Abstract
Cryptography is not only a science of applying complex mathematics and logic to design strong methods to hide data called as encryption, but also to retrieve the original data back, called decryption. The purpose of cryptography is to transmit a message between a sender and receiver such that an eavesdropper is unable to comprehend it. To accomplish this, not only we need a strong algorithm, but a strong key and a strong concept for encryption and decryption process. We have introduced a concept of DNA Deep Learning Cryptography which is defined as a technique of concealing data in terms of DNA sequence and deep learning. In the cryptographic technique, each alphabet of a letter is converted into a different combination of the four bases, namely; Adenine (A), Cytosine (C), Guanine (G) and Thymine (T), which make up the human deoxyribonucleic acid (DNA). Actual implementations with the DNA don’t exceed laboratory level and are expensive. To bring DNA computing on a digital level, easy and effective algorithms are proposed in this paper. In proposed work we have introduced firstly, a method and its implementation for key generation based on the theory of natural selection using Genetic Algorithm with Needleman-Wunsch (NW) algorithm and Secondly, a method for implementation of encryption and decryption based on DNA computing using biological operations Transcription, Translation, DNA Sequencing and Deep Learning.
Similar content being viewed by others
References
Adleman, L., Molecular computation of solutions to combinatorial problems. Sci. 266:1021–1024, 1994.
Stallings, W., Network security essentials, Prentice Hall, Fourth edition, 2011
Delman, B.,Genetic Algorithms in Cryptography, MS Thesis 2004.
Mislovaty, R., Klein, E., Kanter, I. and Kinzel, W. Security of neural cryptography, Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems, 2004. ICECS 2004, 2004, pp. 219–221.
Anurag Roy and Asoke Nath, “DNA Encryption Algorithms: Scope and Challenges in Symmetric Key Cryptography”, IJIRAE 2016
John H Reif, Michael Hauser, Michael Pirrung and Thomas LaBean, “Application of Biomolecular Computing to Medical Science: A Biomolecular Database System forStorage, Processing & Retrieval of Genetic Information & Material”, Duke University, 2006
Junling Sun, “Sequence Splicing Techniques and Their Applications For Information Encryption”, International Conference on Advanced Mechatronic Systems, Tokyo, Japan, September I S-21, 2012
V. M. M. Shyam, N. Kiran, “A novel encryption scheme based on DNA computing,” In 14th IEEE International Conference, Tia, India, Dec. 2007
Yunpeng Zhang and Liu He Bochen Fu, “Research on DNA Cryptography”, College of Software and Microelectronics, Northwestern Polytechnical University, Xi’an,China
Risca, V.I., DNA-based steganography. Cryptologia, Tylor and Francis. 25(1):37–49, 2001.
Kaur H, Ahmed J, Scaria V, Computational analysis and In-silico predictive modeling for inhibitors of PhoP regulon in S. typhi on high-throughput screening bioassay dataset., Interdisciplinary Sciences: Computational Life Sciences (a Springer SCI Journal),2016.
Kaur, H., Chauhan, R., Wasan, S. K. A Bayesian network model for probability estimation, Encyclopaedia of Information Science and Technology, IGI Global, Third Edition, 1551–1558, 2015.
Kaur, H., Chauhan, R., and Ahmed, Z., Role of data mining in establishing strategic policies for the efficient management of healthcare system–a case study from Washington DC area using retrospective discharge data. BMC Health Services Research. 12(S1):P12, 2012.
Chauhan, R., Kaur, R. Predictive Analytics and Data Mining: A Framework for Optimizing Decisions with R Tool, Advances in Secure Computing, Internet Services, and Applications, Springer, 73–88, 2014.
Kaur, H., Chauhan, R., and Alam, M.A., Spatial Clustering Algorithm using R-tree. Journal of Computing. 3(2):85–90, 2011.
Hermans, M. and Schrauwen, B. Training and analysing deep recurrent neural networks. In C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger, editors, Advances in Neural Information Processing Systems 26, pages 190–198. Curran Associates, Inc., 2013.
Chen, C., Xiang, H., Qiu, T., Wang, C., Zhou, Yang., Chang, V. A rear-end collision prediction scheme based on deep learning in the Internet of Vehicles, Journal of Parallel and Distributed Computing, 2017.
Liao, X., Yin, J., Guo, S., Li, X., & Sangaiah, A. K. (2017). Medical JPEG image steganography based on preserving interblock dependencies. Computers & Electrical Engineering.
Zheng, H. T., Wang, Z., Ma, N., Chen, J., Xiao, X., & Sangaiah, A. K. (2017). Weaklysupervised image captioning based on rich contextual information. Multimedia Tools and Applications, 1–17.
Zhang, R., Shen, J., Wei, F., Li, X., & Sangaiah, A. K. (2017). Medical image classification based on multi-scale non-negative sparse coding. Artificial Intelligence in Medicine.
Diffie, W., and Hellman, M., New directions in cryptography. IEEE Transaction on Information Theory. 22(6):644–654, 1976.
EI Gamal T., A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory. 31(4):469–472, 1985.
Borda M. & Tornea O. DNA secret writing techniques [C]. In COMM(2010), Chengdu: IEEE, June 10-12, 2010: 451–456
Hongjun Liu, Xingyuan Wang and Abdurahman Kadir, “Image encryption using DNA complementary rule and chaotic maps”, ScienceDirect, 2012
Martin JAVUREK and Marcel HARAKAĽ, “Cryptography And Genetic Algorithms”, Science & Military, 2016
Tornea, O., and Borda, M.E., DNA Cryptographic Algorithms, MEDITECH 2009. IFMBE Proceedings. 26:223–226, 2009.
U.Noorul Hussain, T. Chithralekha and A.Naveen Raj, G.Sathish, A.Dharani, “A Hybrid DNA Algorithm for DES using Central Dogma of Molecular Biology (CDMB)”, International Journal of Computer Applications, 2012
K. Li, S. Zou, and J. Xv, Fast parallel molecular algorithms for DNAbased computation: Solving the elliptic curve discrete logarithm problem over gf(2 n), Journal of Biomedicine and Biotechnology, Hindawi., vol. 2008, pp. 1–10, Apr. 2008
Fastest DNA Computer. Science, 2005, 308: 195
Roweis, S., Winfreel, E., Burgoyne, R., et al., A sticker based model for DNA computation. Journal of Computational Biology. 5(4):615–629, 1998.
Tornea, O., and Borda, M.E., DNA Cryptographic Algorithms. IFMBE Proceedings. 26:223–226, 2009.
Goyat, S.: Cryptography Using Genetic Algorithms (GAs). In: IOSR Journal of Computer Engineering (IOSRJCE), 1(5), pp. 06- 08 Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195-197. 2012.
Mishra, S., and Bali, S., Public key cryptography using genetic algorithm. Int. J. Recent Technology and Engineering. 2(2):150–154, 2013.
A. J. Bagnall, “The Applications of Genetic Algorithms in Cryptanalysis”, School of Information Systems, University Of East Anglia, 1996.
Kaur, H., & Tao, X. (Eds.). ICTs and the millennium development goals: A United Nations perspective. New York, Springer, US, 2014.
Kaur H, Lechman E and Marszk A (Eds.), Catalyzing Development through ICT Adoption: The Developing World Experience, Springer Publishers, Switzerland, 2017.
A. Tragha, F. Omary, A. Kriouile, “Genetic Algorithms Inspired Cryptography”, A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises, Series D: Computer Science and Statistics, November 2007.
A.J. Umbarkar and P.D. Sheth, “Crossover Operators In Genetic Algorithms: A Review”, Ictact Journal On Soft Computing, October 2015
Watson J D, Hopkins N H, Roberts J W, et al. Molecular Biology of the Gene. 4th ed. Menlo Park, CA: The Benjamin/Cummings Publishing Co., Inc., 1987
Taylor, C., Risca, V., and Bancroft, C., Hiding messages in DNA microdots. Nature. 399:533–534, 1999.
Needleman, S.B., and Wunsch, C.D., A general method applicable to the search for similarities in the amino acid sequence of two proteins. J. Mol. Biol. 48:443–453, 1970.
Qin Limin. The Study of DNA - Based Encryption Method [D].Zheng Zhou: Zheng Zhou University of Light Industry, 2008.
Zhi-min Zhou and Zhong-wen Chen, “Dynamic Programming for Protein Sequence Alignment”, International Journal of Bio-Science and Bio-Technology Vol. 5, No. 2, April, 2013
Acknowledgements
This research work is catalyzed and supported by National Council for Science and Technology Communications (NCSTC), Department of Science and Technology (DST), Ministry of Science and Technology (Govt. of India) for support and motivation [grant recipient: Dr. Harleen Kaur]. The authors gratefully acknowledge financial support from the Ministry of Science and Technology (Govt. of India), India.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
None.
Additional information
This article is part of the Topical Collection on Image & Signal Processing
Rights and permissions
About this article
Cite this article
Kalsi, S., Kaur, H. & Chang, V. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. J Med Syst 42, 17 (2018). https://doi.org/10.1007/s10916-017-0851-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-017-0851-z