CiiT International Journal of Networking and Communication Engineering, Vol 11, No 4, April 2019 53
ISSN 0974-9713/CIIT–IJ-7793/06/$20/$100 © 2019 CiiT Published by the Coimbatore Institute of Information Technology
Abstract---Data security is one of the important aspects of
network security so a encryption algorithm is needed to increase data
security like DNA Cryptography. DNA cryptography is a fusion of
biotech and Computer Science field. This paper mainly focuses on
implementation of the DNA cryptosystem with the use of AES and
keys management using RSA algorithm and also for verification of
data at other side message digest SHA-256 has been used to achieve
Authentication, integrity, confidentiality, Non-repudiation, Access
control, availability & signature. The system has been implemented
in java using NETBEANS IDE 8.2.
Keywords---Data Security, Advance Encryption Standard (AES),
Rivest, Shamir, and Adelman (RSA), DNA Encryption (DNAE),
Cryptography, Data Verification, SHA-256.
I. INTRODUCTION
RYPTOGRAPHY is a field of study about the secret text.
Encryption means converting plain text into cipher text
and decryption is just reverse process of encryption means
converting Cipher text into plain text [1]. Cryptography means
converting plain text into secret codes. Sensitive information
is being encoded using cryptography [2]. DNA cryptography
is a subject of study about how to use DNA as an information
carrier and it uses modern biotechnology as a measure to
transfer cipher text into plaintext [3]. DNA computing has
high level computational ability and is capable of storing huge
amounts of data [4]. Information security has rich set of
encryption algorithm. They can categorize in private key
encryption and public key encryption, in private key
encryption only one common key is used whereas in public
key encryption public and private key is used [5]. Public key
is known publicly, used to encrypt data whereas private key is
only known to the authorized user and cipher text can only be
decrypted using private key. An application that enables both
encryption and decryption is called cryptosystem. The size of
key used for encryption specifies the level of security. For
example if key size is 512 and 1024 bits respectively then
1024 bits key is more secure than 512 bits keys [6]. The size
of the key space is propositional to the time taken to crack the
cipher text by the intruders [2]. Key management is one of the
important aspects of cryptosystem, the more efficiently keys
Manuscript received on April 02, 2019, review completed on April 10,
2019 and revised on April 15, 2019.
Manoj Kumar Pandey is with the Department of CSE, Swami Shri
Swaroopanand Saraswati Mahavidyalaya, Hudco, Bhilai. E-Mail:
manojpnd88@gmail.com
Preeti Tiwari is with the Department of CSE, Shri Shankracharya
Technical College, Junwani. E-Mail: pmpreeti497@gmail.com
Digital Object Identifier: NCE042019001.
are managed, more security will be provided to the system.
DNA cryptography is a new area of cryptography research
which derived from the biology [7]. This paper holds
implementation of DNA cryptosystem using AES and
managements of keys using RSA algorithm.
Fig 1: Encryption and Decryption Process
II. RELATED WORK
DNA algorithm was implemented using symmetric coding
in BioJava and Mat Lab and as results; a comparison has been
made between the performances of different standard
symmetrical algorithms using dedicated applications and also
concluded that the DNA Cipher requires a longer execution
time for encryption and decryption, comparatively to the other
ciphers. [8].
DNA Encryption (DNAE) system has been implemented
based on the Central Dogma of Molecular Biology (CDMB)
and authors have present a technical process for protecting
data assets such as personal medical information using a DNA
cryptography technique in which a person's own blood mineral
levels serve as a seed for selecting, transmitting, and
recovering his sensitive personal data [9].
DNA based system is implemented and concluded from the
various analyses that the proposed DNA-based cryptosystem
promises to be a better solution for implementation in securing
the mobile networks [10].
A secured symmetric key generation scheme is presented,
which generates primary cipher and this primary cipher is then
converted into final cipher using DNA sequences, so as to
make it again more complicated in reading [11].
III. DNA ENCRYPTION ALGORITHM
DNA cryptography is a modern technology and has been
derived from biotech field. DNA cryptography can play a vital
role in the field of network security. In DNA cryptography
following values for the binary numbers is substituted and a
chain of DNA is generated which is more secure and reliable.
In DNA cryptography mixture of mathematical and biological
concepts are used to get the encrypted data in the form DNA
Implementation of DNA Cryptosystem Using Public
and Private Key Cryptography
Manoj Kumar Pandey and Preeti Tiwari
C