Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 328))

Abstract

This work focuses on signing the data with a signature using DNA coding for limited bandwidth systems or low computation systems. The proposed process has two modules. In first module, the sender generates a digital signature by signing the message using the DNA Coding Sequence. The second module is a hybrid of public key cryptography. A DNA symmetric key is generated, encrypted with DNA public key and shared with the intending recipient. Then the messages are exchanged using shared symmetric key. In both the modules, the work uses a simple non-linear function XOR to encrypt and decrypt the DNA coding sequence. The computation time required to perform the XOR operation matches the capabilities of limited bandwidth systems and suits our work. In addition the work also achieves high security in two levels, one is the secret matching of plain text letters to DNA Codon Sequence and the second is increase in the complexity of computation for breaking the algorithm using brute-force attack to square of the complexity achieved with 128-bit binary key, for the same length of DNA key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Modadugu, N., Kim, M.: Generating RSA keys on a handheld using an untrusted server. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 271–282. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Schneier, B.: Applied Cryptography: protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)

    MATH  Google Scholar 

  3. The Elliptic Curve Digital Signature Algorithm (ECDSA), ANSI X9.62, American National Standards Institute (1998)

    Google Scholar 

  4. De Win, E., Mister, S., Preneel, B., Wiener, M.: On the performance of signature schemes based on elliptic curves. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 252–266. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Gehani, A., LaBean, T.H., Reif, J.H.: DNA-based cryptography. In: DNA Based Computers V, vol. 54, pp. 233–249. American Mathematical Society, Providence (2000)

    Google Scholar 

  6. Wang, X., Zhang, Q.: DNA computing-based cryptography. In: 4th International Conference on “Bio-Inspired Computing”, BIC-TA 2009, pp. 1–3. IEEE (2009)

    Google Scholar 

  7. Adleman, L.: Molecular Computation of Solutions to Combinatorial Problems. Science 266, 1021–1024 (1994)

    Article  Google Scholar 

  8. Lipton, R.J.: Using DNA to solve NP-complete problems. Science 268, 542–545 (1995)

    Article  Google Scholar 

  9. Boneh, D., Dunworth, C., Lipton, R.: Breaking DES using a molecular Computer, pp. 37–65. American Mathematical Society (1995)

    Google Scholar 

  10. Celland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399, 533–534 (1999)

    Article  Google Scholar 

  11. Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In: IEEE 3rd International Conference on Bio-Inspired Computing: Theories and Applications (BICTA 2008), Adelaid, SA, Australia, pp. 37–42 (2008)

    Google Scholar 

  12. Naveen, J.K., Karthigaikumar, P., Sivamangai, N.M., Sandhya, R., Asok, S.B.: Hardware Implementation of DNA Based Cryptography. In: IEEE Conference on Information and Communication Technologies, ICT, pp. 696–700 (2013)

    Google Scholar 

  13. Katayangi, K., Murakami, Y.: A new product-sum public-key cryptosystem using message extension. IEICE Transactions on Fundamentals E84-A(I0), 2482–2487 (2001)

    Google Scholar 

  14. Zhang, Q., Guo, L., Xue, X., Wei, X.: An Image Encryption Algorithm Based on DNA Sequenc Addition Operation. In: 4th International Conference on Bio-Inspired Computing, BICTA, pp. 75–79 (2009)

    Google Scholar 

  15. Torana, O., Borda, M.: 8th International Conference on Communications (COMM), pp. 451–456. IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gadang Madhulika .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Madhulika, G., Rao, C.S. (2015). Generating Digital Signature Using DNA Coding. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12012-6_3

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12011-9

  • Online ISBN: 978-3-319-12012-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics