Beruflich Dokumente
Kultur Dokumente
Volume: 6 Issue: 2 13 – 18
_______________________________________________________________________________________________
An More effective Approach of ECC Encryption Algorithm using DNA
Computing
Abstract—Now a day’s Cryptography is one of the broad areas for researchers. Encryption is most effective way to achieve data security.
Cryptographic system entails the study of mathematical techniques of encryption and decryption to solve security problems in
communication. Elliptic Curve Cryptography (ECC) is one of the most efficient techniques that are used for this issue. Many researchers have
tried to exploit the features of ECC field for security applications. This paper describes an efficient approach based elliptic curve and DNA
computing. The security of the scheme is based on Elliptic Curve Discrete Logarithm Problem (ECDLP). Existing DNA based cryptography
technique need more computational power and more processing time with larger key sizes to provide higher level of security. The main goal of
our construction is to enhance the security of elliptic curve cryptosystem using DNA Computing. Both image and text data are encrypted
successfully.
__________________________________________________*****_________________________________________________
15
IJRITCC | February 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 2 13 – 18
_______________________________________________________________________________________________
250
PK1:
(180,7) (114,190) (3,137)
200
(78,186) (239,69) (33,119)
(99,107) (205,9) (36,160)
150
Y_Axis
0
0 50 100 150 200 250 300
X_Axis
SC2:
(10,148) (238,204) (128,130)
(167,70) (115,31) (81,25)
Figure 2. The points on E241(-1,188). (37,215) (28,120) (101,178)
That means:
“The teacher distributed books to students at the school.” SC4:
(48,63) (206,103) (27,166)
After applying embedding process, we get: (21,149) (155,82) (5,84)
(180,7) (197,230) (10,148)
SM1:
(220,180) (42,27) (218,24)
(131,231) (220,180) (12,159) Next, we encrypt the result matrices with the secure key PK2:
(58,153) (220,180) (12,159)
GAATATCG GGGCTGTG ATGCAATT PK2:
SM2: CGTGGTGC TACTTGGG CGCTGGAC
GTGCGCAC CGACGATG AATTGACC
(152,165) (93,200) (220,180)
(131,231) (58,153) (131,231)
(58,153) (98,200) (145,66)
Therefore, the encrypted data generated once encoding using
SM3: DNA rules and applying code addition operation is given
(42,27) (42,27) (131,231) below:
AGTTTCCG GGCTAGTA AGGCGAAG
(220,180) (58,153) (98,200)
CCATAGGC GGATGCGC ACTAACGG
(220,180) (104,125) (220,180)
TACCTGGA CTGGATTG GAATCGCC
SM4:
(23,102) (218,24) (85,94) GGAGAGCG CCTTCAAC TGTCCAGG
(98,200) (21,149) (216,112) ATACCCAT GTGGACGC GATCCTCC
(39,69) (57,85) (31,233) GCATGCCT GTGCCATT GGCGTGCA
16
IJRITCC | February 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 2 13 – 18
_______________________________________________________________________________________________
well that nobody can recover the image. Further more, it is
GGCACTCT GACCGGAC GAAGACTA obvious that the histogram of cipher-image is uniform and
GCGGATTT AGTTAACA CAAAGCTT significantly different from the histogram of the original image
GGGCAGGA AGTCGGGC AAGGCGTG as shown in Figure 3, hence it does not provide any statistical
attacks.
ACAGGTCC GAGAAGGT TGGTCTGT
AGCTGACT AGCAGGTA CAATAACC V. RESULT AND DISCUSSION
ATAACTAC GGCGATTA GTGGACGC In this section, security aspects of the proposed approach will
After converting the result values to binary form, and be discussed. The proposed approach has large key space
embedding into corresponding characters, we get: that making brute force attack is infeasible. It has DNA
“ ” and code computing and different combinations of them. So it
Now, the result cipher text along with secure key is sent to the resists the exhaustive of brute force attacks.
receiver. The proposed system is more efficient than the existing DNA
cryptography [6] and Elliptic Curve Cryptography [13] in
At the receiving side, the recovery of cipher text is done as terms of security. Because, it uses elliptic curve cryptography
follows: mechanism for encryption and DNA computing in its
After receiving the cipher text, the receiver extracts the first encoding phase. So, the proposed system has two level of
entry that represents the secret. The second entry represents security first one in the encryption phase and the other is in the
the encrypted data. Then, reverse the process to retrieve the encoding phase. It would be hardly breakable by eavesdropper
original message. as it contains multi level of security.
REFERENCES
[1] Darrel R. Hankerson, A. Menezes and A. Vanstone, “Guide to Elliptic
Curve Cryptography”, Springer, 2004.
[2] Ali M. Sagheer, “Elliptic curves cryptographic techniques”,
Figure 3. Experimental result of “Lena” image. proceeding of the 6th International Conference on Signal
Processing and Communication Systems, 2012 IEEE, Gold Coast,
Australia, , pp.12-14, 2012.
[3] Sherif T. Amin, Magdy Saeb, Salah El-Gindi "A DNA based
Implementation of YAEA Encryption Algorithm," International
Conference on Computational Intelligence, San Francisco, No. 20,
2006, .
[4] Lai, XueJia, "Asymmetric encryption and signature method with
DNA technology", Science China Information Sciences 53.3, pp. 506-
514, 2010.
[5] Grasha Jacob and Annamalai Murugan, “A Hybrid Encryption Scheme
using DNA Technology”, The International Journal of Computer
Science and Communications Security, Vol. 3, pp. 61-65, 2013.
[6] Noorul Hussain Ubaidur Rahman, Chithralekha Balamurugan,
Rajapandian Mariappan, “A Novel String Matrix Data Structure for
Figure 4. Histogram of the plain image and encrypted DNA Encoding Algorithm”, International Conference on Information
Image and Communication Technologies, (ICICT 2014), 46, pp. 820-832,
Experiments using the proposed method resulted in a 2015.
significantly different encrypted image and uniform histogram, [7] P. Vijayakumar, S. Indupriya1 and R. Rajashree, “A Hybrid Multilevel
as shown in the Figure 3 and Figure 4. From the result, it can Security Scheme using DNA Computing based Color Code and Elliptic
Curve Cryptography”, Indian Journal of Science and Technology, Vol 9,
be easily seen that the proposed scheme encrypts the image so No.10, pp. 1-7, 2016.
17
IJRITCC | February 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 2 13 – 18
_______________________________________________________________________________________________
[8] Darrel Hankerson, Alfred Menezes and Scott Vanstone, “Guide to [13] F. Amounas and E.H. El Kinani, “Construction Efficiency of the Elliptic
elliptic curve cryptography”, Springer-Verlag, 2004. Curve Cryptosystem using Code Computing for Amazigh Alphabet”,
[9] Ziad E. Dawahdeh, Shahrul N. Yaakob and Ali Makki Sagheer, International Journal of Information & Network Security, vol.2, No.1,
“Modified ElGamal Elliptic Curve Cryptosystem using Hexadecimal pp. 43-53, 2013
Representation”, Indian Journal of Science and Technology, Vol. 8 (15), [14] F.Amounas and E.H. El Kinani, "Fast mapping method based on matrix
pp:1-8, 2015. approach for elliptic curve cryptography", International Journal of
[10] A. Atito, A. Khalifa and S. Z. Reda, ”DNA-Based Data Encryption and Information & Network Security, Vol. 1, No. 2, pp. 54-59, 2012.
Hiding Using Playfair and Insertion Techniques”, Journal of [15] Fatima Sadiqi, “The Teaching of Tifinagh (Berber) in Morocco”,
Communications and Computer Engineering, Vol. 2, Issue 3, pp. 44-49, Handbook of Language and Ethnic Identity The Success-Failure
2012. Continuum in Language and Ethnic Identity Efforts, Vol 2, Oxford
[11] Xing Wang, QiangZhang, “DNA computing -based cryptography”, Key University Press, pp. 33-44, 2011.
Laboratory of Advanced Design and 1ntelligent Compuling (Dalian [16] Herbert Shildt, ”Java complete reference”, Tata McGraw-Hill, 2011.
university), Ministry of education, Dalian, 116622, China IEEE, 2009. [17] F. Amounas and E.H. El Kinani, “Security Enhancement of Image
[12] Fatma E. Ibrahim, M. I. Moussa and H. M. Abdalkader, “ A Symmetric Encryption Based on Matrix Approach using Elliptic Curve”,
Encryption Algorithm based on DNA Computing”, International International Journal of Engineering Inventions, Vol. 3, Issue 11, pp. 8-
Journal of Computer Applications, Vol. 97, No.16, pp. 41-45, 2014. 16, 2014.
18
IJRITCC | February 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________