Open Access
Subscription Access
Open Access
Subscription Access
Implementation of DNA Cryptosystem using Public and Private Key Cryptography
Subscribe/Renew Journal
Data security is one of the important aspects of network security so a encryption algorithm is needed to increase data security like DNA Cryptography. DNA cryptography is a fusion of biotech and Computer Science field. This paper mainly focuses on implementation of the DNA cryptosystem with the use of AES and keys management using RSA algorithm and also for verification of data at other side message digest SHA-256 has been used to achieve Authentication, integrity, confidentiality, Non-repudiation, Access control, availability & signature. The system has been implemented in java using NETBEANS IDE 8.2.
Keywords
Data Security, Advance Encryption Standard (AES), Rivest, Shamir, and Adelman (RSA), DNA Encryption (DNAE), Cryptography, Data Verification, SHA-256.
User
Subscription
Login to verify subscription
Font Size
Information
- Jawahar Thakur, Nagesh Kumar “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Volume 1, Issue 2, December 2011, ISSN 2250-2459
- ShraddhaSoni, HimaniAgrawal, Monisha Sharma “Analysis and Comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 6, December 2012, ISSN: 2277-3754.
- Yunpeng Zhang and Liu He Bochen Fu (2012), “Research on DNA Cryptography, Applied Cryptography and Network Security”, Dr. Jaydip Sen (Ed.), ISBN: 978-953-51-0218-2, InTech, Available from: http://www.intechopen.com/books/applied-cryptography-and-network-security/research-on-dna-cryptography
- Radu Terec, Mircea-Florin Vaida, Lenuta Alboaie, Ligia Chiorean, “DNA Security using Symmetric and Asymmetric Cryptography”, pp 34-51, Available at https://www.researchgate.net/publication/230771223
- Yogesh Kumar, Rajiv Munjal, Harsh Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures”, International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011.
- Posch, K. C., Posh, R., “Designing a new encryption method for optimum parallel performance”, IEEE First International Conference on Algorithms and Architectures for Parallel Processing, Brisbane, Qld., Australia 1995.
- Vinay kumar Pant, Ashutosh kumar, “DNA Cryptography: An New Approach to Secure Cloud Data”, International Journal of Scientific & Engineering Research, Volume 7, Issue 6, June-2016, pp 890-895
- Vaida MF., Terec R., Alboaie L. (2011), “Alternative DNA Security Using BioJava”, In: Cherifi H., Zain J.M., El-Qawasmeh E. (eds) Digital Information and Communication Technology and Its Applications, DICTAP 2011, Communications in Computer and Information Science, volume 166. Springer, Berlin, Heidelberg
- Tatiana, Hodorogea, Vaida, Mircea, Monica, Borda, Cosmin, Streletchi. (2008), “A Java Crypto implementation of DNA Provider featuring complexity in theory and practice”, pp 607 – 612,10.1109/ITI.2008.4588479
- Harneet Singh, Karan Chugh, Harsh Dhaka, A. K. Verma, “DNA based Cryptography: An Approach to Secure Mobile Networks”, International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 19, pp 77-80
- Snehal Javheri, Rahul Kulkarni, “Secure DataCommunication Using DNA based Cryptography in Mobile Adhoc Network”, International Journal of Science and Research (IJSR), Volume 3, Issue 9, September 2014, pp 1504-1508.
- http://technet.microsoft.com/en-us/library/cc962035.aspx.
- RaziehMokhtarnameh, NithiapidaryMuthuvelu, Sin Ban Ho, Lan Chai “A Comparison Study on Key Exchange-Authentication Protocol”, Faculty of Information Technology, Multimedia University, Jalan Multimedia, 63100 Cyberjaya, Selangor, Malaysia, International Journal of Computer Applications (0975 – 8887)Volume 7– No.5, September 2010.
- Manoj kumar pandey, Prateeksha Pandey, “An Effective and Secure Key Management Scheme in Multiphase Cryptosystem”, CiiT International Journal of Networking and Communication Engineering ISSN: 0974 – 9616 Volume 6, Issue 6, August 2014, pp 237-242.
Abstract Views: 363
PDF Views: 1