Implementation of Novel Symmetric Encryption Algorithm to secure Information - Two Layer DNA-RSA Hybrid Cryptosystem

Authors

  • Omkar Pujeri School of Computer Engineering and Technology, Dr. Vishwanath Karad MIT World Peace University, Pune, 411038, Maharashtra, India
  • Uma Pujeri School of Computer Engineering and Technology, Dr. Vishwanath Karad MIT World Peace University, Pune, 411038, Maharashtra, India
  • Trupti Baraskar School of Computer Engineering and Technology, Dr. Vishwanath Karad MIT World Peace University, Pune, 411038, Maharashtra, India
  • Pallavi Parlewar Shri Ramdeobaba College of Engineering and Management, Nagpur

Keywords:

RSA, encryption algorithm, DNA cryptography, DNA sequence

Abstract

Cryptography was used since ancient days where plain text or confidential message was converted to a message which is in unreadable format or cipher text using secret key and an encryption algorithm and cipher text is converted to plaintext using decryption algorithm and a secret key. Cryptography ensured secured communication of messages and also provided integrity, confidentiality and availability of the information RSA is an asymmetric algorithm most widely used since 1977. Researchers and cryptanalysis have looked for ways to attack RSA. Some common attacks on RSA are discussed in this research work.

Objective – The Main objective of this research was to study RSA algorithm, its weakness and attacks on RSA and to work on to make existing RSA algorithm stronger. Attack like the chosen cipher text attack, partial key exposure attack, common modulus attack and low decryption exposure attack are frequently targeted attacks for RSA algorithm.

Findings – RSA algorithm can be partially or fully cracked if not implemented correctly. Proposed Work – In this research a new algorithm has been proposed using two layer DNA cryptography [1] and proposed algorithm is added on the top of RSA algorithm to make the RSA algorithm stronger. Message is first encrypted with proposed two-layer DNA

algorithm and output of this is input to RSA algorithm.

Implications – Algorithm can be applied to encrypt small ATM pin, small secret messages etc.

Result, Outcome and Originality - Security analysis of proposed system has proven good. Algorithm uses two-layer DNA cryptography with different function and encoding tables.  Indian copyright is granted for the algorithm under the registration number L-120035/2022

Downloads

Download data is not yet available.

References

P. Pavithran, S. Mathew, S. Namasudra, G. Srivastava, A novel cryptosystem based on DNA cryptog- raphy, hyperchaotic systems and a randomly gener- ated Moore machine for cyber physical systems, Computer Communications 188 (2022) 1–12.

P. Uma, Member, K. Siddivinayak, P. Ramachandra, Smart Captcha to Provide High Security against Bots, Proceedings of the World Congress on Engineeing (2019).

D. Pujeri, U. Pujeri, D. R, Symmetric Encryption Algorithm using ASCII, Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP 8 (2020) 2355–2359.

U. Pujeri, P. S. Aithal, R. Pujeri, Survey of Lattice to Design Post Quantum Cryptographic Algorithm Using Lattice, International Journal of Engineering Trends and Technology 69 (1) (2021) 2231–5381.

Increasing Randomization of Ciphertext in DNA Cryptography, In- ternational Journal of Advanced Computer Science and Applications(IJACSA) (10) (2021) 12–12.

S. . Narendren, B. Yashas, C.-D. Yathish2, B. . Mohan, A Cryptosystem using Two Layers of Security - DNA and RSA Cryptography, International Journal of Pure and Applied Mathematics 119 (7) (2018) 217–224.

N. P. Sable, M. D. Salunke, V. U. Rathod and P. Dhotre, "Network for Cross-Disease Attention to the Severity of Diabetic Macular Edema and Joint Retinopathy," 2022 International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON), Bangalore, India, 2022, pp. 1-7, doi: 10.1109/SMARTGENCON56628.2022.10083936.

M. Karimi, Waleejhaider, Cryptography using DNA Nucleotides. Inter- national Journal of Computer Application 168 (2017) 16–18.

Y. Zhang, DNA based random key generation and management for OTP encryption, BioSystems 159 (2017) 51–63.

N. P. Sable, V. U. Rathod, P. N. Mahalle and D. R. Birari, "A Multiple Stage Deep Learning Model for NID in MANETs," 2022 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 2022, pp. 1-6, doi: 10.1109/ESCI53509.2022.9758191.

Common Attacks on RSA and its Vari- ants with Possible Countermeasures, International Journal of Emerging Research in Management &Technology 5 (5) (2016) 65–70.

W. Diffie, M. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory 22 (6) (1976) 644–654.

R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosys- tems, Communications of the ACM 21 (2) (1978) 120–126. C. Cid (2003).

V. U. Rathod and S. V. Gumaste, "Role of Routing Protocol in Mobile Ad-Hoc Network for Performance of Mobility Models," 2023 IEEE 8th International Conference for Convergence in Technology (I2CT), Lonavla, India, 2023, pp. 1-6, doi: 10.1109/I2CT57861.2023.10126390.

N. Ubaidurrahman, R. Chithralekha-Balamurugan, A novel DNA computing based encryption and decryption algorithm, Procedia Computer Science 46 (2015) 463–475.

P. Pavithran, S. Mathew, S. Namasudra (2022). [link].

URL https://doi.org/10.1007/s10586-022-03653-9

A. K. Kaundal, & A K Verma, Extending Feistel struc- ture to DNA Cryptography, Journal of Discrete Mathematical Sciences and Cryptography 18 (4) (2015) 349–362.

S. . Karthiga, E. . Murugavalli, DNA CRYP- TOGRAPHY. International Research Journal of Engi- neering and Technology (IRJET) 5 (3) (2018) 3987–3991.

N. P. . Sable, V. U. . Rathod, P. N. . Mahalle, and P. N. . Railkar, “An Efficient and Reliable Data Transmission Service using Network Coding Algorithms in Peer-to-Peer Network”, IJRITCC, vol. 10, no. 1s, pp. 144–154, Dec. 2022.

E. M. S. Hossain, A DNA crypto- graphic technique based on dynamic DNA sequence table, Proceedings of the IEEE International Conference on Computer and Information Technology (ICCIT) (2016) 270– 275.

N. P. . Sable, R. . Sonkamble, V. U. . Rathod, S. . Shirke, J. Y. Deshmukh, and G. T. . Chavan, “Web3 Chain Authentication and Authorization Security Standard (CAA)”, IJRITCC, vol. 11, no. 5, pp. 70–76, May 2023.

N. P. Sable, V. U. Rathod, R. Sable and G. R. Shinde, "The Secure E-Wallet Powered by Blockchain and Distributed Ledger Technology," 2022 IEEE Pune Section International Conference (PuneCon), Pune, India, 2022, pp. 1-5, doi: 10.1109/PuneCon55413.2022.10014893.

Y. Niu, Review on DNA cryptography, in: Proceedings of the International Conference on Bio-Inspired Computing: Theories and Applications, Springer, 2019, pp. 134–148.

V. U. . Rathod and S. V. . Gumaste, “Role of Deep Learning in Mobile Ad-hoc Networks”, IJRITCC, vol. 10, no. 2s, pp. 237–246, Dec. 2022.

Prof. Deepanita Mondal. (2018). Analysis and Evaluation of MAC Operators for Fast Fourier Transformation. International Journal of New Practices in Management and Engineering, 7(01), 01 - 07. https://doi.org/10.17762/ijnpme.v7i01.62

García, A., Petrović, M., Ivanov, G., Smith, J., & Cohen, D. Enhancing Medical Diagnosis with Machine Learning and Image Processing. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/143

Gupta, S. K., Lanke, G. R., Pareek, M., Mittal, M., Dhabliya, D., Venkatesh, T., &

Chakraborty, S. (2022). Anamoly detection in very large scale system using big data. Paper presented at the IEEE International Conference on Knowledge Engineering and Communication Systems, ICKES 2022, doi:10.1109/ICKECS56523.2022.10059870 Retrieved from www.scopus.com

Downloads

Published

16.08.2023

How to Cite

Pujeri, O. ., Pujeri, U. ., Baraskar, T. ., & Parlewar, P. . (2023). Implementation of Novel Symmetric Encryption Algorithm to secure Information - Two Layer DNA-RSA Hybrid Cryptosystem. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 94–102. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3237

Issue

Section

Research Article