Reconfigurable pseudo biotic key encryption mechanism for cryptography applications
-
2017-12-31 https://doi.org/10.14419/ijet.v7i1.5.9124 -
DNA cryptography with symmetric key, DNA, mRNA, FPGA. -
Abstract
Pseudo biotic cryptography will be an advanced crypto-analytic model, as it is presently increasing bimolecular computation, since its process energize and can verify future generation network computing. Nowadays, the data protection has become very important such that an unbreakable encryption technology should be designed in order to provide security for the data. A new paradigm in cryptography to secure information was introduced through biological structure called central dogma of molecular biology. DNA cryptographic system gains more popularity with enhanced features like, high storage capacity, security level, and more time to break the crypto system. This paper proposes new pseudo biotic DNA based crypto mechanism. This DNA computing created good path for storing large information, correspondence and high energy efficiency. The proposed method, message is converted to Deoxyribonucleic Acid (DNA), Messenger Ribonucleic acid (MRNA), and Transpose Ribonucleic acid (TRNA) standards. A part of converted message is spliced unsymmetrical to produce a random key at each stage. The sliced unsymmetrical key generation mechanism relies on the genetic information. The process involves in splicing the message and generating multiple sequence of keys from different stages which are random in order to enhance the degree of security. Cracking possibility of the algorithm is less due to pseudo random key generation mechanism and cipher both were merged in protein form. Proposed Algorithm utilizes less public key infrastructure, and communicated between Alice and Bob. Algorithm was designed, using Verilog HDL; Synthesized & Simulated in Vivado and hardware implementation is targeted to Zync FPGA architecture.Â
-
References
[1] E.SureshBabu, C. Nagaraju, MHM Krishna Prasad “Inspired Pseudo Biotic DNA based Cryptographic Mechanism against Adaptive Cryptographic Attacks†Accepted in The Mediterranean Journal of Computers and Networks. ISSN 1744-2397.
[2] E.SureshBabu, C. Nagaraju, MHM Krishna Prasad “ Light-Weighted DNA Based Cryptographic Mechanism Against Chosen Cipher Text Attacks†Springer ,May 2015.
[3] AsishAich, Alo Sen, Satya Ranjan Dash and SatchidanandaDehuri “A Symmetric Key Cryptosystem Using DNA Sequence with OTP Keyâ€Information Systems Design and Intelligent Applications in 2015, pp 207-215
[4] Sreeja C.S, Mohammed Misbahuddin “DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology†International Conference on Computing and Communication Technologies, IEEE in 2014.
[5] Sabari Pramanik, Sanjit Kumar Setua, “DNA cryptographyâ€, International Conference on Electrical and Computer Engineering, 20-22 December,2012.
[6] DarpanAnand, VineetaKhemchandani, Rajendra K Sharma ,“Identity-based cryptography techniques and applications†, Computational Intelligence and Communication Networks (CICN), IEEE in 2013.[7] Mandeep Singh Narula,Simarpreet Singh,†Implementation of Triple Data Encryption Standard using Verilogâ€, published in IJARCSSE in 2014.
[8] Vikas Agrawal, Shruti Agrawal, Rajesh Deshmukh, “Analysis and Review of Encryption and Decryption for Secure Communicationâ€, International Journal of Scientific Engineering and Research (IJSER), Volume 2 Issue 2, February 2014.
[9] Harneet Singh, Karan Chugh, Harsh Dhaka, A.K.Verma, “DNA based Cryptography: An Approach to Secure Mobile Networksâ€, International Journal of Computer Applications, 2010.
[10] Advances in Intelligent Systems and Computing 340 J. K. Mandal, Suresh Chandra Satapathy, Manas Kumar Sanyal, Partha Pratim Sarkar, AnirbanMukhopadhyay(eds.)-“Information Systems Design and Intelligent Applications†pg 207 - 215 in the year 2015.
[11] X. Guozhen, L.U. Mingxin, Q. Lei, L. Xuejia, “New field of Cryptography: DNA Cryptographyâ€.
[12] Naveen Jarold K, P Karthigaikumar, N M Siva Mangai, Sandhya R, Sruthi B Asok, “Secure Communication Using DNA Cryptographyâ€, International Journal of Computer Science And Technology, Jan-March 2013.
[13] Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networksâ€, 2014 First International Conference on Networks & Soft Computing, ISSN:978-1-4799-3486-7/14,pp.270-273,August2014.
[14] Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.
[15] N Bala Dastagiri, Kakarla Hari Kishore "Reduction of Kickback Noise in Latched Comparators for Cardiac IMDs†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.43, Page: 1-6, November 2016.
[16] A Murali, K Hari Kishore, D Venkat Reddy "Integrating FPGAs with Trigger Circuitry Core System Insertions for Observability in Debugging Process†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.11, Issue No.12, page: 2643-2650, December 2016.
[17] Mahesh Mudavath, K Hari Kishore "Design of CMOS RF Front-End of Low Noise Amplifier for LTE System Applications Integrating FPGAs†Asian Journal of Information Technology, ISSN No: 1682-3915, Vol No.15, Issue No.20, page: 4040-4047, December 2016.
[18] P Bala Gopal, K Hari Kishore, B.Praveen Kittu “An FPGA Implementation of On Chip UART Testing with BIST Techniquesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 14 , pp. 34047-34051, August 2015
[19] S Nazeer Hussain, K Hari Kishore "Computational Optimization of Placement and Routing using Genetic Algorithm†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.47, page: 1-4, December 2016.
[20] N Bala Gopal, K Hari Kishore "Analysis of Low Power Low Kickback Noise in Dynamic Comparators in Pacemakers†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.44, page: 1-4, November 2016.
[21] Rajesh, M., and J. M. Gnanasekar. "Congestion control in heterogeneous wireless ad hoc network using FRCC." Australian Journal of Basic and Applied Sciences 9.7 (2015): 698-702.
[22] S.V.Manikanthan and V.Rama“Optimal Performance Of Key Predistribution Protocol In Wireless Sensor Networks†International Innovative Research Journal of Engineering and Technology ,ISSN NO: 2456-1983,Vol-2,Issue –Special –March 2017.
[23] T. Padmapriya and V. Saminadan, “Distributed Load Balancing for Multiuser Multi-class Traffic in MIMO LTE-Advanced Networksâ€, Research Journal of Applied Sciences, Engineering and Technology (RJASET) - Maxwell Scientific Organization , ISSN: 2040-7459; e-ISSN: 2040-7467, vol.12, no.8, pp:813-822, April 2016.
-
Downloads
-
How to Cite
Murali Krishna, B., Khan, H., & Madhumati, G. (2017). Reconfigurable pseudo biotic key encryption mechanism for cryptography applications. International Journal of Engineering & Technology, 7(1.5), 62-70. https://doi.org/10.14419/ijet.v7i1.5.9124Received date: 2018-01-11
Accepted date: 2018-01-11
Published date: 2017-12-31