Adaptive Key Length Based Encryption Algorithm using DNA Approach

被引:2
|
作者
Jain, Anchal [1 ]
Rajpal, Navin [2 ]
机构
[1] Inderprastha Engn Coll, CSE Dept, Ghaziabad, India
[2] Guru Gobind Singh Inderprastha Univ, Sch Informat & Commun Technol, Delhi, India
关键词
DNA Cryptography; Chaotic Map; Image Encryption; SYSTEM;
D O I
10.1109/ICMIRA.2013.34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years various DNA based symmetric cryptographic algorithms have been suggested to develop secure image encryption techniques but secrecy of key and key space is often compromised due to small size of key. In this regard, this paper proposes a new method of adaptive key length based image encryption using DNA approach. The proposed algorithm uses 72-bit external key to generate the initial condition for chaotic sequence and for expansion of key to the desired length using DNA replication and complement rule. The proposed algorithm has a huge key space generated using key expansion method although the original key sequence is small. The original image is then encrypted using DNA addition and DNA complementary rule guided by the chaotic sequence. Experimental results and security analysis show that the proposed algorithm has achieved the satisfactory computing- security level.
引用
收藏
页码:140 / 144
页数:5
相关论文
共 50 条
  • [31] Data Encryption and Authetication Using Public Key Approach
    Nagaraj, Srinivasan
    Raju, G. S. V. P.
    Srinadth, V.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 126 - 132
  • [32] A coupled map lattice-based image encryption approach using DNA and bi-objective genetic algorithm
    Suri S.
    Vijay R.
    International Journal of Information and Computer Security, 2020, 12 (2-3): : 199 - 216
  • [33] Improving security of parallel algorithm using key encryption technique
    Sujitha, G.
    Varadharajan, M.
    Vignesh Rao, Y.
    Sridev, R.
    Sarvesh Gauthaum, M.K.
    Narayanan, Sowmy
    Swarna Raja, R.
    Mercy Shalinie, S.
    Information Technology Journal, 2013, 12 (12) : 2398 - 2404
  • [34] Email Authentication Using Symmetric and Asymmetric Key Algorithm Encryption
    Halim, Mohamad Azhar Abdul
    Wen, Chuah Chai
    Rahmi, Isredza
    Abdullah, Nurul Azma
    Rahman, Nurul Hidayah Ab.
    2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST'17), 2017, 1891
  • [35] DNA Image Encryption Using Modified Symmetric Key (MSK)
    Ochani, Arti
    Jadhav, Dipti
    Gulwani, Reshma
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 465 - 468
  • [36] Quantum Image Encryption Algorithm Based on Quantum Key Image
    Wang, Jian
    Geng, Ya-Cong
    Han, Lei
    Liu, Ji-Qiang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (01) : 308 - 322
  • [37] Quantum Image Encryption Algorithm Based on Quantum Key Image
    Jian Wang
    Ya-Cong Geng
    Lei Han
    Ji-Qiang Liu
    International Journal of Theoretical Physics, 2019, 58 : 308 - 322
  • [38] Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos
    Fu, Xing-Quan
    Liu, Bo-Cheng
    Xie, Yi-Yuan
    Li, Wei
    Liu, Yong
    IEEE PHOTONICS JOURNAL, 2018, 10 (03):
  • [39] Dual Key Speech Encryption Algorithm Based Underdetermined BSS
    Zhao, Huan
    He, Shaofang
    Chen, Zuo
    Zhang, Xixiang
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [40] Enhanced logic encryption algorithm based on secure authorization key
    Zhao Y.
    Song K.
    He J.
    Ma H.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 48 (05): : 1 - 6