Abstract
This work focuses on signing the data with a signature using DNA coding for limited bandwidth systems or low computation systems. The proposed process has two modules. In first module, the sender generates a digital signature by signing the message using the DNA Coding Sequence. The second module is a hybrid of public key cryptography. A DNA symmetric key is generated, encrypted with DNA public key and shared with the intending recipient. Then the messages are exchanged using shared symmetric key. In both the modules, the work uses a simple non-linear function XOR to encrypt and decrypt the DNA coding sequence. The computation time required to perform the XOR operation matches the capabilities of limited bandwidth systems and suits our work. In addition the work also achieves high security in two levels, one is the secret matching of plain text letters to DNA Codon Sequence and the second is increase in the complexity of computation for breaking the algorithm using brute-force attack to square of the complexity achieved with 128-bit binary key, for the same length of DNA key.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boneh, D., Modadugu, N., Kim, M.: Generating RSA keys on a handheld using an untrusted server. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 271–282. Springer, Heidelberg (2000)
Schneier, B.: Applied Cryptography: protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)
The Elliptic Curve Digital Signature Algorithm (ECDSA), ANSI X9.62, American National Standards Institute (1998)
De Win, E., Mister, S., Preneel, B., Wiener, M.: On the performance of signature schemes based on elliptic curves. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 252–266. Springer, Heidelberg (1998)
Gehani, A., LaBean, T.H., Reif, J.H.: DNA-based cryptography. In: DNA Based Computers V, vol. 54, pp. 233–249. American Mathematical Society, Providence (2000)
Wang, X., Zhang, Q.: DNA computing-based cryptography. In: 4th International Conference on “Bio-Inspired Computing”, BIC-TA 2009, pp. 1–3. IEEE (2009)
Adleman, L.: Molecular Computation of Solutions to Combinatorial Problems. Science 266, 1021–1024 (1994)
Lipton, R.J.: Using DNA to solve NP-complete problems. Science 268, 542–545 (1995)
Boneh, D., Dunworth, C., Lipton, R.: Breaking DES using a molecular Computer, pp. 37–65. American Mathematical Society (1995)
Celland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399, 533–534 (1999)
Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: IEEE 3rd International Conference on Bio-Inspired Computing: Theories and Applications (BICTA 2008), Adelaid, SA, Australia, pp. 37–42 (2008)
Naveen, J.K., Karthigaikumar, P., Sivamangai, N.M., Sandhya, R., Asok, S.B.: Hardware Implementation of DNA Based Cryptography. In: IEEE Conference on Information and Communication Technologies, ICT, pp. 696–700 (2013)
Katayangi, K., Murakami, Y.: A new product-sum public-key cryptosystem using message extension. IEICE Transactions on Fundamentals E84-A(I0), 2482–2487 (2001)
Zhang, Q., Guo, L., Xue, X., Wei, X.: An Image Encryption Algorithm Based on DNA Sequenc Addition Operation. In: 4th International Conference on Bio-Inspired Computing, BICTA, pp. 75–79 (2009)
Torana, O., Borda, M.: 8th International Conference on Communications (COMM), pp. 451–456. IEEE (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Madhulika, G., Rao, C.S. (2015). Generating Digital Signature Using DNA Coding. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-12012-6_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12011-9
Online ISBN: 978-3-319-12012-6
eBook Packages: EngineeringEngineering (R0)