Total views : 483

A Hybrid Multilevel Security Scheme using DNA Computing based Color Code and Elliptic Curve Cryptography

Affiliations

  • School of Electronics Engineeirng, VIT University Chennai – 600048, Tamil Nadu, India
  • ECE, GKM College of Engineering and Technology, Chennai - 600 063, Tamil Nadu, India

Abstract


Background/Objectives: The terrorism threat caused by terrorist who posses forged passport and identities due to insecure environment which could be more serious imminent. Traditional scheme and techniques available to protect the information from unauthorized user is not enough for the current environment. Methods/Statistical analysis: So, a hybrid multilevel DNA computing based Color Code Cryptographic scheme combined with Elliptic Curve Cryptography is proposed to protect the passport data from the eavesdropper. Proposed data encryption algorithm consists of two level of security, first level of security is provided by convert the personal details (plaintext) of the customer into Unicode and RGB color code, and then map the color code with DNA nucleotide. The mapped DNA molecules converted into ASCII values for encryption process. DNA molecules help to store enormous amount of data intended to allow more number of user to access the system. Second level of security is provided by encrypt the ASCII values using Elliptic Curve Cryptography techniques which require very less key size compared with traditional schemes. Resultant ciphertext is hidden in the personal image of the customer using LSB steganographic method. Findings: Compared with traditional scheme, proposed scheme provides multilevel of security with less communication and computational overhead due to its lesser key size. ECC-80 bit key size based encryption scheme provides same level of security as RSA-1024 scheme with less number of operations involved in the passport verification system. Applications/Improvements: Since the proposed scheme require very less key size, consumes very less power, it will be more suitable for power constrained devices such as smart card, sensors, mobile phones, PDA's, RFID tags, etc.,


Keywords

ASCII Values, Color Code Cryptography, DNA Cryptography, Elliptic Curve Cryptography, Steganography, Unicode

Full Text:

 |  (PDF views: 297)

References


  • Diffie W, Hellman ME. New directions in cryptography. IEEE International Symposium on Information Theory in Ronneby, Sweden. 1976 Nov; 22(6):29–40.
  • Patil D, Vishaka N, Akshaya S, Aparna B. Cryptography based on color substitution. International Journal of Computer Appications. 2014 Apr; 91(16):29–32.
  • Deepa SP, Kannimuthu S, Keerthika V. Security using Colors Code matrix and Armstrong numbers. National Conference on Innovations in Emerging Technology; 2011. p. 157–60.
  • Zhang Y, Xiao D, Wen W, Wong KW. On the security of symmetric ciphers based on DNA coding. Information Sciences. 2014 Dec; 289:254–61.
  • Rajam STR, Kumar SBR. Enhanced Elliptic Curve Cryptography. Indian Journal of Science and Technology. 2015 Oct; 8(26):1–6.
  • Ramalingam M, Isa NAM. A steganography approach over video images to improve security. Indian Journal of Science and Technology, 2015 Jan; 8(1):79–86.
  • Mohamed AA. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach. Egyptian Informatics Journal. 2014 Jul; 15(2):79–87.
  • Jambhekar ND, Dhawale CA. Bit level key agreement and exchange protocol for digital image steganography. Indian Journal of Science and Technology. 2015 Jul; 8(15):1–7.
  • Halder T, Karforma S, Mandal R. A novel data hiding approach by pixel-value-difference steganography and optimal adjustment to secure E-Governance documents. Indian Journal of Science and Technology. 2015 Jul; 8(16):1–7.
  • Shi L, Su S, Xiang Z. Design of a passport anti-forgery system based on digital signature schemes. Springer-Berlin: Heidelberg: Intelligent and Security Informatics. 2009; 5477:101–11.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.