Abstract

Now a day everyone wants to provide security to their data. Present days many methods are available for doing the Cryptography. DNA sequence key based cryptography became popular because of its more security features. In the paper, encryption technique proposed is based on using two methods: Quantum key distribution for generating a key corresponding to the bit of the plain text and DNA sequence based encryption for encryption of the plain text. Sender first performs complement and LBP operation on the data. Instead of sending the processed plain text bits, sender sends the complement of the key if the processed plain text bit is 0 otherwise sends the swapped key sequence. DNA Complement method on the key which is generated by the Quantum key generation method is done based on BB84 protocol. Two step encryption and decryption technique using DNA based encryption is proposed and practically implemented. The performance of the proposed technique is analysed and compared with other related techniques

Highlights

  • Cryptography is the science of encrypting and decrypting the data so as to keep the data more secured. It is capable of keeping the data in secret while saving the information or passing it over the unsafe networks, like internet

  • In the recent times the protection systems, shopping systems, banking systems and many other manual systems has been made into the practice of utilizing the website advantages

  • For all these applications of manual systems, the most confidential data involved in it is being transmitted over the internet and it is much susceptible to strikes or outbreaks like teardrop, IP spoofing, man in the middle attack and so on

Read more

Summary

INTRODUCTION

Cryptography is the science of encrypting and decrypting the data so as to keep the data more secured. Alice could encrypt the message using a secret code, or key, such as to render it unintelligible to Eve, provided the encryption/decryption algorithm" is known only to Alice and Bob. Owing to the growth of science and study in the field of network, it is responsibility to secure our image, data from the third parties. The BB84 protocol coding scheme uses four non-orthogonal polarization states where as B92 protocol uses only two orthogonal states that will polarize each of the photon which will be transmitted In this protocol, sender and receiver have to communicate within two channels, Quantum channel and public channel to share a secret key. Improving security and the key space, and it provides an operational test of it It is defined a one-time pad cryptosystem using DNA selfassembly and showed that self-assembly is more efficient than PCR for generating the DNA sequences needed by our system [14]

BACKGROUND
Encryption
Take the plain text which is the result of Binary Conversion
DNA based Technique
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.