SlideShare ist ein Scribd-Unternehmen logo
1 von 25
DNA Data Cryptography
Submitted to the

DELHI TECHNOLOGICAL UNIVERSITY
In Partial fulfillment of the requirements for
The award of the degree of
Fellowship
In
Engineering Education
By
Siddharth Malhotra , Avinash Kumar, Mayukh Maitra , Saransh Garg, Isha Panesar

DNA Cryptography

Page 1
ACKNOWLEDGEMENT
I am indebted and thankful to all the people who have cooperated with me in this
endeavor and I wish to acknowledge and thank them.
I express my sincere gratitude to Ms. Abhilasha Sharma, faculty of Department of Software
Engineer, Delhi Technological University for her continuous encouragement and interest
through out the project work.

We also express our special thanks to others faculty of Department of Software Engineer
for their advice and co-operation.
I am highly indebted to Ms. Abhilasha Sharma, Department of Software Engineer, Delhi
Technological University, New Delhi, Delhi for the valuable guidance received through the
execution of this project.

Last but not the least, I extend my sincere gratitude to the ALMIGHTY who has given
courage and confidence to complete this project work.

Siddharth Malhotra
Avinash Kumar
Mayukh Maitra
Saransh Garg
Isha Panesar

DNA Cryptography

Page 2
DECLARATION

Certified that the thesis entitled “DNA Data Cryptography ” is a bonafide record of
independent Work done by me at Delhi Technological University, Delhi, under the
supervision of Ms. Abhilasha Sharma faculty of Information Technology Department, NIT
Durgapur.
Also certified that the reported herein does not form part of any Other thesis
or dissertation on the basis of which a degree or award was conferred earlier.

Date:

Place:

Siddharth Malhotra
Avinash Kumar
Mayukh Maitra
Saransh Garg
Isha Panesar

DNA Cryptography

Page 3
Delhi Technological University

CERTIFICATE OF ACCEPTANCE
The report of the project titled “DNA DATA CRYPTOGRAPHY” submitted by Siddharth,
Avinash, Mayukh, Saransh, Isha of 4th semester B.Tech Software Engineer major is here
by recommended to be accepted for the partial fulfillment of the requirements for
B.Tech(SE) degree in Delhi Technological University.

Name of Examiner:

DNA Cryptography

Signature with Date

Page 4
INTRODUCTION
DNA Data Cryptography is a new field based on the researches in DNA computation and
new technologies like: PCR (Polymerase Chain Reaction), Microarray, etc. DNA computing
has a high level computational ability and is capable of storing huge amounts of data.
A gram of DNA contains 1021 DNA bases, equivalent to 108 terabytes of data. In DNA
cryptography we use existing biological information from DNA public databases to encode
the plaintext. The cryptographic process can make use of different methods. In the onetime pads (OTP) algorithms are described, which is one of the most efficient security
algorithms, while in a method based on the DNA splicing technique is detailed.
In the case of the one-time pad algorithms, the plaintext is combined with a secret
random key or pad which is used only once. The pad is combined with the plaintext using a
typical modular addition or an XOR operation, or another technique. In the case of the
start codes and the pattern codes specify the position of the introns, so they are no longer
easy to find. However, to transmit the spliced key, they make use of public-key secured
channel.
Additionally, we will describe an algorithm which makes use of asymmetric cryptographic
principles. The main idea is to avoid the usage of both purely mathematical symmetric and
asymmetric algorithms and to use an advanced asymmetric algorithm based on DNA.
The speed of the algorithm should be quite high because we make use of the powerful
parallel computing possibilities of the DNA. Also, the original asymmetric keys are
generated starting from a user password to avoid their storage.

Biological background :
DNA is the abbreviation for deoxyribonucleic acid which is the germ plasma of all life
styles. DNA is a kind of biological macromolecule and is made of nucleotides. Each
nucleotide contains a single base and there are four kinds of bases, which are adenine (A)
and thymine (T) or cytosine (C) and guanine (G), corresponding to four kinds of
nucleotides.
A single-stranded DNA is constructed with orientation: one end is called 5 ′, and the other
end is called 3 ′. Usually DNA exists as double-stranded molecules in nature. The two
complementary DNA strands are held together to form a doblehelix structure by hydrogen
DNA Cryptography

Page 5
bonds between the complementary bases of A and T (or C and G). The double-helix
structure was discovered by Watson and Crick; thus the complementary structure is called
Watson Crick complementarity. Their discovery is one of the greatest scientific discoveries
of the 20th century and reduced genetics to chemistry and laid the foundations for the
next half century of biology.

The development of DNA cryptography benefits from the progress of DNA computing (also
called molecular computing or biological computing). On the one hand, cryptography
always has some relationship with the corresponding computing model more or less. On
the other hand, some biological technologies used in DNA computation are also used in
DNA cryptography

DNA Cryptography

Page 6
Biotechnological Methods
have been developed for a wide class of operations on
DNA and RNA strands

Biomolecular Computation (BMC)
makes use of such biotechnological methods for doing computation
· Uses DNA as a medium for ultra-scale computation
· Comprehensive survey of Reif [R98]
· splicing operations allow for universal computation [Head92].
· BMC solution of combinatorial search problems:
Hamiltonian path problem [Adleman94]
Data Encryption Standard (DES)
[Boneh, et al 95] [Adleman, et al 96]
ultimately limited by volume requirements, which may grow exponentially with input size.

DNA Storage of Data
· A medium for ultra-compact information storage:
large amounts of data that can be stored in compactvolume.
· Vastly exceeds storage capacities of conventional electronic, magnetic, optical media.
· A gram of DNA contains 1021 DNA bases = 108 tera-bytes.
· A few grams of DNA may hold all data stored in world.
· Most recombinant DNA techniques are applied at concentrations of 5 grams of DNA per
liter of water.

DNA Cryptography

Page 7
DNA Data Bases:
· A “wet” data base of biological data natural DNA obtained from biological sources
may be recoded using nonstandard bases [Landweber,Lipton97], to allow for subsequent
BMC processing.
· DNA containing data obtained from more conventional binary storage media. input and
output of the DNA data can be moved to conventional binary storage media by DNA
chip arrays binary data may be encoded in DNA strands by use of an alphabet of short
oligonucleotide sequences.
Associative Searches within DNA databases:
· methods for fast associative searches within DNA databases using hybridization
[Baum95]
· [Reif95] data base join operations and various massively parallel operations on the DNA
data

Cryptography
Data security and cryptography are critical to computing data base applications.
Plaintext: non-encrypted form of message
Encryption: process of scrambling plaintext message, transforming it into an encrypted
message (cipher text).
Example:
a fixed codebook provides an initial mapping from characters in the finite plaintext
alphabet to a finite alphabet of codewords, then a sophisticated algorithm depending on a
key may be applied to further encrypt the message.
Decryption: the reverse process of transforming the
encrypted message back to the original plaintext
message.
Cryptosystem: a method for both encryption and decryption of data.
Unbreakable cryptosystem: one for which successful cryptanalysis is not possible.

DNA Cryptography

Page 8
Our MAIN RESULT:
DNA-based, molecular cryptography systems
· plaintext message data encoded in DNA strands by use of a (publicly known) alphabet of
short oligonucleotide sequences.
· Based on one-time-pads that are in principle unbreakable.
One-time-pads may be practical for DNA:
Practical applications of cryptographic systems based on one-time-pads are limited in
conventional electronic media, by the size of the one-time-pad.
DNA provides a much more compact storage media, and an extremely small amount of
DNA suffices even for huge one-time-pads.Our DNA one-time-pad encryption schemes:
· a substitution method using libraries of distinct pads, each of which defines a specific,
randomly generated, pair-wise mapping
· an XOR scheme utilizing molecular computation and indexed, random key strings

Applications of DNA-based
cryptography systems
· the encryption of (recoded) natural DNA
· the encryption of DNA encoding binary data.
Methods for 2D data input and output:
· use of chip-based DNA micro-array technology
· transform between conventional binary storage media via (photo-sensitive and/or
photoemitting)DNA chip arrays

DNA Steganography Systems:
· secretly tag the input DNA
· then disguise it (without further modifications) within collections of other DNA.
· original plaintext is not actually encrypted
· very appealing due to simplicity.
Example:
DNA plaintext messages are appended with one or more secret keys resulting appended
DNA strands are hidden by mixing them within many other irrelevant
DNA strands (e.g., randomly constructed DNA strands).[Clelland, Risca, and Bancroft]
genomic steganography: techniques using amplifiable microdots

DNA Cryptography

Page 9
Our RESULTS for DNA
Steganography Systems:
· Potential Limitations of these DNA
Steganography methods:
Show certain DNA steganography systems can be broken, with some assumptions on
information theoretic entropy of plaintext
messages.
· We also discuss various modified DNA steganography systems which appear to have
improved security.

Cryptosystems Using Random
One-Time Pads
Use secret codebook to convert short segments of plaintext messages to encrypted text:
Must be random codebook .Codebook can be used only once In secret, assemble a large
one-time-pad in the form of a DNA strand:
randomly assembled from short oligonucleotide sequences, isolated, and cloned.
One-time-pad shared in advance by both the sender and receiver of the secret message:
requires initial communication of one-timepad between sender and receiver facilitated by
compact nature of DNA.

A DNA Cryptosystem Using
Substitution
Substitution one-time-pad encryption:
· a substitution method using libraries of distinct pads, each of which defines a specific,
randomly generated, pair-wise mapping.
· The decryption is done by similar methods.
Input:
plaintext binary message of length n, partitioned into plaintext words of fixed length,
Substitution One-time-pad:
a table randomly mapping all possible strings of plaintext words into cipher words of fixed
length, such that there is a unique reverse mapping.
Encryption:
by substituting each ith block of the plaintext with the cipher word given by the table, and
is decrypted by reversing these substitutions.
DNA Cryptography

Page 10
DNA Implementation of Substitution
One-time-pad Encryption:
· plaintext messages:
one test tube of short DNA strands
· encrypted messages:
another test tube of different short DNA strands
Encryption by substitution:
maps these in a random yet reversible way plaintext is converted to cipher strands and
plaintext strands are removed
DNA Substitution one-time pads:
use long DNA pads containing many segments:
each segment contains a cipher word followed by a plaintext word.
cipher word: acts as a hybridization site for binding of a primer
cipher word is appended with a plaintext word to produce word-pairs.
These word-pair DNA strands used as a lookup table in conversion of plaintext into cipher
text.

One-time-pad DNA Sequence:
· Length n
· Contains d = n/(L1+ L2+ L3) copies of repeating
unit:

Repeating unit made up of:
· Bi = a cipher word of length L1 = c1log n
· Ci = a plaintext word length L2= c2log n
Each sequence pair uniquely associates a plaintext word with a cipher word.
· Polymerase "stopper" sequence of length L3 = c3,
To generate a set of oligonucleotides corresponding to the plaintext/cipher word-pair
strands:
· ~Bi used as polymerase primer
· extended with polymerase by specific attachment of plaintext word Ci.
· Stopper sequence prohibits extension of growing DNA strand beyond boundary of paired
plaintext word.
DNA Cryptography

Page 11
Word-pair strands are essentially:
a lookup table for a random codebook.
Feasibility depends upon:
· size of the lexicon;
· number of possible pads available;
· size, complexity, and frequency of message transmissions.
Parameter Range
Lexicon size 10,000 – 250,000 words
Word size 8 – 24 bases
Message size 5 – 30% of lexicon size
Pad diversity 106 - 108
Pad diversity: total number of random pads generated during a single pad construction
experiment.

Methods for Construction of DNA one-time pads.
(1) Random assembly of one-time pads in solution (e.g. on a synthesis column).
· Difficult to achieve both full coverage and yet still avoiding possible conflicts by repetition
of plaintext and/or cipher words.
· can set c1 and c2 large so probability of repeated words on pad of length n is small, but
coverage is be reduced.
(2) Use of DNA chip technology for random assembly of one-time pads
Advantages:
currently commercially available (Affymetrix) chemical methods for construction of
custom variants are well developed.

DNA chip Method for Construction
of DNA one-time pads.
· an array of immobilized DNA strands,
· multiple copies of a single sequence are grouped together in a microscopic pixel.
· optically addressable
· known technology for synthesis of distinct DNA sequences at each (optically addressable)
site of the array.
· combinatorial synthesis conducted in parallel at thousands of locations:
For preparation of oligonucleotides of length L, the 4L sequences are synthesized in 4n
chemical reactions.
Examples:
· 65,000 sequences of length 8 use 32 synthesis cycles
· 1.67x107 sequences of length 10 use 48 cycles DNA Chip Method for
DNA Cryptography

Page 12
Construction of DNA One-time pads
· plaintext and cipher pairs constructed:
· nearly complete coverage of the lexicon on each
pad, nearly unique word mapping between
plaintext and cipher pairs.
· resulting cipher word, plaintext word pairs can be
assembled together in random order (with possible
repetitions) on a long DNA strand by a number of
known methods:
blunt end ligation
hybridization assembly with complemented
pairs [Adleman97]
· Cloning or PCR used to amplify the resulting onetime
pad.

XOR One-time-pad (Vernam
Cipher) Cryptosystem
One-time-pad S:
a sequence of independently distributed random bits
M: a plaintext binary message of n bits
· Encrypted bits:
Ci = Mi XOR Si for = 1,…,n.
XOR: given two Boolean inputs, yields 0 if the inputs are the same, and otherwise is 1.
· Decrypted bits:
Use commutative property of XOR
Ci XOR Si = (Mi XOR Si) XOR Si
= Mi XOR (Si XOR Si)
= Mi.

DNA Cryptography

Page 13
DNA Implementation of
XOR One-time-pad Cryptosystem
· plaintext messages:
one test tube of short DNA strands
· encrypted messages:
another test tube of different short DNA strands
Encryption by XOR One-time-pad:
maps these in a random yet reversible way plaintext is converted to cipher strands and
plaintext strands are removed
For efficient DNA encoding: use modular base 4 (DNA has four nucleotides)
Encryption:
addition of one-time-pad elements modulo 4
Decryption:
subtract one-time-pad elements modulo 4

Details of DNA Implementation
of XOR One-time-pad Cryptosystem
· Each plaintext message has appended unique prefix index tag of length L0 indexing it.
· Each of one-time-pad DNA sequence has appended unique prefix index tag of same
length L0, forming complements of plaintext message tags.
· Use Recombinant DNA techniques (annealing and ligation) to concatenate into a single
DNA strand each corresponding pair of a plaintext message and a one-time-pad sequence
· These are encyphered by bit-wise XOR computation:
fragments of the plaintext are converted to cipher strands using the one-time-pad DNA
sequences, and plaintext strands are removed.
Reverse decryption is similar:
use commutative property of bit-wise XOR operation.

DNA Cryptography

Page 14
DNA Cryptosystem for 2D Images
using:
· DNA Chip
· Randomly Assembled One-Time Pad Encryption and Decryption of 2D images recorded
on microscopic arrays of a DNA chip:

DNA Cryptosystem consists of:
· Data set to be encrypted: 2-dimensional image
· DNA Chip bearing immobilized DNA strands:
contains an addressable array of nucleotide sequences immobilized s.t. multiple copies of
single sequence grouped together in a microscopic pixel.
· Library of one-time pads encoded on long DNA Strand Initialization and Message Input
· Fluorescent-labeled, word-pair DNA strands are prepared from a substitution pad
codebook
· These are annealed specifically to their sequence complements at unique sites (pixels) on
the DNA chip.
· The message information is transferred to a phot mask with transparent (white) and
opaque (black)regions:

Initialization and Message Input
· Immobile DNA strands are located on the glass substrate of the chip in a sequence
addressable grid.
· Word-pair strands are prepared from a random substitution pad:

DNA Cryptography

Page 15
the 5’ (unannealed) end carries a cipher word the 3’ (annealed) end carries a plaintext
word.
contain a photo-cleavable base analog between two sequence words (added to 3’ end of
cipher word during oligo synthesis) ·
The annealed DNA contains:
a fluorescent label on its 5' end (asterisk); a codebook-matching sequence word (not
basepaired on the chip);
a photo-labile base (white square) capable of cleaving the DNA backbone; and a chipmatching word (base-paired to immobile strand).

Encryption Procedure:
[1] start with DNA chip displaying sequences complementary to plaintext lexicon.
[2] fluorescent-labeled word-pair strands from one-time-pad are annealed to chip at pixel
bearing complement to plaintext 3’ end.
[3] mask protects some pixels from a light-flash. At unprotected regions,
DNA is cleaved between plaintext and cipher words.
[4] cipher word strands, still labeled with fluorophore at 5’ ends,
are collected and transmitted as encrypted message.

Encryption of the Message
· Following a light-flash of mask-protected chip, annealed oligonucleotides beneath
transparent mask pixels are cleaved at a photo-labile position:
their 5' sections are dissociated from annealed 3' section and collected in solution.
· This test tube of strands is encrypted message.
· Annealed oligos beneath opaque mask are unaffected by light-flash and can be washed
off chip.
· If encrypted message oligos are reannealed onto a (washed) DNA chip, message
information would be unreadable:
Simulated Read-Out of Encrypted Message from DNA Chip

Decryption Procedure
[1] word-pair strands constructed, appending cipher word with proper plaintext word, by
polymerase extension or lop-sided PCR using cipher words as primer and one-time-pad as
template.
[2] cipher strands bind to their specific locations on the pad and are appended with their
plaintext partner.
[3] binding reformed word-pair strands to DNA chip and reading message by fluorescent
microscopy.

DNA Cryptography

Page 16
Decryption of the Message
· use the fluorescent labeled oligos as primers in oneway (lopsided) PCR with the same
one-time codebook which was used to prepare the initial word-pair oligos.
· When word-pair PCR product is bound to the same DNA chip, the decrypted message is
revealed:
Decrypted Message
Simulated Read-Out of Decrypted Message from DNA
Chips

Steganography
a class of techniques that hide secret messages within other messages:
plaintext is not actually encrypted but is instead disguised or hidden within other data.
Historical examples:
· use of grills that mask out all of an image except the secret message,
· micro-photographs placed within larger images
· invisible inks, etc.
Disadvantages:
· Cryptography literature generally consider conventional steganography methods to have
low security:
steganography methods have been often broken in practice [Kahn67] and [Schneier96]
Advantages:
· it is very appealing due to it’s simplicity.

DNA Steganography Techniques:
· take one or more input DNA strands (considered to be the plaintext message)
· append to them one or more randomly constructed “secret key” strands.
· Resulting “tagged plaintext” DNA strands are hidden by mixing them within many other
additional “distracter” DNA strands which might also be constructed by random assembly.
Decryption:
· Given knowledge of the “secret key” strands,
· Resolution of DNA strands can be decrypted by a number of possible known recombinant
DNA separation methods:
plaintext message strands may be separated out by hybridization with the complements of
the “secret key” strands might be placed in solid support on magnetic beads or on a
prepared surface.
These separation steps may combined with amplification steps and/or PCR

DNA Cryptography

Page 17
Cryptanalysis of DNA Steganography Systems:
DNA steganography system’s security is entirely dependent on degree that message DNA
strands are indistinguishable from “distracter” DNA strands. Cryptanalysis Assumptions:
· no knowledge of the “secret key” strands
· secret tags are indistinguishable from “distracter” DNA strands.
· plaintext is not initially compressed, and comes from a source (e.g., English or natural
DNA) with Shannon information theoretic entropy ES > 1
· the “distracter” DNA strands are constructed by random assembly
Then: the original plaintext portion of “tagged plaintext” DNA strands are distinguishable
from “distracter” DNA strands, and the DNA Steganography System can be broken

Shannon (information theoretic) Entropy ES
· provides a measure of the factor that a source can be compressed without loss of
information.
Examples:
many images have entropy nearly 4 English text has entropy about 3 computer programs
have entropy about 5 most DNA have entropy range 1.2 to 2 Lossless Data Compression
[Lempel-Ziv 77]
Input: text string of length n with entropy ES
[1] Form a dictionary D of the d = n/L most frequently occurring subsequences of length at
least
L= ES log2n in the known source distribution.
[2] In place of subsequences of the input text matching with elements of the dictionary D,
substitute their indices in the dictionary D.

Cryptanalysis of DNA Steganography Systems:
Input: test tube T containing:
a mixture of “tagged plaintext” DNA strands mixed with a high concentration of
“distracter” DNA strands, of length n.
· form a dictionary D of the d = n/L most frequently occurring subsequences of length at
least L = ES log2n in the known plaintext source distribution.
· Give procedure for separating out plaintext message strands by repeated rounds of
hybridization with complements of elements of D.
r(T) = ratio of concentration of “distracter” DNA strands to “tagged plaintext” DNA strands.
On each round of separation:
form a new test tube F(T) with expected r(F(T)) considerably reduced from the previous
ratio r(T).

DNA Cryptography

Page 18
Separation Procedure:
[1] Pour a fraction s = 1/2 of volume of current test tube T into a test tube T1 and pour
remaining fraction 1-s of T into test tube T2.
[2] Choose a random text phrase x in D (not previously considered in a prior trial), and
using Watson-Crick complement of x, do a separation on test tube T2 , yielding a new test
tube T3 whose contents are only DNA strands containing phrase x.
[3] Pour contents of test tubes T1 and T3 into a new test tube F(T).
· Ratio r(F(T)) of “distracter” DNA strands to plaintext DNA will expect to decrease from
original ratio r(T) by a constant factor c < 1
· After O(log(r/r’)) repeated rounds of this process, ratio of concentration in test tube T will
expect to decrease from initially r = r(T) to any given smaller
ratio r’.

Another cryptanalysis technique for breaking
steganographic systems:
Cryptanalysis using “hints” that disambiguate plaintext.
Example:
· wish to make secret the DNA of an individual (e.g., the President)
· use an improved steganography system where “distracter” DNA strands (that are mixed
with DNA of an individual) are DNA from a similar but not identical genetic pool.
steganography system may often be broken by use of distinguishing “hints” concerning
DNA of the individual e.g., the individual might have a particular set of observable
expressed gene sequences (e.g., for baldness, etc.).
These hints may allow for subsequent identification of the full secret DNA:
use of a series of separation steps with complement of portions of known gene sequences.

Improved DNA Steganography
Systems with Enhanced security:
Idea: make it more difficult to distinguish probability distribution of plaintext source from
that of “distracter” DNA strands.
(1) Mimicking Distribution of “Distracter” DNA:
· use improved construction of the set of “distracter” DNA strands, so distribution better
mimics the plaintext source distribution
· construct the “distracter” DNA strands by random assembly from elements of Lempel-Ziv
dictionary.
· Drawback: Cryptanalysis using “hints” that disambiguate plaintext.
DNA Cryptography

Page 19
(2) Compression of Plaintext.
· recode the plaintext using a universal lossless compression algorithm (e.g., Lempel-Ziv
77].
· resulting distribution of the recoded plaintext approximates a universal distribution, so
uniformly random assembled distracter sequences may suffice
to provide improved security.
· Drawback: unlike conventional steganography methods, plaintext messages need to be
preprocessed.

DNA Cryptography

Page 20
DNA DATA CRYPTOGRAPHY IMPLEMENTATIONS
 Java Implementation:
One approach of the DNA Data Cryptography is a DNA-based symmetric cryptographic
algorithm. This algorithm involves three steps: key generation, encryption and
decryption. In fact, theencryption process makes use of two classic cryptographic
algorithms: the one-time pad, and the substitution cipher. Due to the restrictions that
limit the use of JCE, the algorithm was developed using OpenJDK, which is based on the
JDK 7.0 version of the Java platform and does not enforce certificate verification. In
order to generate random data we use the class SecureRandom housedin the
java.security package, class which is designed to generate cryptographically secure
random numbers.
The cipher encrypts or decrypts one block at a time, using a key that has the same
length as the block. The implementation of block ciphers raises an interesting problem:
the message we wish to encrypt will not always be a multiple of the block size. To
compensate for the last incomplete block, padding is needed. A padding scheme
specifies exactly how the last block of plaintext is filled with data before it is encrypted.
A corresponding procedure on the decryption side removes the padding and restores
the plaintext's original length. However, this DNA Cipher will not use a padding scheme
but a shorter version (a fraction) of the original key. The only mode of operation
implemented by the DNA Cipher is ECB (Electronic Code Book). This is the simplest
mode, in which each block of plaintext encrypts to a block of cipher text. ECB mode has
the disadvantage that the same plaintext will always encrypt to the same cipher text,
when using the same key. As we mentioned, the DNA Cipher applies a double
encryption in order to secure the message we want to keep secret. The first encryption
step uses a substitution cipher. For applying the substitution cipher it was used a
HashMap Object. HashMap is a java.util class that implements the Map interface. These
objects associate a specified value to a specified unique key in the map. One possible
approach is representing each character of the secret message by a combination of 3
bases on DNA, as shown in the table below:

DNA Cryptography

Page 21
Given the fact that this cipher replaces only lowercase characters with their
corresponding triplet and that in most messages we encounter also upper case letters,
the algorithm first transforms all the letters of the given secret message into lowercase
letters. The result after applying the substitution cipher is a string containing characters
from the DNA alphabet (a, c, g, t). This will further be transformed into a byte array,
together with the key. The exclusive or operation (XOR) is then applied to the key and
the message in order to produce the encrypted message. When decrypting an
encrypted message, it is essential to have the key and the substitution alphabet. While
the substitution alphabet is known, being public, the key is kept secret and is given only
to the addressee. Any malicious third party won’t be able to decrypt the message
without the original key. The received message is XOR-ed with the secret key resulting a
text in DNA alphabet. This text is then broken into groups of three characters and with
the help of the reverse map each group will be replaced with the corresponding letter.
The reverse map is the inverse of the one used for translating the original message into
a DNA message. This way the receiver is able to read the original secret message.

 BioJava Implementation:
In this approach, we use more steps to obtain the DNA code starting from the plaintext.
For each character from the message we wish to encode, we first apply the get_bytes()
method which returns an 8bit ASCII string of the character we wish to encode. Further,
we apply the get_DNA_code() method which converts the obtained 8 bit string,
corresponding to an ASCII character, into DNA alphabet. The function returns a string
which contains the DNA encoded message. The get_DNA_code() method is the main
method for converting the plaintext to DNA encoded text. For each 2 bits from the
DNA Cryptography

Page 22
initial 8 bit sequence, corresponding to an ASCII character, a specific DNA character is
assigned: 00 – A, 01 – C, 10 – G and 11 – T. Based on this process we obtain a raw DNA
message.
DNA encryption test sequence
Plaintext message: „test”
ASCII message: 116 101 115 116
Raw DNA message: „TCACGCCCTATCTCA”

The coded characters are searched in the chromosome chosen as session key at the
beginning of the communication. The raw DNA message is split into groups of 4 bases.
When such a group is found in the chromosome, its base index is stored in a vector. The
search is made between the first characters of the chromosome up to the 37983th. At
each new iteration, a 4 base segment is compared with the corresponding 4 base
segment from the raw DNA message. So, each character from the original string will
have an index vector associated, where the chromosome locations of that character are
found. The get_index() method effectuates the parsing the comparison of the
chromosomal sequences and creates for each character an index vector. To parse the
sequences in the FASTA format specific BioJava API methods were used. BioJava offers
us the possibility of reading the FASTA sequences by using a FASTA stream which is
obtained with the help of the SeqIOTools class. We can pass through each of the
sequences by using a SequenceIterator object. These sequences are then loaded into an
Sequence list of objects, from where they can be accessed using the SequneceAt()
method.

DNA Cryptography

Page 23
CONCLUSIONS AND COMPARED RESULTS
In this chapter we will present the results we obtained for the symmetric algorithm
implementation along with the conclusions of our present work. The symmetric OTP
DNA algorithm based on Java Cryptography Architecture was first tested. The purpose is
to compare the time required to complete the encryption/ decryption in the case of the
DNA Cipher with the time required by other classical encryption algorithms.
The methods in the classes that implement cryptographic services are divided into two
groups. The first group is represented by the APIs (Application Programming Interface).
It consists of public methods that can be used by the instances of these classes. The
second group is represented by the SPIs (Service Provider Interface)- a set of methods
that must be implemented by the derived classes. Each SPI class is abstract. In order to
implement a specific service, for a specific algorithm, a provider must inherit the
corresponding SPI class and implement all the abstract methods. All these methods
process array of bytes while the DNA Cipher is about strings.
The additional conversions from string to array of bytes and back make this cipher to
require more time for encryption and decryption then other classic algorithms. To
emphasize the difference between DNA and classical algorithms a dedicated application
( Smart Cipher ) was developed. The user has the possibility to enter the text in plain
format in the first box and then choose a suitable algorithm to encrypt his text. The
encrypted text can be visualized in the second box, while in the third one the user can
verify if the decryption process was successful.
An interesting feature of the dedicated application is that it shows the encryption and
decryption time. Based on this criterion and the strength of the cipher, the user can
estimate the efficiency of the used algorithm. In the second case considering the
symmetrical BioJava mechanism, our first goal was to compare the time required to
complete the encryption/ decryption process. We compared the execution time of the
DNA Symmetric Cipher with the time required by other classical encryption algorithms.

DNA Cryptography

Page 24
BIBLIOGRAPHY
1. Hook, D., Beginning Cryptography with Java, Wrox Press, (2005)
2. Gehani, A., LaBean, T., Reif, J., DNA-BasedCryptography. s.l.: DIMACS Series in
Discrete Mathematics and Theoretical Computer Science, Vol. 54
3. Schneier, B., Applied cryptography: protocols, algorithms, and source code in C,
John Wiley & Sons Inc, (1996)
4. Java Cryptography Architecture. Sun
Microsystems.http://java.sun.com/j2se/1.4.2/docs/guide/securit
y/CryptoSpec.html (2011)
5. DNA Alphabet. VSNS Biocomputing Division,
http://www.techfak.unibielefeld.de/bcd/Curric/PrwAli/node7.html#SECTION0007
100000000000000
0, (2011)
6. Wagner, N. R., The Laws of Cryptography with Java Code. [PDF], (2003).
7.

http://en.wikipedia.org/wiki/Cryptography

8.

http://link.springer.com/chapter/10.1007/978-3-540-24635-0_12

DNA Cryptography

Page 25

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipherVaibhav Khanna
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Cryptanalysis
CryptanalysisCryptanalysis
CryptanalysisSou Jana
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 

Was ist angesagt? (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Web Security
Web SecurityWeb Security
Web Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Key management
Key managementKey management
Key management
 
DES
DESDES
DES
 
Hash function
Hash function Hash function
Hash function
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 

Andere mochten auch

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY Abhishek Majumdar
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryptionAlexander Decker
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyAM Publications
 
DNA Encoding Protocol
DNA Encoding ProtocolDNA Encoding Protocol
DNA Encoding Protocolamitsnyderman
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice CryptographyPriyanka Aash
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionlockyerj
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...IOSR Journals
 
Summary - aims &objectives of islamic reconstruction dept by mohd asad
Summary - aims &objectives of islamic reconstruction dept by mohd asadSummary - aims &objectives of islamic reconstruction dept by mohd asad
Summary - aims &objectives of islamic reconstruction dept by mohd asadZaid Hamid
 
Choosing the right political model for pakistan
Choosing the right political model for pakistanChoosing the right political model for pakistan
Choosing the right political model for pakistanZaid Hamid
 
War on terror - BrassTacks Presentation
War on terror - BrassTacks PresentationWar on terror - BrassTacks Presentation
War on terror - BrassTacks PresentationZaid Hamid
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportMohit Kumar
 
Pakistan – the problems and solutions regarding terrorism and 4thGW
Pakistan – the problems and solutions regarding terrorism and 4thGWPakistan – the problems and solutions regarding terrorism and 4thGW
Pakistan – the problems and solutions regarding terrorism and 4thGWZaid Hamid
 

Andere mochten auch (20)

A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Acm aictc2016
Acm aictc2016Acm aictc2016
Acm aictc2016
 
Secure data transmission using dna encryption
Secure data transmission using dna encryptionSecure data transmission using dna encryption
Secure data transmission using dna encryption
 
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key CryptographyDNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography
 
DNA Encoding Protocol
DNA Encoding ProtocolDNA Encoding Protocol
DNA Encoding Protocol
 
AES Proposal
AES ProposalAES Proposal
AES Proposal
 
Data collection
Data collectionData collection
Data collection
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice Cryptography
 
shaoas;
shaoas;shaoas;
shaoas;
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
Simulation of Quantum Cryptography and use of DNA based algorithm for Secure ...
 
Summary - aims &objectives of islamic reconstruction dept by mohd asad
Summary - aims &objectives of islamic reconstruction dept by mohd asadSummary - aims &objectives of islamic reconstruction dept by mohd asad
Summary - aims &objectives of islamic reconstruction dept by mohd asad
 
Choosing the right political model for pakistan
Choosing the right political model for pakistanChoosing the right political model for pakistan
Choosing the right political model for pakistan
 
Hadoop technology doc
Hadoop technology docHadoop technology doc
Hadoop technology doc
 
Biometrics
BiometricsBiometrics
Biometrics
 
War on terror - BrassTacks Presentation
War on terror - BrassTacks PresentationWar on terror - BrassTacks Presentation
War on terror - BrassTacks Presentation
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Pakistan – the problems and solutions regarding terrorism and 4thGW
Pakistan – the problems and solutions regarding terrorism and 4thGWPakistan – the problems and solutions regarding terrorism and 4thGW
Pakistan – the problems and solutions regarding terrorism and 4thGW
 

Ähnlich wie Dna cryptography

A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption TechniqueSajedul Karim
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsIRJET Journal
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptxChandniA5
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyjournalBEEI
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA CryptographyIRJET Journal
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
 
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONDATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONijcisjournal
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsCSCJournals
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyBALAKUMARC1
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS ijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSijwmn
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS ijwmn
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography cscpconf
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageIOSR Journals
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acidIJECEIAES
 
Datastorage in DNA
Datastorage in DNADatastorage in DNA
Datastorage in DNAAditya Nag
 

Ähnlich wie Dna cryptography (20)

A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
C010521418
C010521418C010521418
C010521418
 
Survey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based AlgorithmsSurvey of Different DNA Cryptography based Algorithms
Survey of Different DNA Cryptography based Algorithms
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
A comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptographyA comparative review on symmetric and asymmetric DNA-based cryptography
A comparative review on symmetric and asymmetric DNA-based cryptography
 
IRJET- DNA Cryptography
IRJET-  	  DNA CryptographyIRJET-  	  DNA Cryptography
IRJET- DNA Cryptography
 
Report dna
Report dnaReport dna
Report dna
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATIONDATA ENCRYPTION USING BIO MOLECULAR INFORMATION
DATA ENCRYPTION USING BIO MOLECULAR INFORMATION
 
Comparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding MethodsComparative Study of Three DNA-based Information Hiding Methods
Comparative Study of Three DNA-based Information Hiding Methods
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA Cryptography
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKSHYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
HYBRID CRYPTOSYSTEM WITH DNA BASED KEY FOR WIRELESS SENSOR NETWORKS
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud StorageAutomatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
 
Data protection based neural cryptography and deoxyribonucleic acid
Data protection based neural cryptography and  deoxyribonucleic acidData protection based neural cryptography and  deoxyribonucleic acid
Data protection based neural cryptography and deoxyribonucleic acid
 
Datastorage in DNA
Datastorage in DNADatastorage in DNA
Datastorage in DNA
 

Kürzlich hochgeladen

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Kürzlich hochgeladen (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

Dna cryptography

  • 1. DNA Data Cryptography Submitted to the DELHI TECHNOLOGICAL UNIVERSITY In Partial fulfillment of the requirements for The award of the degree of Fellowship In Engineering Education By Siddharth Malhotra , Avinash Kumar, Mayukh Maitra , Saransh Garg, Isha Panesar DNA Cryptography Page 1
  • 2. ACKNOWLEDGEMENT I am indebted and thankful to all the people who have cooperated with me in this endeavor and I wish to acknowledge and thank them. I express my sincere gratitude to Ms. Abhilasha Sharma, faculty of Department of Software Engineer, Delhi Technological University for her continuous encouragement and interest through out the project work. We also express our special thanks to others faculty of Department of Software Engineer for their advice and co-operation. I am highly indebted to Ms. Abhilasha Sharma, Department of Software Engineer, Delhi Technological University, New Delhi, Delhi for the valuable guidance received through the execution of this project. Last but not the least, I extend my sincere gratitude to the ALMIGHTY who has given courage and confidence to complete this project work. Siddharth Malhotra Avinash Kumar Mayukh Maitra Saransh Garg Isha Panesar DNA Cryptography Page 2
  • 3. DECLARATION Certified that the thesis entitled “DNA Data Cryptography ” is a bonafide record of independent Work done by me at Delhi Technological University, Delhi, under the supervision of Ms. Abhilasha Sharma faculty of Information Technology Department, NIT Durgapur. Also certified that the reported herein does not form part of any Other thesis or dissertation on the basis of which a degree or award was conferred earlier. Date: Place: Siddharth Malhotra Avinash Kumar Mayukh Maitra Saransh Garg Isha Panesar DNA Cryptography Page 3
  • 4. Delhi Technological University CERTIFICATE OF ACCEPTANCE The report of the project titled “DNA DATA CRYPTOGRAPHY” submitted by Siddharth, Avinash, Mayukh, Saransh, Isha of 4th semester B.Tech Software Engineer major is here by recommended to be accepted for the partial fulfillment of the requirements for B.Tech(SE) degree in Delhi Technological University. Name of Examiner: DNA Cryptography Signature with Date Page 4
  • 5. INTRODUCTION DNA Data Cryptography is a new field based on the researches in DNA computation and new technologies like: PCR (Polymerase Chain Reaction), Microarray, etc. DNA computing has a high level computational ability and is capable of storing huge amounts of data. A gram of DNA contains 1021 DNA bases, equivalent to 108 terabytes of data. In DNA cryptography we use existing biological information from DNA public databases to encode the plaintext. The cryptographic process can make use of different methods. In the onetime pads (OTP) algorithms are described, which is one of the most efficient security algorithms, while in a method based on the DNA splicing technique is detailed. In the case of the one-time pad algorithms, the plaintext is combined with a secret random key or pad which is used only once. The pad is combined with the plaintext using a typical modular addition or an XOR operation, or another technique. In the case of the start codes and the pattern codes specify the position of the introns, so they are no longer easy to find. However, to transmit the spliced key, they make use of public-key secured channel. Additionally, we will describe an algorithm which makes use of asymmetric cryptographic principles. The main idea is to avoid the usage of both purely mathematical symmetric and asymmetric algorithms and to use an advanced asymmetric algorithm based on DNA. The speed of the algorithm should be quite high because we make use of the powerful parallel computing possibilities of the DNA. Also, the original asymmetric keys are generated starting from a user password to avoid their storage. Biological background : DNA is the abbreviation for deoxyribonucleic acid which is the germ plasma of all life styles. DNA is a kind of biological macromolecule and is made of nucleotides. Each nucleotide contains a single base and there are four kinds of bases, which are adenine (A) and thymine (T) or cytosine (C) and guanine (G), corresponding to four kinds of nucleotides. A single-stranded DNA is constructed with orientation: one end is called 5 ′, and the other end is called 3 ′. Usually DNA exists as double-stranded molecules in nature. The two complementary DNA strands are held together to form a doblehelix structure by hydrogen DNA Cryptography Page 5
  • 6. bonds between the complementary bases of A and T (or C and G). The double-helix structure was discovered by Watson and Crick; thus the complementary structure is called Watson Crick complementarity. Their discovery is one of the greatest scientific discoveries of the 20th century and reduced genetics to chemistry and laid the foundations for the next half century of biology. The development of DNA cryptography benefits from the progress of DNA computing (also called molecular computing or biological computing). On the one hand, cryptography always has some relationship with the corresponding computing model more or less. On the other hand, some biological technologies used in DNA computation are also used in DNA cryptography DNA Cryptography Page 6
  • 7. Biotechnological Methods have been developed for a wide class of operations on DNA and RNA strands Biomolecular Computation (BMC) makes use of such biotechnological methods for doing computation · Uses DNA as a medium for ultra-scale computation · Comprehensive survey of Reif [R98] · splicing operations allow for universal computation [Head92]. · BMC solution of combinatorial search problems: Hamiltonian path problem [Adleman94] Data Encryption Standard (DES) [Boneh, et al 95] [Adleman, et al 96] ultimately limited by volume requirements, which may grow exponentially with input size. DNA Storage of Data · A medium for ultra-compact information storage: large amounts of data that can be stored in compactvolume. · Vastly exceeds storage capacities of conventional electronic, magnetic, optical media. · A gram of DNA contains 1021 DNA bases = 108 tera-bytes. · A few grams of DNA may hold all data stored in world. · Most recombinant DNA techniques are applied at concentrations of 5 grams of DNA per liter of water. DNA Cryptography Page 7
  • 8. DNA Data Bases: · A “wet” data base of biological data natural DNA obtained from biological sources may be recoded using nonstandard bases [Landweber,Lipton97], to allow for subsequent BMC processing. · DNA containing data obtained from more conventional binary storage media. input and output of the DNA data can be moved to conventional binary storage media by DNA chip arrays binary data may be encoded in DNA strands by use of an alphabet of short oligonucleotide sequences. Associative Searches within DNA databases: · methods for fast associative searches within DNA databases using hybridization [Baum95] · [Reif95] data base join operations and various massively parallel operations on the DNA data Cryptography Data security and cryptography are critical to computing data base applications. Plaintext: non-encrypted form of message Encryption: process of scrambling plaintext message, transforming it into an encrypted message (cipher text). Example: a fixed codebook provides an initial mapping from characters in the finite plaintext alphabet to a finite alphabet of codewords, then a sophisticated algorithm depending on a key may be applied to further encrypt the message. Decryption: the reverse process of transforming the encrypted message back to the original plaintext message. Cryptosystem: a method for both encryption and decryption of data. Unbreakable cryptosystem: one for which successful cryptanalysis is not possible. DNA Cryptography Page 8
  • 9. Our MAIN RESULT: DNA-based, molecular cryptography systems · plaintext message data encoded in DNA strands by use of a (publicly known) alphabet of short oligonucleotide sequences. · Based on one-time-pads that are in principle unbreakable. One-time-pads may be practical for DNA: Practical applications of cryptographic systems based on one-time-pads are limited in conventional electronic media, by the size of the one-time-pad. DNA provides a much more compact storage media, and an extremely small amount of DNA suffices even for huge one-time-pads.Our DNA one-time-pad encryption schemes: · a substitution method using libraries of distinct pads, each of which defines a specific, randomly generated, pair-wise mapping · an XOR scheme utilizing molecular computation and indexed, random key strings Applications of DNA-based cryptography systems · the encryption of (recoded) natural DNA · the encryption of DNA encoding binary data. Methods for 2D data input and output: · use of chip-based DNA micro-array technology · transform between conventional binary storage media via (photo-sensitive and/or photoemitting)DNA chip arrays DNA Steganography Systems: · secretly tag the input DNA · then disguise it (without further modifications) within collections of other DNA. · original plaintext is not actually encrypted · very appealing due to simplicity. Example: DNA plaintext messages are appended with one or more secret keys resulting appended DNA strands are hidden by mixing them within many other irrelevant DNA strands (e.g., randomly constructed DNA strands).[Clelland, Risca, and Bancroft] genomic steganography: techniques using amplifiable microdots DNA Cryptography Page 9
  • 10. Our RESULTS for DNA Steganography Systems: · Potential Limitations of these DNA Steganography methods: Show certain DNA steganography systems can be broken, with some assumptions on information theoretic entropy of plaintext messages. · We also discuss various modified DNA steganography systems which appear to have improved security. Cryptosystems Using Random One-Time Pads Use secret codebook to convert short segments of plaintext messages to encrypted text: Must be random codebook .Codebook can be used only once In secret, assemble a large one-time-pad in the form of a DNA strand: randomly assembled from short oligonucleotide sequences, isolated, and cloned. One-time-pad shared in advance by both the sender and receiver of the secret message: requires initial communication of one-timepad between sender and receiver facilitated by compact nature of DNA. A DNA Cryptosystem Using Substitution Substitution one-time-pad encryption: · a substitution method using libraries of distinct pads, each of which defines a specific, randomly generated, pair-wise mapping. · The decryption is done by similar methods. Input: plaintext binary message of length n, partitioned into plaintext words of fixed length, Substitution One-time-pad: a table randomly mapping all possible strings of plaintext words into cipher words of fixed length, such that there is a unique reverse mapping. Encryption: by substituting each ith block of the plaintext with the cipher word given by the table, and is decrypted by reversing these substitutions. DNA Cryptography Page 10
  • 11. DNA Implementation of Substitution One-time-pad Encryption: · plaintext messages: one test tube of short DNA strands · encrypted messages: another test tube of different short DNA strands Encryption by substitution: maps these in a random yet reversible way plaintext is converted to cipher strands and plaintext strands are removed DNA Substitution one-time pads: use long DNA pads containing many segments: each segment contains a cipher word followed by a plaintext word. cipher word: acts as a hybridization site for binding of a primer cipher word is appended with a plaintext word to produce word-pairs. These word-pair DNA strands used as a lookup table in conversion of plaintext into cipher text. One-time-pad DNA Sequence: · Length n · Contains d = n/(L1+ L2+ L3) copies of repeating unit: Repeating unit made up of: · Bi = a cipher word of length L1 = c1log n · Ci = a plaintext word length L2= c2log n Each sequence pair uniquely associates a plaintext word with a cipher word. · Polymerase "stopper" sequence of length L3 = c3, To generate a set of oligonucleotides corresponding to the plaintext/cipher word-pair strands: · ~Bi used as polymerase primer · extended with polymerase by specific attachment of plaintext word Ci. · Stopper sequence prohibits extension of growing DNA strand beyond boundary of paired plaintext word. DNA Cryptography Page 11
  • 12. Word-pair strands are essentially: a lookup table for a random codebook. Feasibility depends upon: · size of the lexicon; · number of possible pads available; · size, complexity, and frequency of message transmissions. Parameter Range Lexicon size 10,000 – 250,000 words Word size 8 – 24 bases Message size 5 – 30% of lexicon size Pad diversity 106 - 108 Pad diversity: total number of random pads generated during a single pad construction experiment. Methods for Construction of DNA one-time pads. (1) Random assembly of one-time pads in solution (e.g. on a synthesis column). · Difficult to achieve both full coverage and yet still avoiding possible conflicts by repetition of plaintext and/or cipher words. · can set c1 and c2 large so probability of repeated words on pad of length n is small, but coverage is be reduced. (2) Use of DNA chip technology for random assembly of one-time pads Advantages: currently commercially available (Affymetrix) chemical methods for construction of custom variants are well developed. DNA chip Method for Construction of DNA one-time pads. · an array of immobilized DNA strands, · multiple copies of a single sequence are grouped together in a microscopic pixel. · optically addressable · known technology for synthesis of distinct DNA sequences at each (optically addressable) site of the array. · combinatorial synthesis conducted in parallel at thousands of locations: For preparation of oligonucleotides of length L, the 4L sequences are synthesized in 4n chemical reactions. Examples: · 65,000 sequences of length 8 use 32 synthesis cycles · 1.67x107 sequences of length 10 use 48 cycles DNA Chip Method for DNA Cryptography Page 12
  • 13. Construction of DNA One-time pads · plaintext and cipher pairs constructed: · nearly complete coverage of the lexicon on each pad, nearly unique word mapping between plaintext and cipher pairs. · resulting cipher word, plaintext word pairs can be assembled together in random order (with possible repetitions) on a long DNA strand by a number of known methods: blunt end ligation hybridization assembly with complemented pairs [Adleman97] · Cloning or PCR used to amplify the resulting onetime pad. XOR One-time-pad (Vernam Cipher) Cryptosystem One-time-pad S: a sequence of independently distributed random bits M: a plaintext binary message of n bits · Encrypted bits: Ci = Mi XOR Si for = 1,…,n. XOR: given two Boolean inputs, yields 0 if the inputs are the same, and otherwise is 1. · Decrypted bits: Use commutative property of XOR Ci XOR Si = (Mi XOR Si) XOR Si = Mi XOR (Si XOR Si) = Mi. DNA Cryptography Page 13
  • 14. DNA Implementation of XOR One-time-pad Cryptosystem · plaintext messages: one test tube of short DNA strands · encrypted messages: another test tube of different short DNA strands Encryption by XOR One-time-pad: maps these in a random yet reversible way plaintext is converted to cipher strands and plaintext strands are removed For efficient DNA encoding: use modular base 4 (DNA has four nucleotides) Encryption: addition of one-time-pad elements modulo 4 Decryption: subtract one-time-pad elements modulo 4 Details of DNA Implementation of XOR One-time-pad Cryptosystem · Each plaintext message has appended unique prefix index tag of length L0 indexing it. · Each of one-time-pad DNA sequence has appended unique prefix index tag of same length L0, forming complements of plaintext message tags. · Use Recombinant DNA techniques (annealing and ligation) to concatenate into a single DNA strand each corresponding pair of a plaintext message and a one-time-pad sequence · These are encyphered by bit-wise XOR computation: fragments of the plaintext are converted to cipher strands using the one-time-pad DNA sequences, and plaintext strands are removed. Reverse decryption is similar: use commutative property of bit-wise XOR operation. DNA Cryptography Page 14
  • 15. DNA Cryptosystem for 2D Images using: · DNA Chip · Randomly Assembled One-Time Pad Encryption and Decryption of 2D images recorded on microscopic arrays of a DNA chip: DNA Cryptosystem consists of: · Data set to be encrypted: 2-dimensional image · DNA Chip bearing immobilized DNA strands: contains an addressable array of nucleotide sequences immobilized s.t. multiple copies of single sequence grouped together in a microscopic pixel. · Library of one-time pads encoded on long DNA Strand Initialization and Message Input · Fluorescent-labeled, word-pair DNA strands are prepared from a substitution pad codebook · These are annealed specifically to their sequence complements at unique sites (pixels) on the DNA chip. · The message information is transferred to a phot mask with transparent (white) and opaque (black)regions: Initialization and Message Input · Immobile DNA strands are located on the glass substrate of the chip in a sequence addressable grid. · Word-pair strands are prepared from a random substitution pad: DNA Cryptography Page 15
  • 16. the 5’ (unannealed) end carries a cipher word the 3’ (annealed) end carries a plaintext word. contain a photo-cleavable base analog between two sequence words (added to 3’ end of cipher word during oligo synthesis) · The annealed DNA contains: a fluorescent label on its 5' end (asterisk); a codebook-matching sequence word (not basepaired on the chip); a photo-labile base (white square) capable of cleaving the DNA backbone; and a chipmatching word (base-paired to immobile strand). Encryption Procedure: [1] start with DNA chip displaying sequences complementary to plaintext lexicon. [2] fluorescent-labeled word-pair strands from one-time-pad are annealed to chip at pixel bearing complement to plaintext 3’ end. [3] mask protects some pixels from a light-flash. At unprotected regions, DNA is cleaved between plaintext and cipher words. [4] cipher word strands, still labeled with fluorophore at 5’ ends, are collected and transmitted as encrypted message. Encryption of the Message · Following a light-flash of mask-protected chip, annealed oligonucleotides beneath transparent mask pixels are cleaved at a photo-labile position: their 5' sections are dissociated from annealed 3' section and collected in solution. · This test tube of strands is encrypted message. · Annealed oligos beneath opaque mask are unaffected by light-flash and can be washed off chip. · If encrypted message oligos are reannealed onto a (washed) DNA chip, message information would be unreadable: Simulated Read-Out of Encrypted Message from DNA Chip Decryption Procedure [1] word-pair strands constructed, appending cipher word with proper plaintext word, by polymerase extension or lop-sided PCR using cipher words as primer and one-time-pad as template. [2] cipher strands bind to their specific locations on the pad and are appended with their plaintext partner. [3] binding reformed word-pair strands to DNA chip and reading message by fluorescent microscopy. DNA Cryptography Page 16
  • 17. Decryption of the Message · use the fluorescent labeled oligos as primers in oneway (lopsided) PCR with the same one-time codebook which was used to prepare the initial word-pair oligos. · When word-pair PCR product is bound to the same DNA chip, the decrypted message is revealed: Decrypted Message Simulated Read-Out of Decrypted Message from DNA Chips Steganography a class of techniques that hide secret messages within other messages: plaintext is not actually encrypted but is instead disguised or hidden within other data. Historical examples: · use of grills that mask out all of an image except the secret message, · micro-photographs placed within larger images · invisible inks, etc. Disadvantages: · Cryptography literature generally consider conventional steganography methods to have low security: steganography methods have been often broken in practice [Kahn67] and [Schneier96] Advantages: · it is very appealing due to it’s simplicity. DNA Steganography Techniques: · take one or more input DNA strands (considered to be the plaintext message) · append to them one or more randomly constructed “secret key” strands. · Resulting “tagged plaintext” DNA strands are hidden by mixing them within many other additional “distracter” DNA strands which might also be constructed by random assembly. Decryption: · Given knowledge of the “secret key” strands, · Resolution of DNA strands can be decrypted by a number of possible known recombinant DNA separation methods: plaintext message strands may be separated out by hybridization with the complements of the “secret key” strands might be placed in solid support on magnetic beads or on a prepared surface. These separation steps may combined with amplification steps and/or PCR DNA Cryptography Page 17
  • 18. Cryptanalysis of DNA Steganography Systems: DNA steganography system’s security is entirely dependent on degree that message DNA strands are indistinguishable from “distracter” DNA strands. Cryptanalysis Assumptions: · no knowledge of the “secret key” strands · secret tags are indistinguishable from “distracter” DNA strands. · plaintext is not initially compressed, and comes from a source (e.g., English or natural DNA) with Shannon information theoretic entropy ES > 1 · the “distracter” DNA strands are constructed by random assembly Then: the original plaintext portion of “tagged plaintext” DNA strands are distinguishable from “distracter” DNA strands, and the DNA Steganography System can be broken Shannon (information theoretic) Entropy ES · provides a measure of the factor that a source can be compressed without loss of information. Examples: many images have entropy nearly 4 English text has entropy about 3 computer programs have entropy about 5 most DNA have entropy range 1.2 to 2 Lossless Data Compression [Lempel-Ziv 77] Input: text string of length n with entropy ES [1] Form a dictionary D of the d = n/L most frequently occurring subsequences of length at least L= ES log2n in the known source distribution. [2] In place of subsequences of the input text matching with elements of the dictionary D, substitute their indices in the dictionary D. Cryptanalysis of DNA Steganography Systems: Input: test tube T containing: a mixture of “tagged plaintext” DNA strands mixed with a high concentration of “distracter” DNA strands, of length n. · form a dictionary D of the d = n/L most frequently occurring subsequences of length at least L = ES log2n in the known plaintext source distribution. · Give procedure for separating out plaintext message strands by repeated rounds of hybridization with complements of elements of D. r(T) = ratio of concentration of “distracter” DNA strands to “tagged plaintext” DNA strands. On each round of separation: form a new test tube F(T) with expected r(F(T)) considerably reduced from the previous ratio r(T). DNA Cryptography Page 18
  • 19. Separation Procedure: [1] Pour a fraction s = 1/2 of volume of current test tube T into a test tube T1 and pour remaining fraction 1-s of T into test tube T2. [2] Choose a random text phrase x in D (not previously considered in a prior trial), and using Watson-Crick complement of x, do a separation on test tube T2 , yielding a new test tube T3 whose contents are only DNA strands containing phrase x. [3] Pour contents of test tubes T1 and T3 into a new test tube F(T). · Ratio r(F(T)) of “distracter” DNA strands to plaintext DNA will expect to decrease from original ratio r(T) by a constant factor c < 1 · After O(log(r/r’)) repeated rounds of this process, ratio of concentration in test tube T will expect to decrease from initially r = r(T) to any given smaller ratio r’. Another cryptanalysis technique for breaking steganographic systems: Cryptanalysis using “hints” that disambiguate plaintext. Example: · wish to make secret the DNA of an individual (e.g., the President) · use an improved steganography system where “distracter” DNA strands (that are mixed with DNA of an individual) are DNA from a similar but not identical genetic pool. steganography system may often be broken by use of distinguishing “hints” concerning DNA of the individual e.g., the individual might have a particular set of observable expressed gene sequences (e.g., for baldness, etc.). These hints may allow for subsequent identification of the full secret DNA: use of a series of separation steps with complement of portions of known gene sequences. Improved DNA Steganography Systems with Enhanced security: Idea: make it more difficult to distinguish probability distribution of plaintext source from that of “distracter” DNA strands. (1) Mimicking Distribution of “Distracter” DNA: · use improved construction of the set of “distracter” DNA strands, so distribution better mimics the plaintext source distribution · construct the “distracter” DNA strands by random assembly from elements of Lempel-Ziv dictionary. · Drawback: Cryptanalysis using “hints” that disambiguate plaintext. DNA Cryptography Page 19
  • 20. (2) Compression of Plaintext. · recode the plaintext using a universal lossless compression algorithm (e.g., Lempel-Ziv 77]. · resulting distribution of the recoded plaintext approximates a universal distribution, so uniformly random assembled distracter sequences may suffice to provide improved security. · Drawback: unlike conventional steganography methods, plaintext messages need to be preprocessed. DNA Cryptography Page 20
  • 21. DNA DATA CRYPTOGRAPHY IMPLEMENTATIONS  Java Implementation: One approach of the DNA Data Cryptography is a DNA-based symmetric cryptographic algorithm. This algorithm involves three steps: key generation, encryption and decryption. In fact, theencryption process makes use of two classic cryptographic algorithms: the one-time pad, and the substitution cipher. Due to the restrictions that limit the use of JCE, the algorithm was developed using OpenJDK, which is based on the JDK 7.0 version of the Java platform and does not enforce certificate verification. In order to generate random data we use the class SecureRandom housedin the java.security package, class which is designed to generate cryptographically secure random numbers. The cipher encrypts or decrypts one block at a time, using a key that has the same length as the block. The implementation of block ciphers raises an interesting problem: the message we wish to encrypt will not always be a multiple of the block size. To compensate for the last incomplete block, padding is needed. A padding scheme specifies exactly how the last block of plaintext is filled with data before it is encrypted. A corresponding procedure on the decryption side removes the padding and restores the plaintext's original length. However, this DNA Cipher will not use a padding scheme but a shorter version (a fraction) of the original key. The only mode of operation implemented by the DNA Cipher is ECB (Electronic Code Book). This is the simplest mode, in which each block of plaintext encrypts to a block of cipher text. ECB mode has the disadvantage that the same plaintext will always encrypt to the same cipher text, when using the same key. As we mentioned, the DNA Cipher applies a double encryption in order to secure the message we want to keep secret. The first encryption step uses a substitution cipher. For applying the substitution cipher it was used a HashMap Object. HashMap is a java.util class that implements the Map interface. These objects associate a specified value to a specified unique key in the map. One possible approach is representing each character of the secret message by a combination of 3 bases on DNA, as shown in the table below: DNA Cryptography Page 21
  • 22. Given the fact that this cipher replaces only lowercase characters with their corresponding triplet and that in most messages we encounter also upper case letters, the algorithm first transforms all the letters of the given secret message into lowercase letters. The result after applying the substitution cipher is a string containing characters from the DNA alphabet (a, c, g, t). This will further be transformed into a byte array, together with the key. The exclusive or operation (XOR) is then applied to the key and the message in order to produce the encrypted message. When decrypting an encrypted message, it is essential to have the key and the substitution alphabet. While the substitution alphabet is known, being public, the key is kept secret and is given only to the addressee. Any malicious third party won’t be able to decrypt the message without the original key. The received message is XOR-ed with the secret key resulting a text in DNA alphabet. This text is then broken into groups of three characters and with the help of the reverse map each group will be replaced with the corresponding letter. The reverse map is the inverse of the one used for translating the original message into a DNA message. This way the receiver is able to read the original secret message.  BioJava Implementation: In this approach, we use more steps to obtain the DNA code starting from the plaintext. For each character from the message we wish to encode, we first apply the get_bytes() method which returns an 8bit ASCII string of the character we wish to encode. Further, we apply the get_DNA_code() method which converts the obtained 8 bit string, corresponding to an ASCII character, into DNA alphabet. The function returns a string which contains the DNA encoded message. The get_DNA_code() method is the main method for converting the plaintext to DNA encoded text. For each 2 bits from the DNA Cryptography Page 22
  • 23. initial 8 bit sequence, corresponding to an ASCII character, a specific DNA character is assigned: 00 – A, 01 – C, 10 – G and 11 – T. Based on this process we obtain a raw DNA message. DNA encryption test sequence Plaintext message: „test” ASCII message: 116 101 115 116 Raw DNA message: „TCACGCCCTATCTCA” The coded characters are searched in the chromosome chosen as session key at the beginning of the communication. The raw DNA message is split into groups of 4 bases. When such a group is found in the chromosome, its base index is stored in a vector. The search is made between the first characters of the chromosome up to the 37983th. At each new iteration, a 4 base segment is compared with the corresponding 4 base segment from the raw DNA message. So, each character from the original string will have an index vector associated, where the chromosome locations of that character are found. The get_index() method effectuates the parsing the comparison of the chromosomal sequences and creates for each character an index vector. To parse the sequences in the FASTA format specific BioJava API methods were used. BioJava offers us the possibility of reading the FASTA sequences by using a FASTA stream which is obtained with the help of the SeqIOTools class. We can pass through each of the sequences by using a SequenceIterator object. These sequences are then loaded into an Sequence list of objects, from where they can be accessed using the SequneceAt() method. DNA Cryptography Page 23
  • 24. CONCLUSIONS AND COMPARED RESULTS In this chapter we will present the results we obtained for the symmetric algorithm implementation along with the conclusions of our present work. The symmetric OTP DNA algorithm based on Java Cryptography Architecture was first tested. The purpose is to compare the time required to complete the encryption/ decryption in the case of the DNA Cipher with the time required by other classical encryption algorithms. The methods in the classes that implement cryptographic services are divided into two groups. The first group is represented by the APIs (Application Programming Interface). It consists of public methods that can be used by the instances of these classes. The second group is represented by the SPIs (Service Provider Interface)- a set of methods that must be implemented by the derived classes. Each SPI class is abstract. In order to implement a specific service, for a specific algorithm, a provider must inherit the corresponding SPI class and implement all the abstract methods. All these methods process array of bytes while the DNA Cipher is about strings. The additional conversions from string to array of bytes and back make this cipher to require more time for encryption and decryption then other classic algorithms. To emphasize the difference between DNA and classical algorithms a dedicated application ( Smart Cipher ) was developed. The user has the possibility to enter the text in plain format in the first box and then choose a suitable algorithm to encrypt his text. The encrypted text can be visualized in the second box, while in the third one the user can verify if the decryption process was successful. An interesting feature of the dedicated application is that it shows the encryption and decryption time. Based on this criterion and the strength of the cipher, the user can estimate the efficiency of the used algorithm. In the second case considering the symmetrical BioJava mechanism, our first goal was to compare the time required to complete the encryption/ decryption process. We compared the execution time of the DNA Symmetric Cipher with the time required by other classical encryption algorithms. DNA Cryptography Page 24
  • 25. BIBLIOGRAPHY 1. Hook, D., Beginning Cryptography with Java, Wrox Press, (2005) 2. Gehani, A., LaBean, T., Reif, J., DNA-BasedCryptography. s.l.: DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 54 3. Schneier, B., Applied cryptography: protocols, algorithms, and source code in C, John Wiley & Sons Inc, (1996) 4. Java Cryptography Architecture. Sun Microsystems.http://java.sun.com/j2se/1.4.2/docs/guide/securit y/CryptoSpec.html (2011) 5. DNA Alphabet. VSNS Biocomputing Division, http://www.techfak.unibielefeld.de/bcd/Curric/PrwAli/node7.html#SECTION0007 100000000000000 0, (2011) 6. Wagner, N. R., The Laws of Cryptography with Java Code. [PDF], (2003). 7. http://en.wikipedia.org/wiki/Cryptography 8. http://link.springer.com/chapter/10.1007/978-3-540-24635-0_12 DNA Cryptography Page 25