Secret key generation based Short Tandem Repeat DNA
Keywords:
DNA, RSA, STR, Encryption, Key TransmissionAbstract
In a daily basis, scientists seek to develop more advanced security solutions to be applied into IoT environment using in-hand technologies. Indeed, many approaches have been proposed to respond to this scarcity, and many other exertions have been spent. One promising consequence is DNA computing, which has significantly promising capabilities over traditional electronic computers. As biological characteristics have always been a source of inspiration for scientists in developing complex computing systems and technologies.
DNA is a molecule in organism`s cells. All organisms' DNA are similar in about 99.9%. In this paper, a new data encryption technique has been inspired by DNA characteristics in which the encryption key transmission is based on STR DNA fingerprint. The proposed technique will be applied in a healthcare environment. The STR-DNA based key generation and transmission technique will be used to encrypt the message before being transmitted over the IoT environment. The experimental results showed that the proposed technique has similar characteristics as the RSA algorithm added the feature of applying the mechanism on biological environments.
Downloads
References
Gamil R. S. Qaid and Nadhem Sultan Ebrahim (2023) “A Lightweight Cryptographic Algorithm Based on DNA Computing for IoT Devices”
Jinwei Yu, Wei Xie, Zhenyu Zhong, Huan Wang,(2022) “Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation, Chaos, Solitons & Fractals”, Volume 162.
Kairi, A., & Bhadra, T. (2023). "Decoding the future using a novel DNA-based cryptosystem". Journal of European Chemical Bulletin, 12, 3597-3609.
Bahig, H. Nassr, D. (2019)” DNA-Based AES with Silent Mutations”. Arabian Journal for Science and Engineering, vol 44, pp. 3389-3403
George, A. Singh, H. , (2017)”Design of Computing Circuits using Spatially Localized DNA Majority Logic Gates”. IEEE International Conference on Rebooting Computing (ICRC), Washington, DC, pp. 1-7
Jian-Jun; Wang, Q.-W.; Yong, K.-Y.; Shao, F.; Lee, K.J. (2015). “Programmable DNA-mediated multitasking processor”. Journal of Physical Chemistry B. 119 (17): 5639–5644.
Suyel Namasudra, , (2022) “A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure, Computers and Electrical Engineering”, Computers and Electrical Engineering. 104. 108426. 10.1016/j.compeleceng.2022.108426.
Rajni, A. , (2017) “DNA Computing. International Journal Of Engineering And Computer Science”, India, vol 6 issue 1.
Church, G. Gao, Y. Kosuri, S,( 2012)”Next-Generation Digital Information Storage in DNA”, Science, New York
Pan,C., Tabatabaei, S.K., Tabatabaei Yazdi, S.M.H. et al. (2022). “Rewritable two-dimensional DNA-based data storage with machine learning reconstruction”. Nat Commun 13, 2984
Ahgue, A. O., De Nkapkop, J. D., Effa, J. Y., Franz, S., Adelis, P., & Borda, M. (2018( “ A DNA-based chaos algorithm for an efficient image encryption application”. In 2018 International Symposium on Electronics and Telecommunications (ISETC) (pp. 1-4). IEEE.
B.Akiwate and L. Parthiban,(2018), “A Dynamic DNA for Key-based Cryptography,” International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS), Belgaum, India.
Ali A.Yassin , Abdullah Mohammed Rashid , Abdulla J. Yassin , Hamid Alasadi,(2021),” A novel image encryption scheme based on DCT transform and DNA sequence”, Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 3, March 2021, pp. 1455~1464
Casey-Tyler Berezin, Samuel Peccoud, Diptendu M. Kar, Jean Peccoud, Cryptographic approaches to authenticating synthetic DNA sequences, Trends in Biotechnology,Volume 42, Issue 8, 2024.
Sabry, Mona & Hashem, Mohammed & Nazmy, Taymoor & Khalifa, M.Essam. (2015)."Design of DNA-based Advanced Encryption Standard (AES)". 10.1109/IntelCIS.2015.7397250.
Sherif H. El-Alfy, Ahmed F. Abd El-Hafez,Paternity testing and forensic DNA typing by multiplex STR analysis using ABI PRISM 310 Genetic Analyzer, Journal of Genetic Engineering and Biotechnology, Volume 10, Issue 1,2012.
Sherif H. El-Alfy, Ahmed F. Abd El-Hafez, Paternity testing and forensic DNA typing by multiplex STR analysis using ABI PRISM 310 Genetic Analyzer, Journal of Genetic Engineering and Biotechnology, Volume 10, Issue 1, 2012
Kumar, Sanjay, and Deepmala Sharma. 2023. "Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm" Engineering Proceedings 59, no. 1: 59.
Xue Wei and Dola Saha. 2022. KNEW: Key Generation using NEural Networks from Wireless Channels. In Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning (WiseML '22). Association for Computing Machinery, New York, NY, USA, 45–50.
Al-Shargabi, B., Al-Husainy, M.A.F. (2021). A New DNA Based Encryption Algorithm for Internet of Things. In: Saeed, F., Mohammed, F., Al-Nahari, A. (eds) Innovative Systems for Intelligent Health Informatics. IRICT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 72. Springer, Cham
C. Patel and N. Doshi, "Secure Lightweight Key Exchange Using ECC for User-Gateway Paradigm," in IEEE Transactions on Computers, vol. 70, no. 11, pp. 1789-1803, 1 Nov. 2021.
X. Gao, W. Du, W. Liu, R. Wu and F. Zhan, "A Lightweight and Efficient Physical Layer Key Generation Mechanism for MANETs," 2020 IEEE 6th International Conference on Computer and Communications (ICCC), Chengdu, China, 2020
M. Indrasena Reddy, A.P. Siva Kumar, K. Subba Reddy, A secured cryptographic system based on DNA and a hybrid key generation approach, Biosystems, Volume 197, 2020.
M. Jacovic, M. Kraus, G. Mainland and K. R. Dandekar, "Evaluation of Physical Layer Secret Key Generation for IoT Devices," 2019 IEEE 20th Wireless and Microwave Technology Conference (WAMICON), Cocoa Beach, FL, USA, 2019, pp. 1-6, doi: 10.1109/WAMICON.2019.8765465.
Yuliana, Mike & Wirawan, Iwan & Suwadi, Suwadi. (2019). An Efficient Key Generation for the Internet of Things Based Synchronized Quantization. Sensors. 19. 2674. 10.3390/s19122674.
B.R.Pushpa, (2017) “A new technique for data encryption using DNA sequence,” International Conference on Intelligent Computing and Control (I2C2), Coimbatore, India, 2017
Wattar, Auday & Mahmod, Ramlan & Zukarnain, Zuriati & Udzir, Nur. (2015). "A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation". International Journal of Network Security & Its Applications. 7. 10.5121/ijnsa.2015.7107.
O. F. Rashid, Z. A. Othman, S. Zainudin and N. A. Samsudin, "DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems," in IEEE Access, vol. 9, pp. 31892-31907, 2021.
Patil Rachana Yogesh, Devane Satish R, Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA, Procedia Computer Science, Volume 167, 2020.
Vishwakarma, Seema & Gupta, Neetesh. (2021). “An Efficient Color Image Security Technique for IOT using Fast RSA Encryption Technique”. 717-722. 10.1109/CSNT51715.2021.9509697.
Published
How to Cite
Issue
Section
Copyright (c) 2024 Journal of Applied Artificial Intelligence
This work is licensed under a Creative Commons Attribution 4.0 International License.