289
Views
1
CrossRef citations to date
0
Altmetric
Part 2: Computational Intelligence and Communications

Increasing robustness of data encryption standard by integrating DNA cryptography

&
Pages 91-105 | Received 22 Jun 2016, Accepted 17 Jan 2017, Published online: 22 Feb 2017

References

  • Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46. Washington, DC: U.S. Department of Commerce, National Bureau of Standards; 1977.
  • Smid ME, Branstad DK. Data encryption standard: past and future. Proceedings of the IEEE. 1988 May;76(5):550–559.
  • Grabbe JO. The DES algorithm illustrated. Laissez Faire City Times. 1992;2(28):12–15.
  • Xiao G, Lu M, Qin L, et al. New field of cryptography: DNA cryptography. Chin Sci Bull. 2006;51(12):1413–1420.
  • Jacob G, Murugan A. DNA based cryptography: an overview and analysis. Int J Emerg Sci. 2013 Mar;3(1):36:36–42.
  • Anam B, Sakib K, Hossain M, et al. Review on the advancements of DNA cryptography. arXiv preprint arXiv:1010.0186; 2010 Oct.
  • Stallings W. Cryptography and network security: principles and practice. 6th ed. Pearson; 2014 ( ISBN-10: 0133354695; ISBN-13: 978-0133354690).
  • Popovici C. Aspects of DNA cryptography. Ann Univ Craiova. 2010 Sep;37(3):147–151.
  • Zhang Y, Fu LH. Research on DNA cryptography. In: Jaydip Sen, editor. Applied cryptography and network security. Rijeka (Croatia): InTech; 2012. p. 357.
  • Hamad S. A novel implementation of an extended 8x8 playfair cipher using interweaving on DNA-encoded data. Int J Electric Comput Eng. 2014 Feb;4(1):93–100.
  • Singh H, Chugh K, Dhaka H, et al. DNA based cryptography: an approach to secure mobile networks. DNA. 2010 Feb;1(19):77–80.
  • Zhou S, Zhang Q, Wei X. Image encryption algorithm based on DNA sequences for the big image. In: 2010 International Conference on Multimedia Information Networking and Security (MINES); 2010 Nov 4. IEEE; 2010. p. 884–888.
  • Rakheja P, Integrating DNA. Computing in international data encryption algorithm (IDEA). Int J Comput Appl. 2011 Jul;26(3):1–6.10.5120/ijca
  • Yunpeng Z, Yu Z, Zhong W, et al. Index-based symmetric DNA encryption algorithm. In: 2011 4th International Congress on Image and Signal Processing (CISP). Vol. 5; 2011 Oct 15. IEEE; 2011. p. 2290–2294.
  • Kumar D, Singh S. Secret data writing using DNA sequences. In: 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC); 2011 Apr 22. IEEE; 2011. p. 402–405.
  • Mandge T, Choudhary V. A DNA encryption technique based on matrix manipulation and secure key generation scheme. In: 2013 International Conference on Information Communication and Embedded Systems (ICICES); 2013 Feb 21. IEEE; 2013. p. 47–52.
  • Babaei M. A novel text and image encryption method based on chaos theory and DNA computing. Nat Comput. 2013 Mar;12(1):101–107.10.1007/s11047-012-9334-9
  • Jacob G, Murugan A. An encryption scheme with DNA technology and JPEG Zigzag coding for secure transmission of images. arXiv preprint arXiv:1305.1270. 2013 May 6.
  • Zhang Q, Zhou S, Wei X. An efficient approach for DNA fractal-based image encryption. Appl Math Inf Sci. 2011 Sep;1(5):445–459.
  • Torkaman MR, Kazazi NS, Rouddini A. Innovative approach to improve hybrid cryptography by using DNA steganography. IJNCAA. 2012;2(1):224–235.
  • Tornea O, Borda ME. DNA cryptographic algorithms. In: International Conference on Advancements of Medicine and Health Care through Technology. Berlin Heidelberg: Springer; 2009. p. 223–226.
  • Watada J. DNA computing and its applications. In: Eighth International Conference on Intelligent Systems Design and Applications. ISDA’08; 2008 Nov 26. Vol. 2. IEEE; 2008. p. 288–294.
  • Zhang Q, Wei X. A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik. 2013 Dec;124(23):6276–6281.10.1016/j.ijleo.2013.05.009
  • Torkaman MR, Nikfard P, Kazazi NS, et al. Improving hybrid cryptosystems with DNA steganography. In: Digital enterprise and information systems. Berlin Heidelberg: Springer; 2011. p. 42–52.
  • Hirabayashi M, Nishikawa A, Tanaka F, et al. Analysis on secure and effective applications of a DNA-based cryptosystem. In: 2011 Sixth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA); 2011 Sep 27. IEEE. p. 205–210; 2011.
  • Chen J. A DNA-based, biomolecular cryptography design. In: Proceedings of the International Symposium on Circuits and Systems. ISCAS’03. Vol. 3; 2003 May 25. IEEE; 2003. p. III-822.
  • Ning K. A pseudo DNA cryptography method. arXiv preprint arXiv:0903.2693; Mar 2009.
  • Cui G, Qin L, Wang Y, et al. An encryption scheme using DNA technology. In: 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications. BICTA 2008. IEEE; 2008. p. 37–42.
  • Cui G, Qin L, Wang Y, et al. Information security technology based on DNA computing. In: 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification. IEEE; 2007 Apr. p. 288–291.
  • Cui G, Li C, Li H, et al. DNA computing and its application to information security field. In: Fifth International Conference on Natural Computation. ICNC’09. Vol. 6. IEEE; 2009 Aug. p. 148–152.
  • Wang Z, Zhao X, Wang H, et al. Information hiding based on DNA steganography. In: 2013 4th IEEE International Conference on Software Engineering and Service Science (ICSESS). IEEE. 2013 May. p. 946–949.
  • Roy B, Rakshit G, Singha P, et al. An improved symmetric key cryptography with DNA Based strong cipher. In: 2011 International Conference on Devices and Communications (ICDeCom). IEEE; 2011 Feb. p. 1–5.
  • Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Math Comput Model. 2010 Dec;52(11):2028–2035.10.1016/j.mcm.2010.06.005
  • Zhang Q, Guo L, Wei X. A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik. 2013Sep;124(18):3596–3600.10.1016/j.ijleo.2012.11.018
  • Wei X, Guo L, Zhang Q, et al. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw. 2012 Feb;85(2):290–299.10.1016/j.jss.2011.08.017
  • Liu L, Zhang Q, Wei X. A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electric Eng. 2012 Sep;38(5):1240–1248.10.1016/j.compeleceng.2012.02.007
  • Zhang Y, Fu B, Zhang X. DNA cryptography based on DNA fragment assembly. In: 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT). Vol. 1. IEEE; 2012 Jun. p. 179–182.
  • Gehani A, LaBean T, Reif J. DNA-based cryptography. In: Jonoska N, Păun G, Rozenberg G, editors. Aspects of molecular computing. Berlin Heidelberg: Springer; 2003. p. 167–188.
  • Borda M, Tornea O. DNA secret writing Techniques. In: IEEE Conference; 2010 Jun.
  • Jeevidha S, Basha DM, Dhavachelvan DP. Analysis on DNA based cryptography to secure data transmission. Int J Comput Appl. (0975-8887) 2011 Sep;29(8):16–20.
  • Leier A, Richter C, Banzhaf W, Rauhe H. Cryptography with DNA binary strands. Biosystems. 2000 Jun;57(1):13–22.10.1016/S0303-2647(00)00083-6
  • Sadeg S, Gougache M, Mansouri N, et al. An encryption algorithm inspired from DNA. In: 2010 International Conference on Machine and Web Intelligence (ICMWI). IEEE; 2010 Oct. p. 344–349.
  • Ogiela MR, Ogiela U. DNA-like linguistic secret sharing for strategic information systems. Int J Inform Manage. 2012 Apr;32(2):175–181.10.1016/j.ijinfomgt.2011.11.016
  • Lu M, Lai X, Xiao G, et al. Symmetric-key cryptosystem with DNA technology. Sci China Ser F. 2007 Jun;50(3):324–333.10.1007/s11432-007-0025-6
  • Zhang Q, Guo L, Xue X, et al. An image encryption algorithm based on DNA sequence addition operation. In: Fourth International Conference on Bio-Inspired Computing. BIC-TA’09; 2009 Oct 16. IEEE; 2009. p. 1–5.
  • Zhang Q, Xue X, Wei X. A novel image encryption algorithm based on DNA subsequence operation. Sci World J. 2012 Oct;2012:1–10.
  • Wang X, Zhang Q. DNA computing-based cryptography. In: 2009 Fourth International Conference on Bio-Inspired Computing. BIC-TA’09; 2009 Oct 16. IEEE; 2009. p. 1–3.
  • Maniyath SR, Supriya M. An uncompressed image encryption algorithm based on DNA sequences. Comput Sci Inform Technol. 2011 Jul;2:258–270.
  • Lai X, Lu M, Qin L, et al. Asymmetric encryption and signature method with DNA technology. Sci China Inform Sci. 2010 Mar;53(3):506–514.10.1007/s11432-010-0063-3
  • Castro-Chavez F. The rules of variation: amino acid exchange according to the rotating circular genetic code. J Theor Biol. 2010 Jun;264(3):711–721.10.1016/j.jtbi.2010.03.046
  • Woese CR. Order in the genetic code. Proc Natl Acad Sci. 1965 Jul;54(1):71–75.
  • Daemen J, Rijmen V. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media; 2013.
  • Feistel H. Cryptography and computer privacy. Scientific American; 1973.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.