Main Article Content
DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. In this paper we propose a new DNA Encryption Technique where three different types of ordering is use to make binary data into cipher text. The main stages of this encryption technique are: Key Analysis, Data and Key Arrangement, Roll in encoding, Secondary Arrangement and Shifting. Decryption process has six main steps to obtain the original binary data from the encrypted data and key. Decryption steps are: Key Analysis, Shifting, Secondary Arrangement, Key Arrangement, Roll-out decoding, Data Arrangement. Here key size is half of binary data and the key is varies from data to data so key are used as one time pad. In this paper we also discuss about the implementation from sample data and security analysis for this given method.
Anwar, Tausif, Abhishek Kumar, & Sanchita Paul. (2015). DNA Cryptography Based on Symmetric Key Exchange.
Gehani, Ashish, Thomas LaBean, & John Reif. (2003) DNA-based cryptography. Aspects of Molecular Computing. Springer Berlin Heidelberg, 167-188.
Gupta, Kritika, & Shailendra Singh (2013). DNA based cryptographic techniques: A review. International Journal of Advanced Research in Computer Science and Software Engi-neering, 3.
Jacob, Grasha, & A. Murugan (2013). DNA based cryp-tography: An overview and analysis. International Journal of Emerging Science, 3.1: 36-42.
Kaundal, Ashish Kumar, & A. K. Verma (2014). DNA based cryptography: a review. International Journal of Infor-mation and Computation Technology, 4.7: 693-698.
Leier, André, et al. (2000). Cryptography with DNA bina-ry strands. Biosystems, 57.1: 13-22.
Li, Yan, Xinyan Zhang, Tomi Akinyemiju, Akinyemi I. Ojesina, Jeff M. Szychowski, Nianjun Liu, Bo Xu, & Nengjun Yi. (2016). A two-stage approach for combining gene expression and mutation with clinical data improves survival prediction in myelodysplastic syndromes and ovarian cancer. Journal of Bioinformatics and Genomics, 1 (1).
Mousa, Hamdy M. (2016). DNA-Genetic Encryption Technique. International Journal of Computer Network and Information Security (IJCNIS) 8, 7: 1.
Shchyogolev, S. Y. (2016). Molecular taxonomy and the evolution theory in light of emerging bioinformatic and cos-mological data. Journal of Bioinformatics and Genomics, 1 (1).
Wang, Xing, & Qiang, Zhang (2009). DNA computing-based cryptography. Bio-Inspired Computing, BIC-TA'09. Fourth International Conference on. IEEE, 2009.
Xiao, Guozhen, et al. (2006). New field of cryptography: DNA cryptography. Chinese Science Bulletin 51.12: 1413-1420.