2015
DOI: 10.1016/j.procs.2015.02.045
|View full text |Cite
|
Sign up to set email alerts
|

A Novel DNA Computing Based Encryption and Decryption Algorithm

Abstract: Lot of techniques and systems has been developed based on modular arithmetic cryptography for encryption and decryption. However, these techniques are broken using DNA cryptography techniques and methods. DNA Cryptography is a new instinctive cryptographic field that has emerged from the research of DNA computing. Some algorithms that are available in DNA Cryptography have limitations in that they still use modular arithmetic cryptography at some of their steps or they are biological laboratory experiment base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(28 citation statements)
references
References 10 publications
0
26
0
Order By: Relevance
“…Anyone can use the public key to encrypt the plaintext (PT) while the parameter e is kept secret. The parameter PST , denoting the public DNA Sequence Table, consists of 24*4 size matrix, as used in [25], [22]. This table fulfills all the alphabet characters: uppercase, lowercase, numbers, and special characters.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…Anyone can use the public key to encrypt the plaintext (PT) while the parameter e is kept secret. The parameter PST , denoting the public DNA Sequence Table, consists of 24*4 size matrix, as used in [25], [22]. This table fulfills all the alphabet characters: uppercase, lowercase, numbers, and special characters.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…In the proposed DNA elliptical cryptography, standard elliptical curve parameters and methods have been chosen. Existing works in elliptical cryptography have shown its resilience towards timing and simple power analysis (SPA) attacks . The elliptical cryptography produces random data after decryption without a proper authentication key.…”
Section: Security Performancementioning
confidence: 99%
“…Therefore, encryption schemes for IoT systems need to be less complicated, and should function with reduced memory usage, which is dependent on the key size. Compared to conventional systems, elliptical curve cryptography (ECC) can statistically provide stronger security with a smaller key size, thus making it a suitable alternative for IoT devices . The strength of elliptical cryptography relies on the fact that the output of the decryption operation will be ambiguous without a proper authentication key.…”
Section: Introductionmentioning
confidence: 99%
“…The paper evaluates and analyzes image encryption techniques that are proposed in the literature and verify their characteristics to determine the Strength, efficiency and weaknesses of these encryption techniques [19]. The authors introduced DNA Encryption and Decryption Algorithmby generating a DNA encoding table for encoding of secret data, division, rotation and transformation [20][21].…”
Section: Introductionmentioning
confidence: 99%