A novel DNA encryption technique using efficient key generation method for secure data

Ardhani Siva Sravanthi, S. Sushma


Information innovation is creating orderly, meanwhile security of information is genuine concern. There are diverse customers and affiliations who need to keep their vital data from attackers and software engineers. Diverse cryptographic systems are made in past years. Another field of cryptography is ascending in perspective of DNA figuring on account of high stockpiling cut-off, limitless parallelism and phenomenal vitality capability of natural DNA. This field is in starting stage so an extensive measure of investigation must be done yet. In this we are showing a DNA encryption methodology in light of cross section control and secure key time arrangement.


Atul Kahate, Cryptography and network security (New Delhi: Tata McGraw Hill, 2012).

B. Anam, K. Sakib, Md. A. Hossain, K. Dahal, Review on the Advancements of DNA cryptography, 2010.

http://ghr.nlm.nih.gov/handbook/basics/dna Genetic home reference, a service of the U.S. National Library of Medicine,

DNA Structure, http://ijarovic.wordpress.com, 2012.

Learn Genetics, University of Utah, http://learn.genetics.utah.edu/content/begin/tour, 2012.

Nucleotide base pairing of strands, http://dedunn.edublogs.org, 2012.

D.Prabhu and M.Adimoolam, Bi-serial DNA Encryption Algorithm (BDEA), Cornell university library, http://arxiv.org/abs/1101.2577, 2011.

L. Adleman, “Molecular computation of solutions to combinatorial problems”, Science, JSTOR, vol. 266, 1994, 1021–1025.

R. J. Lipton, “Using DNA to Solve NPComplete problems“, Science, vol. 268, 1995, 542-545.

Boneh, C. Dunworth, and R. Lipton, “Breaking DES using a molecular computer”, Proceedings of DIMACS workshop on DNA computing, 1995, 37–65.

Taylor Clelland, “Hiding messages in DNA Microdots”, Nature Magazine vol.399, June 1999.

Gehani, T. LaBean, and J. Reif, “DNABased Cryptography”, Lecture Notes in Computer Science, Springer, 2004.

G. Cui, L. Qin , Y. Wang , X. Zhang, “An Encryption Scheme Using DNA Technology”, IEEE, 2008.

S. Jeevidha, Dr. M. S. Saleem Basha and Dr. P. Dhavachelvan, “Analysis on DNA based Cryptography to Secure Data Transmission”, IJCA, Volume 29– No.8, September 2011.

Monica Borda and Olga Tornea, “DNA secret writing Techniques”, IEEE conference, 2010.

M. Borda , O. Tornea and T. Hodorogea, “secret writing by DNA hybridization”, acta technical napocensis Electronics and Telecommunications, Volume 50, Number 2, 2009.

Pankaj Rakheja, “Integrating DNA Computing in International Data Encryption Algorithm”, IJCA, Volume 26– No.3, July 2011.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.