Sequence with OTP Key

  • Asish Aich
  • Alo Sen
  • Satya Ranjan Dash
  • Satchidananda Dehuri
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 340)

Abstract

A two stage encryption algorithm based on DNA sequence has proposed in this paper. In the first stage an encryption of plain text is done by generating a random key. The plain text is again encrypted to produce the cipher text in the second stage. Moreover, this encryption algorithm is based on a symmetric key cryptography system, where we provide a shared key to encrypt as well as decrypt the intended message. To encrypt the original key two stages are maintained and sending it over a separate secure channel other than the channel through which we are transferring the cipher text. A numerical study confirms that the proposed algorithm is reliable, secure, scalable, and robust for transmitting message.

Keywords

DNA sequence DNA coding Cryptography Encryption-decryption 

Notes

Acknowledgments

The authors would like to thank the professors of KIIT University who directly or indirectly supported to make the paper ready.

References

  1. 1.
    Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Sci. AAAS Weekly Pap. Ed. 266(5187), 1021–1023 (1994)Google Scholar
  2. 2.
    Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399(6736), 533–534 (1999)CrossRefGoogle Scholar
  3. 3.
    Liptony, R.J.: Using DNA to solve NP-complete problems (1995)Google Scholar
  4. 4.
    Lipton, R.J.: Breaking DBS using a molecular computer Dan Boneh Christopher Dimworth. DNA Based Comput. 27, 37 (1996)MathSciNetGoogle Scholar
  5. 5.
    Cui, G.Z.: New direction of data storage: DNA molecular storage technology. Comput. Eng. Appl. 42, 29–32 (2006)Google Scholar
  6. 6.
    Cox, J.P.L.: Breaking DBS using a molecular computer Dan Boneh Christopher Dimworth. Trends Biotechnol 19(7), 247–250 (2001)CrossRefGoogle Scholar
  7. 7.
    Amos, M., et al.: Topics in the theory of DNA computing. Theor. Comput. Sci. 287(1), 3–38 (2002)MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Xiao, G., et al.: New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51(12), 1413–1420 (2006)MathSciNetMATHGoogle Scholar
  9. 9.
    Kartalopoulos, S.V.: DNA-inspired cryptographic method in optical communications, authentication and data mimicking. In: Military Communications Conference. MILCOM 2005. IEEE (2005)Google Scholar
  10. 10.
    Cui, G., et al.: Information security technology based on DNA computing. In: IEEE International Workshop on Anti-counterfeiting, Security, Identification. IEEE (2007)Google Scholar
  11. 11.
    Leier, A., et al.: Cryptography with DNA binary strands. BioSystems 57(1), 13–22 (2000)CrossRefGoogle Scholar
  12. 12.
    Lu, M.X., et al.: Symmetric-key cryptosystem with DNA technology. Sci. China Ser. F: Inf. Sci. 50(3), 324–333 (2007)CrossRefMATHGoogle Scholar
  13. 13.
    Gehani, A., LaBean, T., Reif, J.: DNA-based cryptography. In: Aspects of Molecular Computing, pp. 167–188. Springer, Berlin (2004)Google Scholar
  14. 14.
    Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399(6736), 533–534 (1999)CrossRefGoogle Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Asish Aich
    • 1
  • Alo Sen
    • 1
  • Satya Ranjan Dash
    • 1
  • Satchidananda Dehuri
    • 2
  1. 1.Computer Science and EngineeringKIIT UniversityBhubaneswarIndia
  2. 2.Department of Systems EngineeringAjou UniversitySuwonSouth Korea

Personalised recommendations