Secure Data transmission using Recombinant DNA Cryptography and Morse Code Pattern
DOI:
https://doi.org/10.26438/ijcse/v8i5.174177Keywords:
Cryptography, DNA, RNA, Morse codeAbstract
It is most important for an organization and individuals to secure their information from attackers and hackers to ensure information privacy, integrity and confidentiality of the data. To enhance the data security across the network, it is very significant to encode the data in unreadable form. Many research works are carried out in the evolution of cryptographic system however current development in this field is DNA Cryptography which is developed based on the computational ability of Deoxyribo Nucleic Acid (DNA). This paper provides triple layer security for data transmission in two methods. In first method, the encryption of the plain text into tRNA by Transcription method. Secondly, the generation of Morse code Pattern which improves the security of the message. In this method the tRNA is generated by DNA code and complementary rule.
References
[1] Yanfeng Wang, Qinqin Han, Guangzhao Cui, Hunwei Sun , “Hiding Messages based on DNA Sequence and Recombinant DNA Technique”, IEEE Transactions Nanotechnology, vol.5, pp.2703-18.
[2] A. Murugana and R. Thilagavathy Securing Cloud Data using Dna and Morse Code: A Triple Encryption Scheme”, International Journal of Control Theory and Applications, vol 23, no,10 pp, 31-38 , 2017.
[3] Ahmad Sharaieh Afaf Edinat ShakirAlFarraji “An Enhanced Polyalphabetic Algorithm on Vigenere Cipher with DNA-Based Cryptography”, conference paper, 2018.
[4] Pushpa BR “A New Technique for Data Encryption using DNA Sequence” International conference on Internet computing and control (I2C2), 2017.
[5] Bonny B. Raj J. Frank Vijay, Mahalakshmi, “Secure Data Transfer through DNA Cryptography using Symmetric Algorithm” International Journal of Computer Applications (0975– 8887) ,Volume 133 – No.2, January 2016.
[6] Thilagavathy R, and Murugan A, “Cloud Computing: A Survey on Security Issues and DNA, ID-base Cryptography,” Indian Journal of Science and Technology (INDJST), Vol. 9(28), pp.1-6, July.2016.
[7] Che Jianhua, Yamin Duan, Tao Zhang, and Jie Fan, “Study on the security models and strategies of cloud computing,”In Procedia Engineering, Vol.(23), pp.586-593,Jan.2011.
[8] Clelland, C.T., V. Risca, and C. Bancroft. (1999). “Hiding messages in DNA microdots”. Nature, 399, pp. 533-534.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
