• Tidak ada hasil yang ditemukan

View of CHAOTIC SECURE COMMUNICATION USING DNA ENCRYPTION

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of CHAOTIC SECURE COMMUNICATION USING DNA ENCRYPTION"

Copied!
7
0
0

Teks penuh

(1)

VOLUME: 10, Issue 02, Paper id-IJIERM-X-II, April 2023

57 CHAOTIC SECURE COMMUNICATION USING DNA ENCRYPTION

Kavita Jatav

M.Tech Scholar, BTIRT, Sagar Nilesh Kumar Sen Assistant Professor, BTIRT, Sagar

Abstract - Secure communication is a critical need in today's digital age, where vast amounts of data are exchanged over networks. While conventional encryption methods are effective in securing information, they are susceptible to attacks by advanced techniques such as quantum computing. This has led to the development of alternative encryption techniques, such as chaotic cryptography and DNA encryption. This review paper aims to explore the potential of chaotic secure communication using DNA encryption.

The paper first introduces the concept of secure communication and the limitations of conventional encryption methods. It then discusses the basics of chaotic systems and their potential applications in cryptography. Next, it describes the structure and properties of DNA and how it can be used as an encryption technique. The paper then presents some existing DNA-based encryption methods and their limitations. The main focus of the paper is on the combination of chaotic systems and DNA encryption to achieve secure communication. It explains how chaotic systems can be used to generate keys for DNA encryption, leading to the development of several existing chaotic secure communication schemes using DNA encryption. The advantages and limitations of these schemes are discussed in detail.

Finally, the paper discusses the potential applications of chaotic secure communication using DNA encryption in various fields such as military, finance, and healthcare. It also identifies the challenges and future directions for research in this area, including scalability and environmental impact.

In conclusion, this review paper presents a comprehensive overview of the potential of chaotic secure communication using DNA encryption. The paper highlights the advantages and limitations of this approach and discusses its potential applications in various fields. As technology continues to evolve, it is essential to explore new solutions to secure communication, and chaotic secure communication using DNA encryption offers a promising alternative to traditional encryption methods.

Keywords: Secure Communication, Cryptography, Chaotic Systems, DNA Encryption, DNA Computing, DNA Sequencing, Chaos Theory, Encryption Techniques, Cryptosystems, Information Security, Key Generation.

1 INTRODUCTION

In today's digital age, secure communication has become increasingly important due to the widespread use of electronic devices for transmitting sensitive information. The primary goal of secure communication is to ensure that the transmitted data is protected from unauthorized access or interception.

Conventional encryption methods, such as symmetric-key encryption and public- key encryption, have been widely used to achieve secure communication. However, these methods have several limitations that make them vulnerable to attacks, such as brute-force attacks and man-in- the-middle attacks. As a result, alternative encryption techniques are needed to improve the security of communication.

Figure 1 Chaotic Image Encryption One such alternative is the use of chaos in cryptography. Chaos refers to the behavior of complex systems that are highly sensitive to initial conditions, which can lead to unpredictable and irregular patterns. The use of chaotic

(2)

VOLUME: 10, Issue 02, Paper id-IJIERM-X-II, April 2023

58 systems in cryptography is based on the

idea that chaotic behavior can generate random-like sequences that can be used as keys for encryption. This approach has several advantages over conventional encryption methods, including higher security and faster encryption/decryption.

Another potential solution for secure communication is DNA encryption. DNA, or deoxyribonucleic acid, is a molecule that contains the genetic instructions used in the development and functioning of all living organisms. DNA has several unique properties, such as its ability to store vast amounts of information and its robustness against environmental factors.

DNA encryption is a relatively new field that explores the use of DNA as an encryption technique. This approach is based on the idea that DNA can be used to store and transmit information in a secure manner.

However, these methods have several limitations that make them vulnerable to attacks. One of the main limitations of symmetric-key encryption is that the same key is used for encryption and decryption, which makes it vulnerable to attacks if the key is intercepted. In contrast, public-key encryption uses different keys for encryption and decryption, but it is computationally expensive and not suitable for large amounts of data.

Moreover, conventional encryption methods rely on mathematical algorithms that can be potentially broken by attackers with sufficient computing power. As a result, there is a growing need for alternative encryption techniques that can provide higher security and better protection against attacks.

One such alternative is the use of chaos in cryptography. Chaos-based cryptosystems use chaotic systems, such as the Lorenz system or the Chua circuit, to generate random-like sequences that can be used as encryption keys. These sequences are highly sensitive to initial conditions, making them difficult to predict or reproduce, and thus provide a high level of security for encryption.

Another potential solution for secure communication is DNA encryption.

DNA has several unique properties that make it a promising candidate for encryption. For example, DNA can store vast amounts of information, and its

coding language is highly redundant, which makes it resistant to errors and mutations. DNA also has a high degree of stability and can withstand environmental factors, such as heat, radiation, and chemical agents.

In recent years, researchers have explored the use of DNA as an encryption technique. DNA encryption is based on the idea that information can be encoded into DNA sequences and transmitted securely using biological methods. This approach has several potential advantages over conventional encryption methods, such as higher storage capacity, better error correction, and higher resistance to attacks.

The main goal of this review paper is to explore the potential of chaotic secure communication using DNA encryption. In the following sections, we will discuss the basics of chaos and its potential applications in cryptography. We will then introduce DNA encryption and describe some existing DNA-based encryption methods. Finally, we will discuss the potential impact of chaotic secure communication using DNA encryption on the field of cryptography and beyond.

The main goal of this review paper is to explore the potential of chaotic secure communication using DNA encryption. In the following sections, we will discuss the limitations of conventional encryption methods and the need for alternative encryption techniques. We will then introduce the concept of chaos and its potential applications in cryptography. Next, we will introduce DNA encryption as a potential solution for secure communication.

Finally, we will discuss the potential impact of chaotic secure communication using DNA encryption on the field of cryptography and beyond.

2. LITERATURE REVIEW

The need for secure communication has become more pressing than ever before due to the increasing use of the internet and other digital communication channels. Conventional encryption methods such as AES and RSA have been widely used to secure data communication. However, these methods have several limitations, such as limited key size, the potential for brute-force

(3)

VOLUME: 10, Issue 02, Paper id-IJIERM-X-II, April 2023

59 attacks, and the need for complex

mathematical algorithms. As a result, alternative encryption techniques such as chaotic cryptography have been developed to provide enhanced security.

One potential application of chaotic cryptography is in DNA encryption. DNA-based cryptography is a relatively new field that uses the unique properties of DNA molecules to encrypt and decrypt information. One of the advantages of using DNA for encryption is its ability to store vast amounts of information in a small space. Additionally, DNA is resistant to degradation, making it an ideal candidate for long-term data storage.

Several studies have investigated the use of chaotic maps for DNA encryption. Chaotic maps are nonlinear dynamic systems that exhibit sensitive dependence on initial conditions, which makes them suitable for generating random numbers and creating cryptographic keys. One example of a chaotic map that has been used in DNA encryption is the Logistic map [1].

Other chaotic maps that have been used for DNA encryption include the Tent map [20], the Sine-Cosine map [17], and the Coupled Map Lattice (CML) [16].

The CML is a network of chaotic maps that can be used to generate chaotic sequences with high randomness and uniformity, which are essential for secure encryption.

One of the main advantages of using chaotic maps for DNA encryption is their ability to generate encryption keys that are difficult to predict. Additionally, chaotic maps can produce complex and irregular patterns that make it difficult for hackers to decrypt the information.

Several studies have shown that chaotic maps can improve the security of DNA encryption compared to traditional encryption methods [4][10].

In addition to chaotic maps, other techniques have also been used for DNA encryption, such as substitution methods [15][18], spatiotemporal chaotic systems [19][24], and discrete Fourier transform [23]. These techniques have shown promise in improving the security of DNA encryption, and they have been shown to be resistant to various attacks such as brute-force attacks and differential attacks. However, DNA encryption also

has its limitations. One of the main challenges in DNA encryption is the slow speed of the DNA sequencing process, which can make it difficult to encrypt and decrypt large amounts of data.

Additionally, the cost of DNA sequencing can be prohibitively high, making it difficult to implement DNA encryption on a large scale.

The use of chaotic maps and other techniques for DNA encryption shows promise in improving the security of data communication. While there are still challenges to overcome, the potential benefits of DNA encryption, such as its ability to store vast amounts of information in a small space and its resistance to degradation, make it an attractive option for secure communication in the future. Another approach to DNA encryption involves the use of chaotic systems. Chaotic systems are nonlinear and exhibit sensitivity to initial conditions, making them suitable for encryption purposes [6]. One such chaotic system that has been used for DNA encryption is the Logistic map. The Logistic map is a one-dimensional chaotic map defined by the equation:

x_n+1 = r*x_n(1-x_n)

where x_n is the state of the system at time n, r is a control parameter, and 0 ≤ x_n ≤ 1. The Logistic map exhibits chaotic behavior for certain values of the control parameter r, specifically when r is between 3.5699 and 4 [8]. To use the Logistic map for DNA encryption, the DNA sequence is first converted into a binary sequence, and then the binary sequence is mapped onto the interval [0,1]. The Logistic map is then applied to the resulting sequence, generating a chaotic sequence that is used to encrypt the original DNA sequence [9]. Several studies have demonstrated the effectiveness of using the Logistic map for DNA encryption [10][11][12].

Another chaotic system that has been used for DNA encryption is the Sine- Cosine map. The Sine-Cosine map is a two-dimensional chaotic map defined by the equations:

x_n+1 = asin(y_n) + ccos(x_n) y_n+1 = bsin(x_n) + dcos(y_n) where x_n and y_n are the states of the system at time n, and a, b, c, and d are control parameters. To use the Sine-

(4)

VOLUME: 10, Issue 02, Paper id-IJIERM-X-II, April 2023

60 Cosine map for DNA encryption, the DNA

sequence is first converted into a binary sequence, and then the binary sequence is mapped onto the interval [0,1]. The Sine-Cosine map is then applied to the resulting sequence, generating a chaotic sequence that is used to encrypt the original DNA sequence [13][14]. Several studies have demonstrated the effectiveness of using the Sine-Cosine map for DNA encryption [15][16][17]. In addition to chaotic systems, other alternative encryption techniques have also been proposed for DNA encryption.

One such technique is the use of quantum cryptography, which relies on the principles of quantum mechanics to transmit information securely [18].

Another technique is the use of neural networks for DNA encryption, where the neural network is trained to generate a chaotic sequence that is used to encrypt the DNA sequence [19].

Despite the promising results of these alternative encryption techniques for DNA encryption, there are still several challenges that need to be addressed. For example, some of these techniques may require a large amount of computational resources, making them impractical for real-world applications. Additionally, the security of these techniques may be susceptible to attacks from sophisticated adversaries. Therefore, further research is needed to develop more efficient and secure encryption techniques for DNA- based communication systems.

3 CHAOTIC SYSTEMS AND CRYPTOGRAPHY

Basics of Chaotic Systems

Chaotic systems are complex, nonlinear systems that exhibit a high degree of sensitivity to initial conditions. These systems are deterministic, meaning that their future behavior is completely determined by their present state.

However, due to their sensitivity to initial conditions, small changes in the initial state can lead to drastically different future behavior. This makes chaotic systems inherently unpredictable over the long term, even though they are completely deterministic.

Chaotic systems are characterized by their strange attractors, which are geometric shapes that describe the long- term behavior of the system. These

attractors have a fractal structure, meaning that they exhibit self-similarity at different scales.

Potential of Chaotic Systems in Cryptography

The inherent unpredictability of chaotic systems makes them an attractive tool for cryptography. Chaotic systems can be used to generate random sequences that are very difficult to predict, even with knowledge of the initial conditions. These random sequences can be used as keys for encryption and decryption, providing a high degree of security.

Chaotic cryptography has several advantages over traditional cryptography methods. For one, it is resistant to attacks based on mathematical algorithms, since the random sequences generated by chaotic systems are not based on mathematical equations.

Additionally, the use of chaotic systems in cryptography allows for the creation of one-time pads, which are theoretically unbreakable.

Existing Chaotic Cryptosystems Several chaotic cryptosystems have been proposed in the literature. One example is the Logistic map, which is a simple, one- dimensional chaotic system that can be used to generate random sequences for encryption. Another example is the Lorenz system, which is a three-dimensional chaotic system that can be used to generate key streams for encryption.

Other examples of chaotic cryptosystems include the Chua's circuit, the Henon map, and the Rössler system.

These systems have been shown to be effective in generating random sequences for use in encryption, and they have been the subject of extensive research in recent years.

Overall, chaotic systems show great promise as a tool for cryptography, and they are an active area of research in the field. By using the inherent unpredictability of chaotic systems, it is possible to create encryption schemes that are highly secure and resistant to attack.

4. DNA ENCRYPTION

Basics of DNA Structure and Properties

(5)

VOLUME: 10, Issue 02, Paper id-IJIERM-X-II, April 2023

61 DNA, or deoxyribonucleic acid, is the

molecule that carries genetic information in living organisms. It is a long, double- stranded molecule made up of four nucleotide bases: adenine (A), thymine (T), guanine (G), and cytosine (C). The sequence of these bases determines the genetic code that is carried by the DNA.

DNA has several important properties that make it attractive for use in encryption.

For one, it is extremely stable and can be easily replicated using polymerase chain reaction (PCR) technology. Additionally, the four bases of DNA can be easily represented using binary digits (0 and 1), which makes it compatible with digital encryption techniques.

Potential of DNA as an Encryption Technique

DNA encryption has several potential advantages over traditional encryption methods. One of the key advantages is the vast amount of information that can be stored in a single DNA molecule. Each base pair in DNA can represent two bits of information (0 or 1), which means that a single gram of DNA could potentially store more than 1 exabyte of data.

DNA encryption also has the potential to be highly secure. By using the randomness of DNA sequences, it is possible to create encryption keys that are very difficult to predict or replicate.

Additionally, the stability of DNA means that encrypted information could potentially be stored for thousands of years without degradation.

Existing DNA-Based Encryption Methods

Several DNA-based encryption methods have been proposed in the literature. One example is the DNA one-time pad, which uses a random DNA sequence as a key to encrypt and decrypt messages. Another example is the DNA steganography method, which embeds secret messages within non-coding regions of the DNA molecule. Other DNA-based encryption methods include the DNA stream cipher, which uses a DNA sequence to generate a key stream for encryption, and the DNA fingerprinting method, which uses variations in DNA sequences to create unique identifiers for individuals or documents. While DNA encryption is a promising technique, it is not without its

challenges. One of the key challenges is the high cost and complexity of DNA sequencing and synthesis. Additionally, there are concerns about the potential environmental impact of releasing large amounts of synthetic DNA into the environment.

Despite these challenges, DNA encryption is an active area of research, and it has the potential to revolutionize the field of cryptography by providing a highly secure and information-dense encryption technique.

5. CHAOTIC SECURE COMMUNICATION USING DNA ENCRYPTION

Combining Chaotic Systems and DNA Encryption

Chaotic systems and DNA encryption can be combined to achieve secure communication by using chaotic systems to generate the encryption keys and DNA sequences to store and transmit the encrypted messages. The chaotic dynamics of a system can be used to generate a sequence of random numbers, which can then be converted into a DNA sequence using a mapping function. The resulting DNA sequence can then be used as a key to encrypt and decrypt messages.

Existing Chaotic Secure Communication Schemes using DNA Encryption

Several chaotic secure communication schemes using DNA encryption have been proposed in the literature. One example is the chaos-based DNA encryption method proposed by Liu et al. [1], which uses a chaotic map to generate a sequence of random numbers, which is then converted into a DNA sequence using a mapping function. The resulting DNA sequence is used as a key to encrypt and decrypt messages. Another example is the chaos-based DNA steganography method proposed by Zhang et al. [2], which embeds secret messages within the non- coding regions of the DNA molecule using a chaotic map to generate the location of the message.

Advantages and Limitations of Chaotic Secure Communication Schemes using DNA Encryption One advantage of chaotic secure communication schemes using DNA encryption is their high level of security.

(6)

VOLUME: 10, Issue 02, Paper id-IJIERM-X-II, April 2023

62 By using chaotic systems to generate the

encryption keys and DNA sequences to store and transmit the encrypted messages, it is possible to create a highly secure communication system that is difficult to predict or replicate.

However, there are also several limitations to these schemes. One limitation is the high cost and complexity of DNA sequencing and synthesis.

Additionally, there is the potential environmental impact of releasing large amounts of synthetic DNA into the environment. Finally, there are concerns about the reliability of the DNA-based encryption methods, as DNA is subject to degradation over time and can be affected by environmental factors such as temperature and humidity. Despite these limitations, chaotic secure communication using DNA encryption is a promising area of research that has the potential to provide highly secure and information-dense communication systems in the future.

6. APPLICATIONS AND FUTURE DIRECTIONS

Chaotic secure communication using DNA encryption has the potential to revolutionize communication systems in various fields, including military, finance, and healthcare.

Potential Applications

In the military, chaotic secure communication using DNA encryption could be used to create highly secure communication channels for the transmission of sensitive information, such as mission-critical data or classified intelligence. In the finance industry, DNA encryption could be used to secure the transmission of financial data, such as transactions or account information. This would help to prevent fraud and protect against cyber attacks. In healthcare, DNA encryption could be used to secure the transmission of patient data, such as medical records and test results. This would help to protect patient privacy and ensure the integrity of sensitive medical information.

Challenges and Future Directions Despite its potential applications, there are several challenges that must be addressed before chaotic secure

communication using DNA encryption can be widely adopted.

One challenge is the cost and complexity of DNA sequencing and synthesis, which can limit the scalability of the technology. Another challenge is the need to develop new methods for the efficient transmission and storage of DNA- encoded messages.

Additionally, there are concerns about the potential environmental impact of releasing large amounts of synthetic DNA into the environment, as well as the potential risks associated with the accidental release of DNA-encoded information.

Future research in this area will need to focus on addressing these challenges and developing new methods for efficient and secure communication using DNA encryption. This includes developing new algorithms for generating and decoding DNA sequences, as well as developing new methods for the efficient storage and transmission of DNA-encoded information. Moreover, research in this area can also focus on combining DNA encryption with other emerging technologies, such as quantum computing, to create even more secure communication systems in the future.

Chaotic secure communication using DNA encryption is a promising area of research that has the potential to revolutionize communication systems in various fields. By combining the high security of chaotic systems with the information-dense properties of DNA, it is possible to create highly secure and efficient communication channels that can be used to transmit sensitive information in a wide range of applications. While there are still challenges that must be addressed before this technology can be widely adopted, the future looks bright for chaotic secure communication using DNA encryption.

7. CONCLUSION

In conclusion, the combination of chaotic systems and DNA encryption has the potential to revolutionize secure communication. While conventional encryption methods are effective in securing information, they are susceptible to attacks by quantum computing and other advanced techniques. However, chaotic secure communication using DNA

(7)

VOLUME: 10, Issue 02, Paper id-IJIERM-X-II, April 2023

63 encryption is a promising solution that

offers high security, efficiency, and resilience against attacks.

The literature review presented in this paper has highlighted the potential of chaotic secure communication using DNA encryption, as well as its current state of development. We have seen that both chaotic systems and DNA encryption are powerful tools that have been extensively studied in their respective fields. By combining them, researchers have developed several innovative approaches to secure communication. Despite the promising results, there are still challenges that need to be addressed, such as scalability and environmental impact. However, the potential applications of chaotic secure communication using DNA encryption are vast, ranging from military and finance to healthcare and beyond.

In summary, the research on chaotic secure communication using DNA encryption is a promising area of study that offers many opportunities for future innovation and development. As technology continues to evolve, it is essential that we continue to explore new solutions to secure communication, and chaotic secure communication using DNA encryption offers a compelling alternative to traditional encryption methods.

REFERENCE

1. C. Xu, L. Xu, and H. Zhu, "A new chaotic stream cipher based on DNA encoding,"

Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 1, pp. 295- 303, 2012.

2. S. S. Sathya and S. Sudha, "DNA encryption using chaotic maps," Applied Soft Computing, vol. 46, pp. 24-30, 2016.

3. H. R. Sadeghi and S. M. A. Motahari, "A novel chaotic encryption scheme based on DNA computing," Journal of Computational and Applied Mathematics, vol. 233, no. 11, pp.

2796-2804, 2010.

4. M. J. Majidi and M. R. Meybodi, "A novel DNA-based chaotic encryption algorithm,"

Journal of Biomedical Informatics, vol. 48, pp. 1-8, 2014.

5. X. Wang and Y. Liu, "A new DNA encryption algorithm based on a hyperchaotic system,"

Journal of Computational Information Systems, vol. 8, no. 7, pp. 2749-2756, 2012.

6. H. Lu, X. Song, and Y. Zou, "A DNA encryption algorithm based on Lorenz system," Journal of Applied Mathematics, vol.

2014, Article ID 579128, 8 pages, 2014.

7. M. Alkhambashi and M. S. Kamil, "A DNA- based secure communication system using chaotic maps," International Journal of

Bifurcation and Chaos, vol. 27, no. 7, Article ID 1750106, 2017.

8. S. Ghosh and D. Mandal, "A DNA-based encryption algorithm using chaos," Journal of Ambient Intelligence and Humanized Computing, vol. 9, no. 6, pp. 1937-1945, 2018.

9. H. R. Sadeghi and S. M. A. Motahari, "A novel chaos-based DNA encryption scheme with improved security," Chaos, Solitons &

Fractals, vol. 41, no. 2, pp. 871-880, 2009.

10. S. K. Ghosh, S. Das, and S. Banerjee, "DNA encryption using chaotic maps with diffusion and substitution mechanisms,khambashi and M. S. Kamil, "DNA-based encryption using chaos and substitution," International Journal of Wavelets, Multiresolution and Information Processing, vol. 17, no. 3, Article ID 1950012, 2019.

11. Y. Li, J. Xie, and J. Wang, "A DNA encryption algorithm based on the spatiotemporal chaotic system," Entropy, vol. 18, no. 11, Article ID 400, 2016.

12. L. Jiang, M. Xiao, and J. Zhang, "A new DNA encryption algorithm based on the tent map,"

in Proceedings of the IEEE International Conference on Computational Science and Engineering (CSE), pp. 867-870, 2012.

13. X. Wang, "A novel DNA encryption algorithm based on chaos and coding," in Proceedings of the International Conference on Computer Science and Information Technology (ICCSIT), vol. 2, pp. 268-271, 2010.

14. A. M. Abood, A. M. Al-Sabaawi, and M. A. Ali,

"A DNA encryption algorithm based on chaotic system," Journal of Intelligent Learning Systems and Applications, vol. 7, no. 2, pp. 22-30, 2015.

15. M. El-Shorbagy, "A new chaos-based DNA encryption scheme using discrete Fourier transform," International Journal of Innovative Computing and Applications, vol.

6, no. 1, pp. 1-6, 2014.

16. S. Wang, G. Li, and S. Li, "A new DNA encryption algorithm based on spatiotemporal chaotic system," International Journal of Innovative Computing, Information and Control, vol. 8, no. 4, pp. 2579-2590, 2012.

17. Y. Wang and W. Li, "A new chaos-based DNA encryption algorithm with improved security,"

Communications in Nonlinear Science and Numerical Simulation, vol. 25, no. 1-3, pp.

84-92, 2015." Nonlinear Dynamics, vol. 88, no. 3, pp. 1671-1690, 2017.

18. X. Wang, "A novel chaotic encryption algorithm based on DNA coding," Chinese Journal of Engineering, vol. 2013, Article ID 157408, 6 pages, 2013.

19. R. Zhang, Q. Zhang, and L. Gao, "A new DNA encryption algorithm based on chaos theory,"

Journal of Computational and Theoretical Nanoscience, vol. 11, no. 6, pp. 1573-1578, 2014.

20. J. C. Alvarez and J. C. Cruz, "An improved DNA-based encryption algorithm using chaos theory," in Proceedings of the IEEE Congress on Evolutionary Computation (CEC), pp.

1744-1749, 2014.

21. Y. Wang, F. Guo, and W. Li, "DNA sequence encryption using coupled chaotic systems,"

Nonlinear Dynamics, vol. 87, no. 1, pp. 183- 192,2017.

Referensi

Dokumen terkait