Cargando…

Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach

DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to...

Descripción completa

Detalles Bibliográficos
Autores principales: Mukherjee, Pratyusa, Garg, Hitendra, Pradhan, Chittaranjan, Ghosh, Soumik, Chowdhury, Subrata, Srivastava, Gautam
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9573340/
https://www.ncbi.nlm.nih.gov/pubmed/36236428
http://dx.doi.org/10.3390/s22197332
_version_ 1784810844959277056
author Mukherjee, Pratyusa
Garg, Hitendra
Pradhan, Chittaranjan
Ghosh, Soumik
Chowdhury, Subrata
Srivastava, Gautam
author_facet Mukherjee, Pratyusa
Garg, Hitendra
Pradhan, Chittaranjan
Ghosh, Soumik
Chowdhury, Subrata
Srivastava, Gautam
author_sort Mukherjee, Pratyusa
collection PubMed
description DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of the keys are rendered weak as they are prone to intrusions. This paper proposes a Genetic Algorithm inspired method to strengthen weak keys obtained from Random DNA-based Key Generators instead of completely discarding them. Fitness functions and the application of genetic operators have been chosen and modified to suit DNA cryptography fundamentals in contrast to fitness functions for traditional cryptographic schemes. The crossover and mutation rates are reducing with each new population as more keys are passing fitness tests and need not be strengthened. Moreover, with the increasing size of the initial key population, the key space is getting highly exhaustive and less prone to Brute Force attacks. The paper demonstrates that out of an initial 25 × 25 population of DNA Keys, 14 keys are rendered weak. Complete results and calculations of how each weak key can be strengthened by generating 4 new populations are illustrated. The analysis of the proposed scheme for different initial populations shows that a maximum of 8 new populations has to be generated to strengthen all 500 weak keys of a 500 × 500 initial population.
format Online
Article
Text
id pubmed-9573340
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-95733402022-10-17 Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach Mukherjee, Pratyusa Garg, Hitendra Pradhan, Chittaranjan Ghosh, Soumik Chowdhury, Subrata Srivastava, Gautam Sensors (Basel) Article DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of the keys are rendered weak as they are prone to intrusions. This paper proposes a Genetic Algorithm inspired method to strengthen weak keys obtained from Random DNA-based Key Generators instead of completely discarding them. Fitness functions and the application of genetic operators have been chosen and modified to suit DNA cryptography fundamentals in contrast to fitness functions for traditional cryptographic schemes. The crossover and mutation rates are reducing with each new population as more keys are passing fitness tests and need not be strengthened. Moreover, with the increasing size of the initial key population, the key space is getting highly exhaustive and less prone to Brute Force attacks. The paper demonstrates that out of an initial 25 × 25 population of DNA Keys, 14 keys are rendered weak. Complete results and calculations of how each weak key can be strengthened by generating 4 new populations are illustrated. The analysis of the proposed scheme for different initial populations shows that a maximum of 8 new populations has to be generated to strengthen all 500 weak keys of a 500 × 500 initial population. MDPI 2022-09-27 /pmc/articles/PMC9573340/ /pubmed/36236428 http://dx.doi.org/10.3390/s22197332 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Mukherjee, Pratyusa
Garg, Hitendra
Pradhan, Chittaranjan
Ghosh, Soumik
Chowdhury, Subrata
Srivastava, Gautam
Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
title Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
title_full Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
title_fullStr Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
title_full_unstemmed Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
title_short Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
title_sort best fit dna-based cryptographic keys: the genetic algorithm approach
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9573340/
https://www.ncbi.nlm.nih.gov/pubmed/36236428
http://dx.doi.org/10.3390/s22197332
work_keys_str_mv AT mukherjeepratyusa bestfitdnabasedcryptographickeysthegeneticalgorithmapproach
AT garghitendra bestfitdnabasedcryptographickeysthegeneticalgorithmapproach
AT pradhanchittaranjan bestfitdnabasedcryptographickeysthegeneticalgorithmapproach
AT ghoshsoumik bestfitdnabasedcryptographickeysthegeneticalgorithmapproach
AT chowdhurysubrata bestfitdnabasedcryptographickeysthegeneticalgorithmapproach
AT srivastavagautam bestfitdnabasedcryptographickeysthegeneticalgorithmapproach