CiiT International Journal of Networking and Communication Engineering, Vol 11, No 4, April 2019 53 ISSN 0974-9713/CIITIJ-7793/06/$20/$100 © 2019 CiiT Published by the Coimbatore Institute of Information Technology Abstract---Data security is one of the important aspects of network security so a encryption algorithm is needed to increase data security like DNA Cryptography. DNA cryptography is a fusion of biotech and Computer Science field. This paper mainly focuses on implementation of the DNA cryptosystem with the use of AES and keys management using RSA algorithm and also for verification of data at other side message digest SHA-256 has been used to achieve Authentication, integrity, confidentiality, Non-repudiation, Access control, availability & signature. The system has been implemented in java using NETBEANS IDE 8.2. Keywords---Data Security, Advance Encryption Standard (AES), Rivest, Shamir, and Adelman (RSA), DNA Encryption (DNAE), Cryptography, Data Verification, SHA-256. I. INTRODUCTION RYPTOGRAPHY is a field of study about the secret text. Encryption means converting plain text into cipher text and decryption is just reverse process of encryption means converting Cipher text into plain text [1]. Cryptography means converting plain text into secret codes. Sensitive information is being encoded using cryptography [2]. DNA cryptography is a subject of study about how to use DNA as an information carrier and it uses modern biotechnology as a measure to transfer cipher text into plaintext [3]. DNA computing has high level computational ability and is capable of storing huge amounts of data [4]. Information security has rich set of encryption algorithm. They can categorize in private key encryption and public key encryption, in private key encryption only one common key is used whereas in public key encryption public and private key is used [5]. Public key is known publicly, used to encrypt data whereas private key is only known to the authorized user and cipher text can only be decrypted using private key. An application that enables both encryption and decryption is called cryptosystem. The size of key used for encryption specifies the level of security. For example if key size is 512 and 1024 bits respectively then 1024 bits key is more secure than 512 bits keys [6]. The size of the key space is propositional to the time taken to crack the cipher text by the intruders [2]. Key management is one of the important aspects of cryptosystem, the more efficiently keys Manuscript received on April 02, 2019, review completed on April 10, 2019 and revised on April 15, 2019. Manoj Kumar Pandey is with the Department of CSE, Swami Shri Swaroopanand Saraswati Mahavidyalaya, Hudco, Bhilai. E-Mail: manojpnd88@gmail.com Preeti Tiwari is with the Department of CSE, Shri Shankracharya Technical College, Junwani. E-Mail: pmpreeti497@gmail.com Digital Object Identifier: NCE042019001. are managed, more security will be provided to the system. DNA cryptography is a new area of cryptography research which derived from the biology [7]. This paper holds implementation of DNA cryptosystem using AES and managements of keys using RSA algorithm. Fig 1: Encryption and Decryption Process II. RELATED WORK DNA algorithm was implemented using symmetric coding in BioJava and Mat Lab and as results; a comparison has been made between the performances of different standard symmetrical algorithms using dedicated applications and also concluded that the DNA Cipher requires a longer execution time for encryption and decryption, comparatively to the other ciphers. [8]. DNA Encryption (DNAE) system has been implemented based on the Central Dogma of Molecular Biology (CDMB) and authors have present a technical process for protecting data assets such as personal medical information using a DNA cryptography technique in which a person's own blood mineral levels serve as a seed for selecting, transmitting, and recovering his sensitive personal data [9]. DNA based system is implemented and concluded from the various analyses that the proposed DNA-based cryptosystem promises to be a better solution for implementation in securing the mobile networks [10]. A secured symmetric key generation scheme is presented, which generates primary cipher and this primary cipher is then converted into final cipher using DNA sequences, so as to make it again more complicated in reading [11]. III. DNA ENCRYPTION ALGORITHM DNA cryptography is a modern technology and has been derived from biotech field. DNA cryptography can play a vital role in the field of network security. In DNA cryptography following values for the binary numbers is substituted and a chain of DNA is generated which is more secure and reliable. In DNA cryptography mixture of mathematical and biological concepts are used to get the encrypted data in the form DNA Implementation of DNA Cryptosystem Using Public and Private Key Cryptography Manoj Kumar Pandey and Preeti Tiwari C