DNA-Genetic Encryption Technique

Full Text (PDF, 1786KB), PP.1-9

Views: 0 Downloads: 0


Hamdy M. Mousa 1,*

1. Faculty of Computers and Information, Menoufia University, Egypt

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.07.01

Received: 10 Jan. 2016 / Revised: 1 Mar. 2016 / Accepted: 22 Apr. 2016 / Published: 8 Jul. 2016

Index Terms

DNA Technique, cryptography, bit exchange, Genetic Algorithm


In this paper, we propose DNA-Genetic Encryption Technique (D-GET) in order to make the technique more secure and less predictable. In this technique, binaries any type of digital data and convert it to DNA sequencing, reshape, encrypt, crossover, mutate and then reshape. The main stages of D-GET are repeated three times or more. Transmit the encrypted data in text/image format file. In other side, the receiver uses the D-GET to decrypt the received data and reshape it to original format. This Technique also transforms the text into an image and vice versa to improve security and multiple key sequences to increase the degree of diffusion and confusion, which makes resulting cipher data difficult to decipher and makes to realize a perfect secrecy system. Experimental results demonstrate that proposed technique has multilayer protection stages against different attacks and higher level of security based on the multi-stages and genetic operations. Decrypted data are acceptable because of there is absolutely difference between it and secret data.

Cite This Paper

Hamdy M. Mousa, "DNA-Genetic Encryption Technique", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.7, pp.1-9, 2016. DOI:10.5815/ijcnis.2016.07.01


[1]William Stallings, "Cryptography and Network Security: Principles and Practice", Prentice Hall, 2011.
[2]Keith M. Martin,” Everyday Cryptography Fundamental Principles and Applications”, Oxford University Press Inc., New York, 2012.
[3]Jingli Zheng, Zhengbing Hu and Chuiwei Lu, “A Light-weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure”, MECS, I.J. Computer Network and Information Security, pp. 16-23, Vol. 1, 2015.
[4]M.I.Khalil, “Real-Time Encryption/Decryption of Audio Signal “, MECS, I. J. Computer Network and Information Security, Vol., 2, pp. 25-31, 2016.
[5]Mona Sabry, Mohamed Hashem and Taymoor Nazmy, “Three Reversible Data Encoding Algorithms based on DNA and Amino Acids’ Structure”, International Journal of Computer Applications (0975 – 8887) Volume 54– No.8, September 2012.
[6]C. T. Celland, V. Risca and Bancroft C. “Hiding messages in DNA microdots,” Nature, vol. 399, pp. 533–534, 1999.
[7]Leier, A., Richter, C., Banzhaf, W. and Rauhe, H., “Cryptography with DNA Binary Strands”, BioSystems, Vol. 57, pp.13-22, 2000.
[8]Mohammadreza, Najaftorkaman, Nazanin Sadat Kazazi, “A Method to Encrypt Information with DNA-Based Cryptography”, International Journal of Cyber-Security and Digital Forensics (IJCSDF) 4(3): pp. 417-426, 2015.
[9]T. Anwar, Dr. S. Paul, and S. Singh, “Message Transmission Based on DNA Cryptography: Review”, International Journal of Bio-Science and Bio-Technology, Vol.6, No.5, pp.215-222, 2014.
[10]Chen Jie, “A DNA-based bio molecular cryptography design,” Proceedings of IEEE International Symposium, Vol. 3, pp. 822-825, 2003.
[11]Pramanik Sabari, and Sanjit Kumar Setua, "DNA cryptography," In Electrical & Computer Engineering (ICECE), 7th IEEE International Conference on, pp. 551-554, 2012.
[12]Tushar Mandge, Vijay Choudhary. “A DNA encryption technique based on matrix manipulation and secure key generation scheme”, International Conference on Information Communication and Embedded Systems (ICICES), 21-22 Feb. 2013.
[13]Sherif T. Amin, Magdy Saeb, Salah El-Gindi, "A DNA based Implementation of YAEA Encryption Algorithm," International Conference on Computational Intelligence (CI 2006), San Francisco, Nov. 20, 2006.
[14]A. K. Verma, Mayank Dave, R.C. Joshi, “Securing Ad hoc Networks Using DNA Cryptography”, IEEE International Conference on Computers and Devices for Communication (CODEC06), pp. 781-786, Dec. 18-20, 2006.
[15]Fatma E. Ibrahim, M. I. Moussa and H. M. Abdalkader, “A Symmetric Encryption Algorithm based on DNA Computing”, International Journal of Computer Applications (0975 – 8887) Volume 97– No.16, pp. 41-45, July 2014.
[16]Kazuo Tanaka, Akimitsu Okamoto, and Isao Saito, “Public-key system using DNA as a one-way function for distribution”. Biosystems, Vol. 81, pp. 25-29, 2005.
[17]Lai, XueJia, "Asymmetric encryption and signature method with DNA technology", Science China Information Sciences 53.3, pp. 506-514, 2010.
[18]Cui, Guangzhao, Liming Qin, Yanfeng Wang, and Xuncai Zhang, "An encryption scheme using DNA technology", In Bio-Inspired Computing: Theories and Applications, IEEE International Conference on, pp. 37-42, 2008.
[19]Lai Xin-she, Zhang Lei, “A novel generation key scheme based on DNA”, International conference on Computational Intelligence and security, pp. 264-266,13-17 Dec. 2008.
[20]Seyyed Amin Seyyedi and Nick Ivanov,”Statistical Image Classification for Image Steganographic Techniques“, MECS, I.J. Image, Graphics and Signal Processing, pp. 19-24, Vol. 8, July 2014.
[21]Deepak Kumar, and Shailendra Singh, "Secret data writing using DNA sequences," In Emerging Trends in Networks and Computer Communications (ETNCC), IEEE International Conference on, pp. 402-40, 2011.
[22]Zhang Yunpeng, Zhu Yu, Wang Zhong and Richard O. Sinnott, “Index-based symmetric DNA encryption algorithm”, 4th International congress on image and signal processing, pp. 2290 - 2294, 2011.
[23]Yunpeng Zhang, Bochen Fu, and Xianwei Zhang, "DNA cryptography based on DNA Fragment assembly", International Conference on Information Science and Digital Content Technology (ICIDT), Vol. 1, pp. 179-182, 2012.
[24]Noorul Hussain Ubaidur Rahman, Chithralekha Balamurugan, and Rajapandian Mariappan, “A Novel DNA Computing based Encryption and Decryption Algorithm”, Procedia Computer Science 46 pp. 463 – 475, 2015.
[25]Shima Ramesh Maniyath, Thani kaiselvan V , “A Novel DNA based Encryption Algorithm for Multimedia information”, An international journal of advanced computer technology, Volume 5 (1), pp. 2036 - 2045, January – 2016.
[26]E. Suresh Babu, C. Naga Raju, and Munaga H M Krishna
Prasad, “Inspired Pseudo Biotic DNA Based Cryptographic Mechanism against Adaptive Cryptographic Attacks”, International Journal of Network Security, Vol.18, No.2, PP.291-303, Mar. 2016.
[27]Bonny B. Raj, J. Frank Vijay and T. Mahalakshmi, “Secure Data Transfer through DNA Cryptography using Symmetric Algorithm”, International Journal of Computer Applications, Volume 133 – No.2, pp. 19-23 ,January 2016.
[28]M. Mitchell, “An Introduction to Genetic Algorithms”, MIT Press, 1998.
[29]Simon Johnson, “Cryptography for Developers”, Syngress Publishing, 2007.
[30]Mark Stamp and Richard M. Low, “APPLIED CRYPTANALYSIS Breaking Ciphers in the Real World”, John Wiley & Sons, Inc., Hoboken, New Jersey, 2007.