Fig 2 - uploaded by Osama Shahin
Content may be subject to copyright.
Block diagram of the RSA helper function.

Block diagram of the RSA helper function.

Source publication
Article
Full-text available
Security of sensitive information at the time of transmission over public channels is one of the critical issues in digital society. The DNA-based cryptography technique is a new paradigm in the cryptography field that is used to protect data during transmission. In this paper we introduce the asymmetric DNA cryptography technique for encrypting an...

Contexts in source publication

Context 1
... process at the sender consists of 14 security levels. On the other hand, the RSA cryptography system is not used to encrypt a PT; rather, it is used as a helper function to generate the DNA Dynamic Sequence Table (DDST), the round keys RK i , i = 1, 2, 3, . . . , 14, and the Start Decryption Key (SDK) during the encryption process, as shown in Fig. 2. The SDK is combined with the CT and is used to initiate the decryption ...
Context 2
... process at the sender consists of 14 security levels. On the other hand, the RSA cryptography system is not used to encrypt a PT; rather, it is used as a helper function to generate the DNA Dynamic Sequence Table (DDST), the round keys RK i , i = 1, 2, 3, . . . , 14, and the Start Decryption Key (SDK) during the encryption process, as shown in Fig. 2. The SDK is combined with the CT and is used to initiate the decryption ...

Similar publications

Article
Full-text available
The security of transmitting information from one point to another through different media is an important issue in the modern digital society. Researchers have consistently developed and proposed modern data transfer systems in order to transfer data in a safe manner. DNA (deoxyribonucleic acid) based encryption technology is a new encryption mode...
Article
Full-text available
The research proposes a novel invisible structured light 3D object encryption method. The system projects invisible light on the target plane to achieve three-dimensional object reconstruction. The encryption is conducted using keys from eight stripe patterns and two fingerprint patterns using an elliptic curve encryption algorithm to generate eigh...
Article
Full-text available
Information security has become a significant issue in encryption due to the rapid progress of internet and network. Therefore, the development of the encryption algorithm is a growing and significant problem. In this study, a new color image encryption was introduced based on DNA complementary rules and pair coupled chaotic maps. At first, the pla...
Article
Full-text available
With the advancement of technology worldwide, security is essential for online information and data. This research work proposes a novel image encryption method based on combined chaotic maps, Halton sequence, five-dimension (5D) Hyper-Chaotic System and Deoxyribonucleic Acid (DNA) encoding. Halton sequence is a known low-discrepancy sequence havin...
Thesis
Full-text available
Traditional cryptographic systems are built on strong mathematical and theoretical basis. Therefore, an important perception is needed to be developed that the DNA cryptography is not only to negate the tradition, but also to develop more interaction between existing and new technology. This thesis introduces and applies a proposed DNA sequence enh...

Citations

... These algorithms lack a theoretical approach, which makes modeling excellent DNA cryptographicschemes difficult [6]. Playfair cipher [9] , a symmetric encryption algorithm, which takes two nearby characters in the plaintext as single units and changes over them into cipher text. In the initial step the key is processed i.e., expel all the rehashed characters from the key and arrange the remaining key characters in a predefined 5x5 letter set framework (Table.1). ...
... The receiver performed the reverse process and gets the plaintext. Here, the key is generated randomly and for each communication new key was generated [9]. Vinay Cui designed an encryption scheme by using DNA digital coding, PCR amplification and DNA synthesis and also use the traditional cryptography theory. ...
Article
Full-text available
One kind of encryption that makes use of DNA to encode and decode data is called "DNA cryptography." DNA sequences, with their peculiar arrangement of information, may be used to easily apply security measures for sensitive data. Though much has been studied and numerous algorithms have been created for concealing the data, DNA sequence based data encryption seems to be an efficient option for addressing the existing information security demands. The work applies the classic Playfair cipher to DNA cryptography. There are 26 different alphabets, however only 25 are used in the key matrix of a standard matrix since the key matrix is only 5 by 5. In this study, we employ genetic algorithms to produce the key, and an 8x8 key matrix containing 64 DNA codons to increase security. Although the encryption method has been improved, it still follows some of the fundamental principles of the original Playfair Algorithm. To address these issues and strengthen the security of the Playfair method, the DNA codons are rearranged into an 8x8 matrix. The suggested approach is time-effective since it makes use of a LOOKUP table with 64 possible values (A..Z, a..z, 0..9, etc). Additionally, each transmission has a unique LOOKUP table arrangement. We implement the suggested approach and compare its runtime complexity to that of several well-known ciphers. To that end, this paper's primary contribution is a DNA-based security mechanism.
... Plain content is firstly changed over to binary organize and after that to DNA organize utilizing the DNA substitution. Asymmetric algorithms using public and private keys are introduced in [17]. ...
Preprint
Full-text available
: Digital communication is becoming an integral component of contemporary society and the use of mobile devices is increasing faster than ever. The function of message communication is becoming more popular as for mobile phone users, a short messaging service (SMS) requires an extremely high level of security. Any SMS that enters a person's smartphone must be considered a private affair, with privacy and security safeguarded. This research study found a novel Deoxyribonucleic acid (DNA) Cryptography method that uses a dynamic DNA sequence table to increase security. Cryptography is a popular approach for ensuring the confidentiality of a message. This paper proposed an Efficient Cryptographic Scheme for SMS (ECSS) algorithm to protect texts received from an Android smartphone. ECSS-based encryption has been identified as a novel method of securing information in the form of DNA molecules that employ DNA strands to conceal the information. This Paper provides the DNA cryptography approach for encrypting and decrypting plain texts in this work. The primary goal of ECSS cryptography is to guarantee secrecy when people transfer data across a network. This paper examines DNA Crypto, the distinction between classical cryptography and DNA Data encryption. An Android-based app is created to perform the proposed technique and the results show that the algorithms produce a consistent encryption result in which the length of the message before encryption is always the same as the length of the message after decryption. The suggested security solution has the potential to greatly improve the security of mobile communication. This Paper also provides experimental results for our chat application performance, such as received text message correctness, cipher text, average encryption time and average decryption time. According to the findings/results of this study, the speed of average encryption and decryption of the description is roughly 0.011 and 0.037 sec and prevents plaintext and dictionary attacks.
... In this study [44], the idea of DNA Deep Learning Cryptography is proposed, where it is utilized to encrypt and decode data, as well as key generation using a genetic algorithm. In this study, Hassan Al-Mahdi et al. [45] introduced a novel DNA cryptography method that utilizes data dependence, dynamic encoding tables, dynamic round keys, and the incorporation of an asymmetric encryption system. In this technique [46], the data are encrypted using a DNA sequence, and the pseudo-random number generator is merged with El-Gamal key generation to generate the key. ...
Article
Full-text available
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing. Cloud storage is popular among individuals and businesses because it reduces cost, increases productivity, boosts performance, and improves security. However, cloud computing comes with security risks as data are stored with third-party providers, and Internet access limits visibility and control. Effective data security and data protection are key issues compared with traditional on-premise computing. There are several methods for ensuring data security in the cloud, of which cryptography is the most important. Cryptography offers a range of security features including authentication, confidentiality, integrity, and availability. However, a thorough examination of the different cryptography methods in a single study is lacking. This study comprehensively examined different cryptography methods, including deoxyribose nucleic acid (DNA), elliptic curve, homomorphic, hybrid, lightweight, and novel methods. The analysis addresses their methodology, algorithms, results, applications, and limitations and provides valuable suggestions for data security in the cloud. This paper proposes the use of elliptic curve cryptography (ECC) to ensure safe communication and lightweight cryptography for Internet of Things (IoT) devices with limited resources. This emphasizes the benefit of combining asymmetric security with symmetric efficiency in hybrid cryptography.
... The popular encryption mechanisms used for symmetric key encryption are the data encryption standard, triple-DES, and the advanced encryption standard [12,11].Asymmetric key encryption differs in that it uses the key pair concept. One of these keys is used for encryption, while the other is used for decryption [13,14]. Thus, the asymmetric technique can provide authentication, integrity, and nonrepudiation [11]. ...
Preprint
Full-text available
DNA steganography is a technique that utilizes the DNA sequence as the basis for the secure transmission of critical data. This technique consists mainly of encrypting and hiding messages within the high capacity of DNA sequences in order to prevent adversaries from reading and decoding secret messages. However, the biometric system is a technological recognition system that processes information about an individual to distinguish them. Biometrics are used in many applications, including fingerprinting, iris scanning, and face recognition. This research will focus on the development of an effective and secure technique that combines steganography and cryptography. This method aims to protect the image of fingerprints in the communication channel while keeping the information confidential. The hiding process of the proposed system converts fingerprint images into a binary series, which is then added to the DNA sequence after applying the appropriate encryption method. The proposed technique utilizes the Feistel network in the encryption process and uses an insertion technique in the hiding process. It has a low cracking probability, high BPN numbers, and good execution times. During the hiding and decoding processes, the proposed system utilizes four different keys, which are chosen randomly, resulting in a high key space and ahigh key sensitivity. The proposed technique increases the noise by adding some random ambiguity bits at random positions in the fingerprint image. The experimental results show that the proposed system is resistant to several attacks, such as known-plaintext attacks and chosen-plaintext attacks. The proposed technique is limited to hiding only a small image inside the DNA and does not handle video, audio, or a large image size.
... When information is encrypted using a cryptographic method, the resultant output may be unintelligible to an outsider without access to the key. Knowing the key is a crucial component of the encryption and decryption processes [1]. Nowadays, most web applications generate the key from the user's entered password because it can be easily remembered by the users. ...
... Cryptography is the science used to protect the integrity of data [1]. Cryptography is very closely related to the confidentiality [2], integrity and availability of confidential data [3]. Cryptographic algorithms have had rapid development from year to year. ...
Article
Full-text available
In the field of cryptography, the key and procedures for converting messages into secret messages have a very important role. The RSA key is built with a random number generator. The RSA key is made as strong as possible to increase ciphertext robustness. A key that is difficult to crack and requires a lot of time certainly has higher robustness. Two initial variables that are very important in building RSA keys are prime number p and prime number q. In this research, the p and q prime numbers are generated by Cubic Congruential Generator algorithm. The results of this study can be seen by testing the ciphertext robustness. Ciphertext test results that are resistant to cryptanalytic attacks certainly show the strength of the key that is built, including the selection of primes p and primes q. The ciphertext test shows that 90% of the greater primes p and primes q will achieve a higher percentage of ciphertext robustness, and 10 % of the combination from small prime number p with large prime number q is also able to achieve the highest percentage of ciphertext robustness. This proves that the selection of prime number p and prime number q in generating RSA keys really can affect the ciphertext robustness.
... In a study conducted by Al-Mahdi and et.al. (2019) [2] design and analyze DNA encryption and decryption technique based on asymmetric cryptography system. Here the asymmetric (RSA) cryptography DNA encoding technique is used for encoding and decoding the plaintexts. ...
Article
    Protecting sensitive information while transmitting data across communication channel is very important. The field of study which deals with transmitting information in an unreadable form isknown as cryptography. A modern cryptography technique, DNA Cryptography, is used to encode messages in the form of DNA genes. The DNA consists of four genes: Adenine (denotedby A), Cytosine (denoted by C), Thymine (denoted by T) and Guanine (denoted by G). The DNA encryption process converts the given messages in the form DNA sequences and the DNA decryption process converts the resulting DNA sequences in the original form. In this paper, the output of three different Symmetric Cryptographic algorithms: DES, AES and Blowfish are compared in terms of average encryption time, average decryption time for different datasets and the effect of length of plaintext on encryption time and decryption is analyzed so as to measure the performance of those algorithms. While comparing the above algorithm it is found that: The AES based DNA Cryptography algorithm takes more encryption and decryption time while the DES based DNA algorithm takes less encryption time and the Blowfish based DNA algorithm takes less decryption time. The result also shows that the decryption time is much faster as compared to that of encryption time.
    Article
    Full-text available
    In a time where preserving data privacy is vital, encryption serves a pivotal role in protecting information from unauthorized intrusion. This review examines its application in encrypting and decrypting text data, shedding light on its mechanisms and practical implications. The encryption algorithm utilizes advanced cryptographic techniques to safeguard the confidentiality of messages exchanged. The purpose of cryptography encryption and decryption method leveraging for secure communication. This review provides a comprehensive overview of AES encryption and decryption, highlighting its strengths, weaknesses, and practical considerations. It effectively communicates the importance of AES in securing text data while acknowledging its limitations and areas for improvement.
    Article
    DNA steganography is a technique for securely transmitting important data using DNA sequences. It involves encrypting and hiding messages within DNA sequences to prevent unauthorized access and decoding of sensitive information. Biometric systems, such as fingerprinting and iris scanning, are used for individual recognition. Since biometric information cannot be changed if compromised, it is essential to ensure its security. This research aims to develop a secure technique that combines steganography and cryptography to protect fingerprint images during communication while maintaining confidentiality. The technique converts fingerprint images into binary data, encrypts them, and embeds them into the DNA sequence. It utilizes the Feistel network encryption process, along with a mathematical function and an insertion technique for hiding the data. The proposed method offers a low probability of being cracked, a high number of hiding positions, and efficient execution times. Four randomly chosen keys are used for hiding and decoding, providing a large key space and enhanced key sensitivity. The technique undergoes evaluation using the NIST statistical test suite and is compared with other research papers. It demonstrates resilience against various attacks, including known-plaintext and chosen-plaintext attacks. To enhance security, random ambiguous bits are introduced at random locations in the fingerprint image, increasing noise. However, it is important to note that this technique is limited to hiding small images within DNA sequences and cannot handle video, audio, or large images.
    Article
    Full-text available
    The main aim of this paper is to introduce the relationship between the topic of coding theory and the projective space in field three and test the code. The maximum value of size of code over finite field of order three and an incidence matrix with the parameters, n (length of code), d (minimum distance of code) and e (error-correcting of code) have been constructed. With a theorem and a result that test the code if it is perfect or not.