Alphabetic Cryptography: Securing Communication Over Cloud Platform

  • Sanjeev K. CowlessurEmail author
  • B. Annappa
  • M. V. Manoj Kumar
  • Likewin Thomas
  • M. M. Sneha
  • B. H. Puneetha
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 863)


This paper introduces alphabetic cryptography inspired by bidirectional DNA encryption algorithm. Alphabetic cryptography first offers higher randomization and secure communication over the cloud computing platform, and second supports the exchange of complete UNICODE character set. Alphabetic cryptography has been implemented on mobile and desktop platforms. Through experimental studies, it has been observed that randomness of encryption increases exponentially with the increase in the number of alphabets of the alphabetic encryption scheme.


Data security issues Bidirectional DNA encryption algorithm Alphabetic cryptography Alphabetic digital coding Socket programming 


  1. 1.
    Hojabri, M., Heidari, M.: Union of RSA algorithm, digital signature and KERBEROS in cloud security. In: International Conference on Software Technology and Computer Engineering, pp. 978–993 (2012)Google Scholar
  2. 2.
    Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall Professional Technical Reference (2003)Google Scholar
  3. 3.
    Rewagad, P., Pawar, Y.: Use of digital signature with Diffie-Hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 437–439 (2013)Google Scholar
  4. 4.
    Diffie, W., Hellman, M.E.: Privacy and authentication: an introduction to cryptography. Proc. IEEE 67(3), 397–427 (1979)CrossRefGoogle Scholar
  5. 5.
    Rescorla, E.: Diffie-Hellman Key Agreement Method, RFC 2631. IETF Network Working Group (1999)Google Scholar
  6. 6.
    Xiao, G., Mingxin, L., Lei, Q., Xuejia, L.: New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51(12), 1413–1420 (2006)MathSciNetzbMATHGoogle Scholar
  7. 7.
    Goyat, S., Jain, S.: A secure cryptographic cloud communication using DNA cryptographic technique. In: IEEE International Conference on Inventive Computation Technologies (ICICT), vol. 3, pp. 1–8 (2016)Google Scholar
  8. 8.
    Pragaladan, R., Sathappan, S.: High confidential data storage using DNA structure for cloud environment. In: IEEE International Conference on Computation System and Information Technology for Sustainable Solutions, pp. 382–387 (2016)Google Scholar
  9. 9.
    Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656–715 (1949)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Zapata, B. C.: Android Studio Application Development. Packt Publishing Ltd, UK (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Sanjeev K. Cowlessur
    • 1
    Email author
  • B. Annappa
    • 2
  • M. V. Manoj Kumar
    • 3
  • Likewin Thomas
    • 4
  • M. M. Sneha
    • 3
  • B. H. Puneetha
    • 4
  1. 1.Department of Software EngineeringUniversité des MascareignesPamplemoussesMauritius
  2. 2.Department of Computer Science and EngineeringNational Institute of Technology KarnatakaSurathkalIndia
  3. 3.Department of Information Science and EngineeringNITTE Meenakshi Institute of TechnologyYelahankaIndia
  4. 4.Department of Computer Science and EngineeringP.E.S. Institute of Technology and ManagementShivamoggaIndia

Personalised recommendations