Enhanced Double Layer Security using RSA over DNA based Data Encryption System
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 6
Abstract
In this paper we propose an enhanced algorithm to communicate data securely for communication and information security. The DNA cryptography is a new and promising area in cryptography. Here we propose techniques that use the objectives of cryptographic encryption and steganography i.e. Encryptions to make the message unreadable to anyone except the recipient and steganography is to hide the existence of the message so that we can provide more security. This is based upon DNA and amino acids-based structure to the core of the ciphering process. In the proposed scheme we have three phases. In the first phase we encrypt the information using DNA and amino acids cipher text and the secure data is formed. And in the second phase we hide the formed DNA (cipher text) using reference DNA by insertion technique. In the third phase we encrypt the key generated in phase 1 with conventional RSA algorithm. This technique can be done on any type of data and for applying this technique we have to convert the data into binary form. And to get the original information decrypt it by reversing the process. With the proposed algorithm we can easily make a cipher text with less time complexity, provides more security, and as properties of DNA is used it can be used for storage of large data in small DNA(cipher text) that provide compactable storage. When we decrypt the data we get the exact input without any junk values. It also ensures double level of security by incorporating RSA algorithm along with that of DNA, RSA is a powerful encryption algorithm.
Authors and Affiliations
Meettu Skariya , Mariam Varghese
A Review on Driver Drowsiness Detection Techniques
Number of accidents during driving is increasing day by day and drowsy driving has been implicated as a causal factor in many accidents. Goal of driver drowsiness detection systems is to reduce these accidents. It has be...
ADAPTIVE LANDMARK IDENTIFICATION BASED ON PERTINENT REGION EXTRACTION
The main purpose of this paper is about the relative merits of automated feature detection protocols on cephalometric- related digital radiology images. While the domain dependent techniques such as handcrafted masks are...
Networks Security on Mobile Computing – A Survey
Mobile cloud computing alleviates the limitations of resource-constrained mobile devices. Mobile cloud computing is gained popularity among mobile users of 998 million in 2014. Mobile Cloud computing is a collection of l...
Cybercrime: A Global Threat to Cybercommunity
Cyberspace is a virtual space equal important as real space for business, politics and communities. Cyberspace is vulnerable to borderless cyberattacks. The global problem of Cybercrime is also social, legal and it’s gro...
Effect of Different Modulation on PAPR and Its Reduction
As the technology grow in wireless communication, the concept of multicarrier modulation come into picture. Orthogonal Frequency Division Multiplex(OFDM) prove itself invaluable for multicarrier modulation.OFDM subcarrie...