Main Article Content

Roni Saha
Rejwana Haque


DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. In this paper we propose a new DNA Encryption Technique where three different types of ordering is use to make binary data into cipher text. The main stages of this encryption technique are: Key Analysis, Data and Key Arrangement, Roll in encoding, Secondary Arrangement and Shifting. Decryption process has six main steps to obtain the original binary data from the encrypted data and key. Decryption steps are: Key Analysis, Shifting, Secondary Arrangement, Key Arrangement, Roll-out decoding, Data Arrangement. Here key size is half of binary data and the key varies from data to data so key is used as one time pad. In this paper we also discuss the implementation from sample data and security analysis for this given method.

Motivation: Most of the existing methods use static representation of DNA base to convert binary to DNA sequence but here we avoid this step but finally we are able to convert them into DNA sequence. In our proposed method DNA base do not contain static value. It makes it harder to decipher the encrypted data. For most of the existing method security totally depends on key. Sometimes almost same key can reveal a part of real data. Here we worked with the frequency of DNA base of the key so here 1% bit mismatch can produce totally different result so data does not reveal. So security depends on its frequency as well.

Results: In the algorithm change of a single base of key can affect on whole data so even 99.99% matched key can’t reveal any part of the original data. Besides that, this algorithm produce comparatively smaller encrypted data and every bit of encrypted data contains dynamic value so it is harder to break.

Availability: We used Matlab-V2015(a) for simulation of the algorithm.


Download data is not yet available.


Metrics Loading ...

Article Details

How to Cite
Saha, R., & Haque, R. (2017). A NOVEL ROLLING BASED DNA CRYPTOGRAPHY. JOURNAL OF BIOINFORMATICS AND GENOMICS, (1 (3). https://doi.org/10.18454/jbg.2017.1.3.1
Novel computational tools and databases


Anwar, T., Paul, S., & Singh, S. K. (2014). Message Transmission Based on DNA Cryptography: Re-view. International Journal of Bio-Science and Bio-Technology, 6(5), 215-222.

Anwar, Tausif, Abhishek Kumar, & Sanchita Paul. (2015). DNA Cryptography Based on Symmetric Key Ex-change.

Gehani, Ashish, Thomas LaBean, & John Reif. (2003) DNA-based cryptography. Aspects of Molecular Compu-ting. Springer Berlin Heidelberg, 167-188.

Gupta, Kritika, & Shailendra Singh (2013). DNA based cryptographic techniques: A review. International Journal of Advanced Research in Computer Science and Software Engineering, 3.

Jacob, Grasha, & A. Murugan (2013). DNA based cryp-tography: An overview and analysis. International Journal of Emerging Science, 3.1: 36-42.

Kaundal, Ashish Kumar, & A. K. Verma (2014). DNA based cryptography: a review. International Journal of Information and Computation Technology, 4.7: 693-698.

Leier, André, et al. (2000). Cryptography with DNA bi-nary strands. Biosystems, 57.1: 13-22.

Li, Yan, Xinyan Zhang, Tomi Akinyemiju, Akinyemi I. Ojesina, Jeff M. Szychowski, Nianjun Liu, Bo Xu, & Nengjun Yi. (2016). A two-stage approach for combining gene expression and mutation with clinical data improves survival prediction in myelodysplastic syndromes and ovar-ian cancer. Journal of Bioinformatics and Genomics, 1 (1).

Mousa, Hamdy M. (2016). DNA-Genetic Encryption Technique. International Journal of Computer Network and Information Security (IJCNIS) 8, 7: 1.

Shchyogolev, S. Y. (2016). Molecular taxonomy and the evolution theory in light of emerging bioinformatic and cosmological data. Journal of Bioinformatics and Ge-nomics, 1 (1).

Wang, Xing, & Qiang, Zhang (2009). DNA computing-based cryptography. Bio-Inspired Computing, BIC-TA'09. Fourth International Conference on. IEEE, 2009.

Xiao, Guozhen, et al. (2006). New field of cryptog-raphy: DNA cryptography. Chinese Science Bulletin 51.12: 1413-1420.