Cargando…
Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9573340/ https://www.ncbi.nlm.nih.gov/pubmed/36236428 http://dx.doi.org/10.3390/s22197332 |
_version_ | 1784810844959277056 |
---|---|
author | Mukherjee, Pratyusa Garg, Hitendra Pradhan, Chittaranjan Ghosh, Soumik Chowdhury, Subrata Srivastava, Gautam |
author_facet | Mukherjee, Pratyusa Garg, Hitendra Pradhan, Chittaranjan Ghosh, Soumik Chowdhury, Subrata Srivastava, Gautam |
author_sort | Mukherjee, Pratyusa |
collection | PubMed |
description | DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of the keys are rendered weak as they are prone to intrusions. This paper proposes a Genetic Algorithm inspired method to strengthen weak keys obtained from Random DNA-based Key Generators instead of completely discarding them. Fitness functions and the application of genetic operators have been chosen and modified to suit DNA cryptography fundamentals in contrast to fitness functions for traditional cryptographic schemes. The crossover and mutation rates are reducing with each new population as more keys are passing fitness tests and need not be strengthened. Moreover, with the increasing size of the initial key population, the key space is getting highly exhaustive and less prone to Brute Force attacks. The paper demonstrates that out of an initial 25 × 25 population of DNA Keys, 14 keys are rendered weak. Complete results and calculations of how each weak key can be strengthened by generating 4 new populations are illustrated. The analysis of the proposed scheme for different initial populations shows that a maximum of 8 new populations has to be generated to strengthen all 500 weak keys of a 500 × 500 initial population. |
format | Online Article Text |
id | pubmed-9573340 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-95733402022-10-17 Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach Mukherjee, Pratyusa Garg, Hitendra Pradhan, Chittaranjan Ghosh, Soumik Chowdhury, Subrata Srivastava, Gautam Sensors (Basel) Article DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of the keys are rendered weak as they are prone to intrusions. This paper proposes a Genetic Algorithm inspired method to strengthen weak keys obtained from Random DNA-based Key Generators instead of completely discarding them. Fitness functions and the application of genetic operators have been chosen and modified to suit DNA cryptography fundamentals in contrast to fitness functions for traditional cryptographic schemes. The crossover and mutation rates are reducing with each new population as more keys are passing fitness tests and need not be strengthened. Moreover, with the increasing size of the initial key population, the key space is getting highly exhaustive and less prone to Brute Force attacks. The paper demonstrates that out of an initial 25 × 25 population of DNA Keys, 14 keys are rendered weak. Complete results and calculations of how each weak key can be strengthened by generating 4 new populations are illustrated. The analysis of the proposed scheme for different initial populations shows that a maximum of 8 new populations has to be generated to strengthen all 500 weak keys of a 500 × 500 initial population. MDPI 2022-09-27 /pmc/articles/PMC9573340/ /pubmed/36236428 http://dx.doi.org/10.3390/s22197332 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Mukherjee, Pratyusa Garg, Hitendra Pradhan, Chittaranjan Ghosh, Soumik Chowdhury, Subrata Srivastava, Gautam Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach |
title | Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach |
title_full | Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach |
title_fullStr | Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach |
title_full_unstemmed | Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach |
title_short | Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach |
title_sort | best fit dna-based cryptographic keys: the genetic algorithm approach |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9573340/ https://www.ncbi.nlm.nih.gov/pubmed/36236428 http://dx.doi.org/10.3390/s22197332 |
work_keys_str_mv | AT mukherjeepratyusa bestfitdnabasedcryptographickeysthegeneticalgorithmapproach AT garghitendra bestfitdnabasedcryptographickeysthegeneticalgorithmapproach AT pradhanchittaranjan bestfitdnabasedcryptographickeysthegeneticalgorithmapproach AT ghoshsoumik bestfitdnabasedcryptographickeysthegeneticalgorithmapproach AT chowdhurysubrata bestfitdnabasedcryptographickeysthegeneticalgorithmapproach AT srivastavagautam bestfitdnabasedcryptographickeysthegeneticalgorithmapproach |