Asymmetric DNA encryption and decryption technique for Arabic plaintext
Autor: | Meshrif Alruily, Osama R. Shahin, Ahmed I. Taloba, Hassan Al-Mahdi |
---|---|
Rok vydání: | 2021 |
Předmět: |
Theoretical computer science
General Computer Science Steganography Computer science business.industry Plain text 020206 networking & telecommunications Plaintext 02 engineering and technology computer.file_format Encryption law.invention Public-key cryptography Data dependency DNA computing law 0202 electrical engineering electronic engineering information engineering Cryptosystem 020201 artificial intelligence & image processing business computer |
Zdroj: | Journal of Ambient Intelligence and Humanized Computing. |
ISSN: | 1868-5145 1868-5137 |
DOI: | 10.1007/s12652-021-03108-w |
Popis: | The security of transmitting information from one point to another through different media is an important issue in the modern digital society. Researchers have consistently developed and proposed modern data transfer systems in order to transfer data in a safe manner. DNA (deoxyribonucleic acid) based encryption technology is a new encryption model used to protect data during transmission. Current systems that use DNA technology to encrypt Arabic texts are virtually non-existent and intended to hide data rather than encrypting it (i.e., steganography). In this research, an asymmetric DNA encryption technology is offered to encrypt and decrypt simple Arabic scripts. This technology depends on the integrity between asymmetric cryptography (i.e. RSA algorithm), dynamic encoding, and data dependency with the scope of DNA computing technology. Asymmetric cryptosystem is used only to begin the process of encryption and decryption, which is then processed fully using DNA computing. The idea of the proposed algorithm aims to generate a dynamic DNA table that depend on plain text, that aims to generate a dynamically generating 14 circular keys based on a multi-level security. Here, JAVA platform is used to implement the proposed work, and the randomization and avalanche effect are used to prove the efficiency of the proposed algorithm. This technique provides a significant change in the encoded text with an average of 53% of the avalanche characteristic. |
Databáze: | OpenAIRE |
Externí odkaz: |