DNA Cryptography
DNA Cryptography
CRYPTOGRAPHY
D12A BATCH-A
ADITI BHATIA 06
NAMRATA AVHAD 03
A Dynamic DNA for Key-based Cryptography
Author: Bahubali Akiwate, Dr. Latha Parthiban
Year: 2018
format.
Today, cryptography is used to protect digital
unauthorized users.
Encryption can be done at the sender before
approach
The chosen paper proposed a method where various data
The above paper focuses only based on the ASCII character set, ignoring non-English users.
[2] Kiran Kumar R and Bharathi Devi P.2018, A Novel Text Encryption Algorithm Using DNA ASCII Table
With A Spiral Approach. Int J Recent Sci Res. 9(1), pp. 23588-23595. DOI:
http://dx.doi.org/10.24327/ijrsr.2018.0901.1495
The above paper doesn't consider the high amount of data load and the random nature of DNA, thus it
Message)
Convert DNA amplified data to original text : Decryption
ENCRYPTION
DECRYPTION
DNA digital coding
DNA basic nucleotides are assigned with
binary values.
DNA digital coding uses four nucleotides
0101110001110101001100000110010100110000010111000111010100110000011000010110000101011100011101010011
0000001100100011000000110010001100000101110001110101001100000110010100110000010111000111010100110
00001100001011000010101110001110101001100000110001000110110010111000111010100110000011001010011000
0010110001110101001100000110000101100001010111000111010100110000011000100110011001011100011101000110
000011001010011000001011100011101010011000001100001011000010101110001110101001100000110001000110111
ENCRYPTION EXAMPLE
DNA Digital Coding =
TTCATCTTACAATGTTACAATTCATCTTACAATGATTGATTTCATCTTACAAACAGACAAACAGACAATTCATCTT
ACAATGTTACAATTCATCTTACAATGATTGATTTCATCTTACAATGAGACTGTTCATCTTACAATGTTACAATTCA
TCTTACAATGATTGATTTCATCTTACAATGAGTGTGTTCATCTTACAATGTTACAATTCATCTTACAATGATTGAT
TTCATC TTACAATGAGACTC
Amplified Message =
11111110100111110010010101111111001001011111111010011111001001010111001101110011111111010011111001001010011000
1 001001010010000100100101111111110100111110010010101111111001001011111111010011111001001010111001101110011
11111110100111110010010101110001001001111111111010011111001001010111111100100101111111101001111100100101011100
1101110011111111101001111001001010111000101110111111111101001111100100101011111110010010111111110100111110010010
101110011011100111111111010011111001001010111000100101001
DECRYPTION EXAMPLE
Amplified Message =
11111110100111110010010101111111001001011111111010011111001001010111001101110011111111010011111001001010011000
1 001001010010000100100101111111110100111110010010101111111001001011111111010011111001001010111001101110011
11111110100111110010010101110001001001111111111010011111001001010111111100100101111111101001111100100101011100
1101110011111111101001111001001010111000101110111111111101001111100100101011111110010010111111110100111110010010
101110011011100111111111010011111001001010111000100101001
DNA Digital Coding =
TTCATCTTACAATGTTACAATTCATCTTACAATGATTGATTTCATCTTACAAACAGACAAACAGACAATTCATCTT
ACAATGTTACAATTCATCTTACAATGATTGATTTCATCTTACAATGAGACTGTTCATCTTACAATGTTACAATTCA
TCTTACAATGATTGATTTCATCTTACAATGAGTGTGTTCATCTTACAATGTTACAATTCATCTTACAATGATTGAT
TTCATC TTACAATGAGACTC
DECRYPTION EXAMPLE
Binary =
01011100011101010011000001100101001100000101110001110101001100000110000101100001010111000111010100110
0000011001000110000001100100011000001011100011101010011000001100101001100000101110001110101001100
000110000101100001010111000111010100110000011000100011011001011100011101010011000001100101001100000
1011000111010100110000011000010110000101011100011101010011000001100010011001100101110001110100011000
0011001010011000001011100011101010011000001100001011000010101110001110101001100000110001000110111
Hexadecimal = 5c753065305c753061615c7530323032305c753065305c7530
61615c753062365c753065305c753061615c753062665c753065305c753061615c75306237
Unicode = \u0e0\u0aa\u02020\u0e0\u0aa\u0b6\u0e0\u0aa\u0bf\u0e0\u0a\u0b7
Plain Text = "CRYPTOGRAPHY"
performance analysis
CONCLUSION
The proposed approach a Dynamic DNA for a key-based approach can accept various
forms of data such as characters, text files, images and audio. A random key will be
generated at the sender end every time which will be used for decrypting the ciphertext at
complexities
thank you