IJMSC Vol. 8, No. 4, 8 Oct. 2022

Cover page and Table of Contents: PDF (size: 1010KB)

Full Text (PDF, 1010KB), PP.30-40

Views: 0 Downloads: 0

Text Encryption, DNA Computing, Hyperchaotic System, Students’ Record

Data security has become a significant issue nowadays with the increase of information capacity and its transmission rate. The most common and widely used techniques in the data security fields is cryptography. Cryptography is the process of concealing and transmitting data in an appropriate format, so that only authorized people can access and process it. The main goal of the cryptographic process is protecting data from being hijacked and altered. This paper proposes an algorithm for encrypting data through the use of Deoxyribo Nucleic Acid (DNA) sequence and four-dimensional hyper chaotic system. Whereby, the hyper chaotic system is applied to generate a binary sequence which is later passed to a permutation function for the key generation of the first level encryption. The proposed encryption algorithm includes several intermediate steps, which are binary-coded form and the generation of arbitrary keys. Experimental results were analyzed by calculating encryption time, key generation time, histogram and correlation coefficient entropy. Furthermore, the proposed text encryption algorithm is implemented on two different students’ datasets to improve the security of educational systems. Finally, experimental and comparative studies have shown that, the proposed encryption algorithm reported a uniform encrypted text distribution and correlation coefficient values nearer to ‘0’, which are close to the theoretical optimal value.

Ghada Yousef, Gaber A. Elsharawy, Amany A. Naim, Heba F. Eid, " A 4-D HyperChaotic DNA Encryption/Decryption Algorithm for Securing Students Data System", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.8, No.4, pp. 30-40, 2022. DOI: 10.5815/ijmsc.2022.04.03

[1]H. Yang, R. Zeng, G. Xu, and L. Zhang, "A network security situation assessment method based on adversarial deep learning," Applied Soft Computing 102, p. 107096, 2021.

[2]K. Roshan, A. Zafar "Deep Learning Approaches for Anomaly and Intrusion Detection in Computer Network: A Review," Cyber Security and Digital Forensics, pp. 551-563, 2022.

[3]P. Zorić, M. Musa, and TM. Kuljanić, “Use of Probabilistic Risk Assessment Methodology for Providers of Services in a Virtual Environment," Sustainable Management of Manufacturing Systems in Industry 4.0, pp. 129-142, 2022.

[4]X. Zhu, "Self-organized network management and computing of intelligent solutions to information security," Journal of Organizational and End User Computing (JOEUC) 33, no. 6, pp. 1-16, 2021.

[5]Rohit Verma, Jyoti Dhiman, "Implementation of Improved Cryptography Algorithm", International Journal of Information Technology and Computer Science(IJITCS), Vol.14, No.2, pp.45-53, 2022. DOI: 10.5815/ijitcs.2022.02.04

[6]Zuhi Subedar, Ashwini Araballi. "Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication ", International Journal of Mathematical Sciences and Computing (IJMSC), Vol.6, No.4, pp.35-41, 2020. DOI: 10.5815/ijMSC.2020.04.04

[7]Shaymaa Fahmee Alqazzaz, Gaber A. Elsharawy, Heba F. Eid, "Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption", International Journal of Computer Network and Information Security(IJCNIS), Vol.14, No.2, pp.67- 76, 2022. DOI: 10.5815/ijcnis.2022.02.06

[8]A. I. Mohammed, O. A. Abisoye, J. A. Ojeniyi, and A . B. Sulaimon. "A Review of DNA Cryptograhic Approaches," In 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), IEEE, pp. 66-72, 2021.

[9]B. M. Kumar, B. R. Sri, G. Katamaraju, P. Rani, N.Harinadh , and C. Saibabu,” File encryption and decryption using DNA technology.” In2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp. 382-385, 2020.

[10]S. G. Lian, A bloc cipher based on chaotic neural networks, Neuro computing 72 (4) (2009) 1296–1301.

[11]B. Wang, Q. Zhang, X. Wei, Tabu variable neighborhood search for designing dna barcodes, IEEE Trans. NanoBiosci 19 (2020) 127–131.

[12]X. Li, B. Wang, H. Lv, Q. Yin, Q. Zhang, X. Wei, Constraining dna sequences with a triplet-bases unpaired, IEEE Trans. NanoBiosci 19(2020) 299–307.

[13]X. Li, L. Zhang, and Y. Hu, “A novel generation key scheme based on DNA,” in 2008 International Conference on Computational Intelligence and Security, 2008, vol. 1, pp. 264–266.

[14]B. Roy, G. Rakshit, P. Singha, A. Majumder, and D. Datta, “An improved Symmetric key cryptography with DNA based strong cipher,” in 2011 International Conference on Devices and Communications (ICDeCom), 2011, pp. 1–5.

[15]Y. Zhang, B. Fu, and X. Zhang, “DNA cryptography based on DNA Fragment assembly,” in 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012), 2012, vol. 1, pp. 179–182.

[16]K. S. Sajisha, and M. Sheena. "An encryption based on DNA cryptography and steganography," In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 2, pp. 162-167. IEEE, 2017.

[17]M. Sabry, M. Hashem, T. Nazmy, and M. E. Khalifa. "Design of DNA-based advanced encryption standard (AES)," In 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 390-397. IEEE, 2015.

[18]N. A. Al-Romema, A. S. Mashat, and I. AlBidewi. "New chaos-based image encryption scheme for RGB components of color image," Computer Science and Engineering 2, no. 5, pp. 77-85, 2012.

[19]J. Vahidi, M. Gorji, and I. Mazandaran. "The confusion-diffusion image encryption algorithm with dynamical compound chaos," Journal of Mathematics and Computer Science (JMCS), pp. 451-457, 2014.

[20]Adleman LM. “Molecular computation of solutions to combinatorial problems”. Science, JSTOR,1994;266:1021–4

[21]S. S. Roy, S. A. Shahriyar, M. Asaf-Uddowla, K. M. Alam, and Y. Morimoto, "A Novel Encryption Model for Text Messages using Delayed Chaotic Neural Network and DNA Cryptography", International Conference of Computer and Information Technology (ICCIT), pp.22-24,2017.

[22]E. Vidhya, R. Rathipriya, “Two Level Text Data Encryption using DNA Cryptography, ” International Journal of Computational Intelligence and Informatics , Vol 8, No.3, December 2018.

[23]Y. Y. Ahmed, H. A. Haider, “TEXT ENCRYPTION AND DECRYPTION USING FIVE LEVELS DNA BASED ALGORITHM,” International Journal of Advanced Science and Technology, Volume 29, pp. 104-108, , January 2020.

[24]S. A. Mehdi, Z. L. Ali . "A New Six-Dimensional Hyper-Chaotic System." In 2019 International Engineering Conference (IEC), IEEE, pp.211-215, 2019.

[25]H. A. Qasim. "Text Encryption Method Using multi Hyperchaotic systems," Al-Qadisiyah Journal of Pure Science 26.3, pp. 1-8, 2021.

[26]K. R. Radhika and M. K. Nalini. "Biometric image encryption using DNA sequences and chaotic systems," In 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), pp.164-168, 2017.

[27]L. Zeng and R. R. Liu. "Cryptanalyzing a novel couple images encryption algorithm based on DNA subsequence operation and chaotic system," Optik 126, pp. 5022-5025, 2015.

[28]Y. Zhang, D. Xiao, W. Wen, and M. Li. "Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process." Nonlinear Dynamics 76, no. 3, 2014, pp. 1645-1650.

[29]P. Patil, R. Bansode. "Performance Evaluation of Hybrid Cryptography Algorithm for Secure Sharing of Text Images," International Research Journal of Engineering and Technology (IRJET), pp. 3773-3778, 2020.

[30]S. J. Sheela, K. V. Suresh, D. Tandur. “Secured text communication using chaotic maps,” In2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), IEEE, pp.1-6, 2017.

[31]Babaei, M.. A novel text and image encryption method based on chaos theory and DNA computing. Natural computing, 12(1), 101-107, 2013.

[32]Yalmaz N., Sekeroglu B, “Student Performance Classification Using Artificial Intelligence Techniques”. In: 10th International Conference on Theory and Application of Soft Computing, Computing with Words and Perceptions - ICSCCW, 2020.

[33]P. Cortez and A. Silva. Using Data Mining to Predict Secondary School Student Performance. In A. Brito and J. Teixeira Eds., Proceedings of 5th FUture BUsiness TEChnology Conference (FUBUTEC 2008) pp. 5-12, Porto, Portugal, April, 2008.