Abstract
DNA cryptography is a field of bioscience technology used to encrypt large messages into a compact volume. Nowadays, substantial amount of active research is being done in the field of secure data transmission. In this work, an algorithm has been proposed in which a two-part key generation scheme is performed, which is helpful for both encryption and decryption algorithms to protect data moving through insecure channel. Encrypting messages into DNA sequences is an important part of cryptography. In this paper, a new DNA cryptography technique is proposed using Symmetric Key Exchange. It is used to protect data from intruders while data travel through an insecure channel. When symmetric key is used, intruders are unable to generate a crack key, thus protecting the data. If the key is not known, it is impossible to decrypt data even when data are sent through an insecure channel. XOR operation with one-time-pad DNA sequence is used as the encryption technique. Symmetric Key Exchange presents a novel secure key generation scheme. This method is very efficient in encrypting, transmitting and preventing powerful attacks. The proposed algorithm is simulated in Java 8.1, Net beans 8.1, Apache tomcat, Glass fish server 4.1 and Struts Model-View-Controller MVC architecture framework. This has been developed in a web-based environment and mobile application using Struts MVC architecture. It was observed that the implementation of the algorithm based on DNA sequences gave better results as compared to other cryptography methods.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Bioinformatics Research and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.