Efficient DNA Cryptography Using One-Time Pad and Run-Length Encoding for Optimized Ciphertext Storage
DOI:
https://doi.org/10.22399/ijcesen.641Keywords:
ASCII, Run Length Encode, Cryptography, DNA OTP, EncryptionAbstract
Cryptography ensures data privacy by transforming data into unreadable formats that only authorized individuals can decrypt. With the increase in electronically stored and transmitted data, enhanced methods for data protection are required. DNA cryptography, leveraging the genetic structure of DNA, provides a promising approach for secure communication and data storage. This paper introduces a novel DNA-based cryptographic method employing a DNA one-time pad (OTP) combined with modified run-length encoding to reduce ciphertext size. Unlike traditional cryptography, which often results in a larger ciphertext than plaintext, our proposed method demonstrates a significant reduction in ciphertext size. Experimental results reveal that for input text files of 1MB, 2MB, 3MB, 5MB, and 10MB, the ciphertext sizes were reduced by up to 20KB, 40KB, 60KB, 100KB, and 200KB, respectively. This reduction not only enhances storage efficiency but also minimizes transmission costs, marking a substantial advancement over existing DNA and classical cryptography methods. Future work will explore the application of this technique for encrypting biological data and incorporating DNA barcoding for improved data authentication and reliability.
References
Jacob, G., & Murugan, A. (2013). DNA based Cryptography: An Overview and Analysis. International Journal of Emerging Sciences, 3(1), 36–42.
Vijayakumar, P., Vijayalakshmi, V., & Rajashree, R. (2018). Increased level of security using DNA steganography. International Journal of Advanced Intelligence Paradigms, 10(1/2), 74. https://doi.org/10.1504/IJAIP.2018.089490
Mansouri, D., Yuan, X., & Saidani, A. (2020). A new lossless DNA compression algorithm based on a single-block encoding scheme. Algorithms, 13(4). https://doi.org/10.3390/A13040099
Aieh, A., Sen, A., Dash, S. R., & Dehuri, S. (2015). Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie Hellman key sharing technique. In Proceedings of the Third International Conference on Computer, Communication, Control and Information Technology (C3IT) (pp. 1–6). https://doi.org/10.1109/C3IT.2015.7060130
Biswas, M. R., Alam, K. M. R., & Morimoto, Y. (2019). A technique for DNA cryptography based on dynamic mechanisms. Journal of Information Security and Applications, 48, 102363. https://doi.org/10.1016/j.jisa.2019.102363
Devi, K. R., & Prabakaran, S. (2016). An Enhanced Bilateral Information Security towards a Conventional Cryptographic System using DNA Sequences. Indian Journal of Science and Technology, 9(39). https://doi.org/10.17485/ijst/2016/v9i39/102067
Gehani, A., LaBean, T., & Reif, J. (2003). DNA-based Cryptography. In Proceedings of the Springer Conference on Advances in Cryptology (pp. 167–188). https://doi.org/10.1007/978-3-540-24635-0_12
Gupta, L. M., Garg, H., & Samad, A. (2019). An improved DNA Based Security Model using Reduced Cipher Text Technique. International Journal of Computer Networks and Information Security, 11(7), 13–20. https://doi.org/10.5815/ijcnis.2019.07.03
Hammad, B. T., Sagheer, A. M., Ahmed, I. T., & Jamil, N. (2020). A comparative review on symmetric and asymmetric DNA-based cryptography. Bulletin of Electrical Engineering and Informatics, 9(6), 2484–2491. https://doi.org/10.11591/eei.v9i6.2470
Kaundal, A. K., & Verma, A. K. (2015). Extending Feistel structure to DNA Cryptography. Journal of Discrete Mathematical Sciences and Cryptography, 18(4), 349–362. https://doi.org/10.1080/09720529.2014.995975
Majumder, A., Majumdar, A., Podder, T., Kar, N., & Sharma, M. (2015). Secure data communication and cryptography based on DNA based message encoding. In Proceedings of 2014 IEEE International Conference on Advanced Communication, Control and Computing Technologies (pp. 360–363). https://doi.org/10.1109/ICACCCT.2014.7019464
Akkasaligar, P. T., & Biradar, S. (2020). Selective medical image encryption using DNA cryptography. Information Security Journal: A Global Perspective, 29(2), 91–101. https://doi.org/10.1080/19393555.2020.1718248
Basu, S., Karuppiah, M., Nasipuri, M., Halder, A. K., & Radhakrishnan, N. (2019). Bio-inspired cryptosystem with DNA cryptography and neural networks. Journal of Systems Architecture, 94, 24–31. https://doi.org/10.1016/j.sysarc.2019.02.005
Babaei, M. (2013). A novel text and image encryption method based on chaos theory and DNA computing. Natural Computing, 12(1), 101–107. https://doi.org/10.1007/s11047-012-9334-9
Thomas, A. P., Rachel Jacob, J., & Nair, V. V. (2017). Secret Data Transmission Using Combination of Cryptography & Steganography. Retrieved from www.ijcert.org
Raja, I., Reddy, S., Pradeep, R., & Reddy, K. (2014). DNA seed encryption using distributed polysubstitution choice based transposition techniques. 7(2):475-481
Hebbale, S. B., Giridhar Akula, V. S., & Baraki, P. (n.d.). Tuna Swarm Optimization with 3D-chaotic map and DNA encoding for image encryption with lossless image compression based on FPGA. International journal of electrical and computer engineering systems. DOI:10.32985/ijeces.14.1.7
Hemasri, S., Kiran, D. S., Ranichitra, D. A., & Kanna, D. A. R. (2023). Improved Data Encryption Standard Algorithm using Zigzag Scan for Secured Data Transmission. International Journal of Innovative Technology and Exploring Engineering, 12(6), 26–37. https://doi.org/10.35940/ijitee.F9516.0512623
Ravichandran, D., Praveenkumar, P., Rayappan, J. B. B., & Amirtharajan, R. (2017). DNA Chaos Blend to Secure Medical Privacy. IEEE Transactions on Nanobioscience, 16(8), 850–858. https://doi.org/10.1109/TNB.2017.2780881
UbaidurRahman, N. H., Balamurugan, C., & Mariappan, R. (2015). A Novel DNA Computing Based Encryption and Decryption Algorithm. Procedia Computer Science, 46, 463–475. https://doi.org/10.1016/j.procs.2015.02.045
Mondal, M., & Ray, K. S. (2023). Review on DNA Cryptography. International Journal of Bioinformatics and Intelligent Computing, 2(1).
Anusudha, K., Venkateswaran, N., & Valarmathi, J. (2017). Secured medical image watermarking with DNA codec. Multimedia Tools and Applications, 76(2), 2911–2932. https://doi.org/10.1007/s11042-015-3213-1
M, S., & M, V. (2023). A novel and fast hybrid design of cryptosystems for image via 5-D chaos-based random keys and DNA. Multimedia Tools and Applications. 83, 58495–58514 https://doi.org/10.1007/s11042-023-17742-3
Latha, H. R., & Ramaprasath, A. (2023). HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme. Journal of Intelligent Systems, 32(1). https://doi.org/10.1515/jisys-2022-9056
Rahul, B., Kuppusamy, K., & Senthilrajan, A. (2023). Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function. Optik, 289, 171253. https://doi.org/10.1016/j.ijleo.2023.171253
Bhimani, P. (2018). A Review on Cryptography Techniques using DNA Computing. International Journal of Computer Engineering and Research Trends. https://doi.org/10.22362/ijcert/2018/v5/i6/v5i604
Nath, I., Bhattacharyya, D., Mandal, A., Kundu, N., & De, O. (2017). NHSKCA: A New Heuristic for Symmetric Key Cryptographic Algorithm. International Journal of Computer Engineering In Research Trends, 4(12), 547-553 Retrieved from www.ijcert.org
Bhirud, K., Kulkarni, D., Pawar, R., & Prachi, P. (2016). Data Security Using Elliptic Curve Cryptography. International Journal of Computer Engineering and Research Trends, 3(5), 222–225.
Nath, I., Baidya, A., Biswas, S. K., Dam, S., & Singha, K. (2020). NISSC: A New Information Security System Using Cryptography. International Journal of Computer Engineering and Research Trends. https://doi.org/10.22362/ijcert/2020/v7/i07/v7i0704
Phuc, H., Luu, H., Sakhi, A., & Latief, M. (2024). Optimizing Group Management and Cryptographic Techniques for Secure and Efficient MTC Communication. International Journal of Computer Engineering and Research Trends, 11(2). https://doi.org/10.22362/ijcert/2024/v11/i2/v11i201
Maria Gonzalez, M. Bhavsingh & John Smith. (2024). Advanced DNA Cryptography for Enhanced Data Security Using Compression and Encoding Techniques. Frontiers in Collaborative Research, 2(2), 37-47. https://doi.org/10.70162/fcr/2024/v2/i2/v2i204
Elena Petrova, & Ahmed Al-Farsi. (2024). Hybrid DNA Encryption with Adaptive Run-Length Encoding for Secure Big Data Applications. Synthesis: A Multidisciplinary Research Journal, 2(3), 22-31. https://doi.org/10.70162/smrj/2024/v2/i3/v2i303
Michael Brown, & Li Wei. (2024). One-Time Pad-Based DNA Cryptography with Enhanced Ciphertext Reduction Strategies. Synthesis: A Multidisciplinary Research Journal, 2(1), 10-19. https://doi.org/10.70162/smrj/2024/v2/i1/v2i102
Hiroshi Tanaka, M. Bhavsingh & Sarah Johnson. (2024). Optimized DNA Encryption Algorithms Leveraging Statistical and Run-Length Compression Methods. Frontiers in Collaborative Research, 2(3), 34-43. https://doi.org/10.70162/fcr/2024/v2/i3/v2i304
Pierre Dupont, & Chitra Bansal. (2024). Secure DNA-Based Cryptography Using Novel Compression Algorithms for IoT Data Transmission. Macaw International Journal of Advanced Research in Computer Science and Engineering, 10(1), 100-109. https://doi.org/10.70162/mijarcse/2024/v10/i1/v10i111
El-Taj, H. (2024). A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication. International Journal of Computational and Experimental Science and Engineering, 10(3);434-460. https://doi.org/10.22399/ijcesen.382
P., V., & A., M. R. (2024). A Scalable, Secure, and Efficient Framework for Sharing Electronic Health Records Using Permissioned Blockchain Technology. International Journal of Computational and Experimental Science and Engineering, 10(4);827-834. https://doi.org/10.22399/ijcesen.535
S, P., & A, P. (2024). Secured Fog-Body-Torrent : A Hybrid Symmetric Cryptography with Multi-layer Feed Forward Networks Tuned Chaotic Maps for Physiological Data Transmission in Fog-BAN Environment. International Journal of Computational and Experimental Science and Engineering, 10(4);671-681. https://doi.org/10.22399/ijcesen.490
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.