Bit Based Symmetric Encryption Method Using DNA Sequence and Quantum Technique to Generate Encrypted Key

RATNAKUMARI CHALLA, Srilatha N, kanusu Srinivasa Rao

Abstract


Now a day everyone wants to provide security to their data. Present days many methods are available for doing the Cryptography. DNA sequence key based cryptography became popular because of its more security features. In the paper, encryption technique proposed is based on using two methods: Quantum key distribution for generating a key corresponding to the bit of the plain text and DNA sequence based encryption for encryption of the plain text. Sender first performs complement and LBP operation on the data. Instead of sending the processed plain text bits, sender sends the complement of the key if the processed plain text bit is 0 otherwise sends the swapped key sequence. DNA Complement method on the key which is generated by the Quantum key generation method is done based on BB84 protocol. Two step encryption and decryption technique using DNA based encryption is proposed and practically implemented. The performance of the proposed technique is analysed and compared with other related techniques

Keywords


DNA Cryptography, Quantum Key Distribution, Binary Bit

Full Text:

PDF

References


Gilles Brassard “Brief History of Quantum Cryptography: A Personal Perspective” in the Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, Awaji Island, Japan, 17 October 2005.

Richard J. Hughes, George L. Morgan and C. Glen Peterson “Practical quantum key distribution over a 48-km optical fiber network” Physics Division Los Alamos National Laboratory, Los Alamos, NM 87545, LA-UR-99-1593.

N.Srilatha G.Murali “Fast Three Level DNA Cryptographic Technique to Provide Better Security” 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) 978 -1-5090-2399-8/16/$31.00 ©2016 IEEE Pno:428-432.

E Suresh Babu, C Nagaraju, MHM Krishna Prasad “Analysis of SecureRouting Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism” published in Procedia Computer Science dec-. Vol-70Pno:341-347 , 2015.

Lelde Lace, Oksana Scegulnaja-Dubrovska, RamunsUsovs, AgneseZalcmane, “Quantum Cryptographic Key Distribution Protocols”, the European Social Fund (ESF), 2008.

R Pradeep Kumar Reddy, C Nagaraju, N Subramanyam ”Text encryption through level based privacy using dna steganography” published in International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2014,vol:3 issue:3

Lin, H.S., Cryptography and Public Policy, Journal of Government Information, PP135–148 . April1998.

Alia, M.A., Yahya,A., Public–Key Steganography Based on Matching Method, European Journal of Scientific Research PP223-231 Aug (2010).

G. Cui, L. Qin, Y. Wang and X. Zhang, “An encryption scheme using DNA technology”, Bio Inspired Computing: Theories and Applications, pp. 37-42, 2008.

Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," Bio-Inspired Computing: Theories andApplications, 2008, pp.23-30.

Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," Bio-Inspired Computing: Theories andApplications, 2008, pp.23-30.

Biological Alphabets and DNA-based Cryptography Qinghai Gao Department of Security Systems, Farmingdale State College, SUNY

Implementing Modern Cryptographic Protocols Using DNA and RNA Information Processing ArashKarimi Iran University of Science and Technology (IUST), Narmak, Tehran, Iran, VOL.11 No.11, November 2011.

auday h. saeed al-wattar, ramlan

mahmod, zuriatiahmadzukarnain&nurizuraudzir university putramalaysia, faculty of computer science & information technolgy, selangor-serdang, malaysia




DOI: https://doi.org/10.26483/ijarcs.v9i2.5860

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science