DNA Cryptography Using DNA Fragment Assembly and Fragment Key Expansion for Genomic Data

DNA Cryptography Using DNA Fragment Assembly and Fragment Key Expansion for Genomic Data

Adithya B., Santhi G.
Copyright: © 2022 |Pages: 19
DOI: 10.4018/IJOCI.286173
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This research proposes a tweaked scheme based on DNA fragment assembly to improve protection over insecure channel. The proposed procedure utilizes binary coding to change over an underlying plaintext into a reference DNA arrangement to deal with the fragmentation. DNA fragment key expansion is applied over the reference DNA sequence to make the short-chain fragments. The redundancy in the long-chain of reference DNA is removed using DNA fragment assembly. A look-up table is generated to store the binary values of overlapped fragments to be reassembled during the encryption and decryption processes to prevent artefacts. Also, it is used in an overlapped sequence to counteract cipher decomposition. The results and comparisons demonstrate that the proposed scheme can balance the three most important characteristics of any DNA masking scheme: payload, capacity, and BPN. Moreover, the potential for cracking the proposed tweaked method is more complex than the current strategies.
Article Preview
Top

Introduction

Information security has become an essential aspect of technological advancements, fast internet speeds, and the increasing need for multimedia networks and information technologies. Concealment and encryption are the two most common encryption methods used today (Thanikaiselvan et al., 2017). Because of technological advancements, fast internet speeds, and an increasing need for multimedia networking and information technologies, information security has become vital. Thus, private information on PCs, for example, Visa numbers, email addresses, family photos, clinical records, and monetary data, should be shielded. Many ways to safeguard systems from unauthenticated device threats (outside device attacks) have investigated by Information Technology (IT) companies and researchers (Sohal et al., 2018). Steganography is the study of disguising a basic message inside cover media (like a picture, sound, video, or DNA) so the perpetrator is uninformed of its essence (Saha et al., 2017). On the other hand, cryptography is the art of translating an encoded letter into a nonsensical format that can only be decrypted by the sender and the receiver (Chauhan et al., 2017). Cryptography is not the same as steganography. Everyone can see the message encoded in the encryption, but no one can interpret it except the intended recipient.

Cryptographic approaches typically work on fragile text characters that must be repositioned or replaced with new characters according to a complex scheme organized by a hidden key that both the sender and the receiver known. On the other hand, subtle steganography is hiding the information, but no one will recognize it or even know its existence. However, it can be read (Al-Otaibi & Gutub, 2014) until noticed. The imperceptibility, hiding capacity, and robustness of any steganography technique decide its ultimate effectiveness. The key purpose of concealment is to deter hackers from being accused of transmitting secret messages while still providing authentication and anonymity to legal parties (Mstafa & Elleithy, 2017). Due to the advantages of biotechnology, such as parallel computing, self-assembled DNA (Deoxyribonucleic Acid) standards, and extensive data storage capabilities, biotechnology has been used in many aspects of human life (Liu et al., 2014; Hossain et al., 2016).

DNA Computing is a revolutionary method for protecting data that uses the biological structure of DNA. In 1994, Adleman created it to solve complex issues like the directed Hamilton route problem and NP-complete problems like the Travelling Salesman Problem (TSP). Adleman is also known as the “A” in the RSA method, which has become the de facto standard for industrial-strength encryption of data transferred over the Internet in some circles. For example, in real-time applications like telemedicine, the medical IoT network collects physiological data and then sent to a healthcare big data centre for storage and illness detection (Yang et al., 2019). Various researchers further developed the technology to encrypt data and reduce its storage capacity, making data transfer across the network quicker and more secure. Data can be stored and transmitted via DNA. The idea of employing DNA computing in cryptography and steganography has been recognized as a potential technology that might give unbreakable algorithms a new lease of life. Merits of DNA computing are followed as: 1) Speed- Millions of Instruction per Second (MIPS) measure how much work a computer can do in a second. Adleman (1994) proved that combining DNA strands resulted in comparable to IJOCI.286173.m01 or better computations, possibly over 100 times quicker than the fastest computer. 2) Storage- Whereas traditional storage medium takes IJOCI.286173.m02 cubic nanometers to store 1 bit, DNA stores memory at a density of roughly 1 bit per cubic nanometer. 3) Power- While the calculation is in progress, no power is required for DNA computing. Chemical bonds, which are the building blocks of DNA, are formed without any external energy. The power needs of traditional computers pale in contrast.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022)
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing