A novel text and image encryption method based on chaos theory and DNA computing

  title={A novel text and image encryption method based on chaos theory and DNA computing},
  author={M. Babaei},
  journal={Natural Computing},
  • M. Babaei
  • Published 1 March 2013
  • Computer Science
  • Natural Computing
In today’s world, the security of information is associated with valid and reliable encryption algorithms that we have used in our systems. Today, the latest methods for data encryption are based on DNA computing. In this paper, we consider a reliable data encryption algorithm (OTP) which is theoretically unbreakable, but it experiences some disadvantages in its algorithm. These drawbacks have prevented the common use of its scheme in modern cryptosystems. In this research, we include a… 

Color Image Encryption Algorithm Based on Hyper-Chaos and DNA Computing

With the large key space, the proposed scheme can resist any brute force, plaintext and statistical attacks, therefore it is a good fit for the real world applications of the image security.

Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with DNA operations

  • Mirko KoscinaD. Caragata
  • Computer Science, Mathematics
    2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)
  • 2015
AES-128 is most suitable cryptographic algorithm for image encryption, followed by 3DES, which proves that chaos-based cryptosystems with DNA operation do not offer an improvement in comparison of traditional symmetric encryption schemes for the purpose presented in this article.

Cryptanalysis and Improvement of the Hyper-Chaotic Image Encryption Scheme Based on DNA Encoding and Scrambling

A chosen plaintext attack algorithm is proposed that can completely recover plain images without knowing any secure key related information and some suggestions for improving the security and practicability of the reported hyper-chaotic image encryption scheme are presented.

A Robust Image Encryption Method Using Chaotic Skew-Tent Map

In this chapter, chaotic skew-tent map is adapted to encode an image and the values of various test parameters show the power and efficiency of the proposed algorithm, which can be used as a safeguard for sensitive image data and a secure method of image transmission.

Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems

A new image encryption algorithm based on 3D chaotic system and deoxyribonucleic acid (DNA) coding that is very efficient, robust and resistant against brute force attacks and good for the future secure image communication is presented.

A novel image encryption scheme based on DNA sequence operations and chaotic systems

Experimental results and security analyses demonstrate that the proposed scheme not only has good encryption effect, but also is secure enough to resist against the known attacks.

Increasing robustness of data encryption standard by integrating DNA cryptography

The theoretical and experimental analysis show that the proposed DNA- DES method is efficient in computation, storage, and transmission, and the security analysis proves that DNA-DES has high confidential strength against brute-force and cryptanalysis attacks.

An Efficient Image Encryption using DNA Cryptography and Reversible Cellular Automata

This paper has focused on reversible cellular automata technique and DNA cryptographic operations which are used for compressing and encrypting together for an image and is capable of providing security quickly as compared to existing technique.

An image encryption algorithm based on 3-D DNA level permutation and substitution scheme

Simulation results and performance analyses demonstrate that the proposed encryption scheme has large key space, high key sensitivity and may resist against some typical attacks, and it may effectively secure the secret image information.



An encryption algorithm inspired from DNA

A symmetric key bloc cipher algorithm that includes a step that simulates ideas from the processes of transcription and translation and focuses on the application of the fundamental principles of Shannon: Confusion and diffusion is proposed.

New field of cryptography: DNA cryptography

The biological background of DNA cryptography and the principle of DNA computing is introduced, the progress of DNA cryptographic research and several key problems are summarized, and the status, security and application fields ofDNA cryptography with those of traditional cryptography and quantum cryptography are compared.

Effective algorithm to encrypt information based on self-assembly of DNA tiles.

This work proposes a new implementation idea of encrypting algorithm with the fourfold fault tolerance against mismatches than the ordinary DNA XOR operation, and expects that the molecular computation using DNA tiles will enlarge the application possibility of the OTP cryptosystem.

Cryptography with DNA binary strands.

DNA Computing and Its Application to Information Security Field

Some schemes with secret key searching with DNA computing are analyzed and the application of DNA computing in encryption, steganography and authentication is introduced.

DNA cryptography

  • S. PramanikS. Setua
  • Computer Science, Mathematics
    2012 7th International Conference on Electrical and Computer Engineering
  • 2012
A new parallel cryptography technique is proposed using DNA molecular structure, one-time-pad scheme and DNA hybridization technique which certainly minimizes the time complexity.

Cryptographic PRNG Based on Combination of LFSR and Chaotic Logistic Map

The results of NIST’s statistical tests show that the proposed method for generating random numbers has more efficient performance and a novel random sequence generator with longer period and complex architecture is constructed.

Introduction to Secure PRNGs

A list of some requirements for generating a reliable random sequence is discussed and then some PRNG methods which are based on combinational chaotic logistic map are presented.

The One-Time Pad Algorithm - The Simplest and Most Secure Way to Keep Secrets

  • Till Tantau
  • Computer Science, Mathematics
    Algorithms Unplugged
  • 2011
An approach to cryptography, the so-called one-time-pad, which uses the same secret key for encryption and decryption, and a text can be encrypted and decrypted only by someone who knows the secret key.

Improving Middle Square Method RNG Using Chaotic Map

A logistic chaotic map is introduced with its specific features and its improved weaknesses via using these characteristics of the middle square method, and the NIST tests suite are presented, in order to detect the specific characteristics expected from truly random sequences.