A New DNA Cryptosystem for Encrypting Persian Texts and Images with Key Exchange based on Hyper Elliptic Curve
Fatemeh Alidadi Shamsabadi
1
(
Department of Computer, Faculty of Engineering, Shahrekord Branch, Islamic Azad University, Shahrekord, Iran
)
Shaghayegh Bakhtiari chehelcheshmeh
2
(
Department of Computer, Faculty of Engineering, Shahrekord Branch, Islamic Azad University, Shahrekord, Iran
)
Narges Farhadi
3
(
Department of Computer, Faculty of Engineering, Shahrekord Branch, Islamic Azad University, Shahrekord, Iran
)
Keywords: Security, HEC Key Agreement, DNA Cryptography, Persian Plaintexts, DNA Hybridization,
Abstract :
With the emergence of quantum computers, traditional cryptography methods will be broken and lose their efficiency. Fortunately, DNA-based cryptography methods have high resistance against quantum attacks. However, these methods have not yet been used to secure Persian texts. On the other hand, DNA encryption methods require a secure communication channel for sharing the secret key. Therefore, in this paper, a new cryptosystem is presented to provide confidentiality of Persian texts based on DNA cryptography. Also, considering the widespread use of images in public media, the ability to encrypt images is embedded in this scheme. In the proposed method, the hyper-elliptic curve cryptography (HECC) system is used to generate a shared secret key on both sides of communication so that there is no longer a need for a secure channel. Also, DNA hybridization technology is used to perform encryption and decryption of the message to minimize the time complexity of the cryptography algorithm. According to the results of the performance evaluation, the proposed scheme reduces the computational overhead and has lower energy consumption compared to previous schemes.
- Encryption of Persian texts using a DNA cryptography system for the first time.
- Providing a large key space to increase resistance against external factors.
- Minimizing time complexity using DNA hybridization technology.
- No need for a secure channel for key sharing.
- Highly secure and efficient key agreement using encryption based on
- hyper-elliptic curve.
[1] A. Bhardwaj, G. V. B. Subrahmanyam, V. Avasthi, and H. Sastry, “Security Algorithms for Cloud Computing,” Procedia Comput. Sci., vol. 85, pp. 535–542, 2016, doi: 10.1016/j.procs.2016.05.215.
[2] M. Mondal and K. S. Ray, “Review on DNA Cryptography,” Int. J. Adv. Comput. Sci. Appl., vol. 2, no. 1, pp. 44–76, 2023, doi: 10.61797/ijbic.v2i1.198.
[3] R. Madhusudhan and R. Shashidhara, “A novel DNA based password authentication system for global roaming in resource-limited mobile environments,” Multimed. Tools Appl., vol. 79, no. 3–4, pp. 2185–2212, 2020, doi: 10.1007/s11042-019-08349-8.
[4] B. T. Hammad, A. M. Sagheer, I. T. Ahmed, and N. Jamil, “A comparative review on symmetric and asymmetric dna-based cryptography,” Bull. Electr. Eng. Informatics, vol. 9, no. 6, pp. 2484–2491, 2020, doi: 10.11591/eei.v9i6.2470.
[5] T. M. Fernandez-Carames, “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things,” IEEE Internet Things J., vol. 7, no. 7, pp. 6457–6480, 2020, doi: 10.1109/JIOT.2019.2958788.
[6] T. Anwar, A. Kumar, and S. Paul, “DNA Cryptography Based on Symmetric Key Exchange,” Int. J. Eng. Technol., vol. 7, no. 3, pp. 938–950, 2015.
[7] V. Kolate and R. Joshi, “An Information Security Using DNA Cryptography along with AES Algorithm,” Turkish J. Comput. Math. Educ., vol. 12, no. 1, pp. 183–192, 2021, doi: 10.17762/turcomat.v12i1S.1607.
[8] A. Jayakumar, “Introduction to DNA Computing and its Applications,” 2020, [Online]. Available: https://www.section.io/engineeringeducation/%0Adna-computing/
[9] N. A. N. Abdullah et al., “A Theoretical Comparative Analysis of Dna Techniques Used in Dna Based Cryptography,” J. Sustain. Sci. Manag., vol. 17, no. 5, pp. 165–178, 2022, doi: 10.46754/jssm.2022.05.014.
[10] S. Namasudra and G. C. Deka, Advances of DNA Computing in Cryptography, 1st ed. New York, NY, USA: Chapman & Hall/CRC, 2018, doi: 10.1201/9781351011419.
[11] Monika and S. Upadhyaya, “Secure Communication Using DNA Cryptography with Secure Socket Layer (SSL) Protocol in Wireless Sensor Networks,” Procedia Comput. Sci., vol. 70, pp. 808–813, 2015, doi: 10.1016/j.procs.2015.10.121.
[12] P. Barman and B. Saha, “An Efficient Hybrid Elliptic Curve Cryptography System with DNA Encoding,” Int. Res. J. Comput. Sci., vol. 2, no. May, pp. 33–39, 2015.
[13] S. K. Pujari, G. Bhattacharjee, and S. Bhoi, “A Hybridized Model for Image Encryption through Genetic Algorithm and DNA Sequence,” Procedia Comput. Sci., vol. 125, pp. 165–171, 2018, doi: 10.1016/j.procs.2017.12.023.
[14] B. Vikas, A. K. Akshay, S. P. M. Thanneeru, U. M. V. Raghuram, and K. S. Bhargav, “A novel DNA- and PI-based key generating encryption algorithm,” Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol. 672, pp. 945-954, 2018, doi: 10.1007/978-981-10-7512-4_94.
[15] AA. Sharaieh, A. Edinat, and S. AlFarraji, “An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based Cryptography,” IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 2018, pp. 1-6, doi: 10.1109/AICCSA.2018.8612860.
[16] B. D. Patnala and R. Kiran Kumar, “A Novel Level-Based DNA Security Algorithm Using DNA Codons,” Computational Intelligence and Big Data Analytics. SpringerBriefs in Applied Sciences and Technology(), pp. 1-13, 2019, doi: 10.1007/978-981-13-0544-3_1.
[17] A. H. Saleh, A. S. Yousif, and F. Y. H. Ahmed, “Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding,” IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE), Malaysia, 2020, pp. 220-223, doi: 10.1109/ISCAIE47305.2020.9108842.
[18] S. Balaji, Á. Rocha, and Y.-N. Chung, “Intelligent Communication Technologies and Virtual Mobile Networks Lecture Notes on Data Engineering and Communications Technologies,” ICICV, vol. 33, 2019.
[19] M. Irfan Alam and S. N. Singh, “Designing and Implementing Cloud Security Using Multi-layer DNA Cryptography in Python,” Trends in Wireless Communication and Information Security, vol. 740, pp. 375-385, 2021, doi: 10.1007/978-981-33-6393-9_38.
[20] P. Prasanna and R. K J, “DNA Based Cryptography with Dual Encryption Using Multiple Cloud,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 10, no. 7, pp. 4073–4079, 2022, doi: 10.22214/ijraset.2022.45925.
[21] A. AL-Wattar, “A New Proposed Public Key Cryptography Based on Bio Strands,” Tech. Rom. J. Appl. Sci. Technol., vol. 5, pp. 21–28, 2023, doi: 10.47577/technium.v5i.8238.
[22] R. Joshi, M. C. Trivedi, V. Goyal, and D. Bhati, “DNA Sequence in Cryptography: A Study,” Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol. 522, pp. 557-563, 2023. doi: 10.1007/978-981-19-5292-0_53.
[23] M. Karimi and W. Haider, “Cryptography using DNA Nucleotides,” Int. J. Comput. Appl., vol. 168, no. 7, pp. 16–18, 2017, doi: 10.5120/ijca2017914420.
[24] A. Gahlaut, A. Bharti, Y. Dogra, and P. Singh, “DNA based cryptography,” Commun. Comput. Inf. Sci., vol. 750, pp. 205–215, 2017, doi: 10.1007/978-981-10-6544-6_20.
[25] A. Rokade, “An Short Introduction to The Data Encryption Algorithm (Des , Aes , Blowfish , Dna Cryptography and Quantum Cryptography),” International Research Journal of Modernization in Engineering Technology and Science , vol. 04, no. 10, pp. 997–1000, 2022.
[26] M. A. Iliyasu, O. A. Abisoye, S. A. Bashir, and J. A. Ojeniyi, “A Review of Dna Cryptograhic Approaches, ” IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), Abuja, Nigeria, 2021, pp. 66-72, doi: 10.1109/CYBERNIGERIA51635.2021.9428855.
[27] S. Pramanik and S. K. Setua, “DNA cryptography,” 7th Int. Conf. Electr. Comput. Eng. ICECE, 2012, pp. 551–554, doi: 10.1109/ICECE.2012.6471609.
[28] S. Singh and Y. Sharma, “A review on DNA based cryptography for data hiding,” Proc. Int. Conf. Intell. Sustain. Syst. (ICISS), 2019, pp. 282–285, doi: 10.1109/ISS1.2019.8908026.
[29] A. Hazra, S. Ghosh, and S. Jash, “A Review on DNA Based Cryptographic Techniques,” Int. J. Netw. Secur., vol. 20, no. 6, pp. 1093–1104, 2018, doi: 10.6633/IJNS.201811_20(6).10.
[30] K. Gupta and S. Singh, “DNA Based Cryptographic Techniques: A Review,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, no. 3, 2013.
[31] B. B. Raj and V. Ceronmani Sharmila, “An survey on DNA based cryptography,” Int. Conf. Emerg. Trends Innov. Eng. Technol. Res. ICETIETR, 2018, pp. 1–3, doi: 10.1109/ICETIETR.2018.8529075.