Professional Documents
Culture Documents
Abstract- DNA cryptography is a new promising direction in selection process. Rijndael is a family of ciphers with different
cryptography research that emerged with the progress in DNA key and block sizes. AES has been adopted by the U.S.
computing field. Traditional cryptographic systems have long government and is now used worldwide. It supersedes
legacy and are built on a strong mathematical and theoretical the Data Encryption Standard (DES), which was published in
basis. So, an important perception needs to be developed that the
1977. The algorithm described by AES is a symmetric-key
DNA cryptography is not to negate the tradition, but to create a
algorithm.
bridge between existing and new technology.
Traditional cryptographic systems have long legacy and are
The power of DNA computing will strengthen the existing
security systems by opening up a new possibility of a hybrid built on a strong mathematical and theoretical basis.
cryptographic system. In our work, we are presenting the DNA Traditional security systems like RSA, DES or NTRU are also
based design and implementation to "Advanced Encryption found in real time operations. So, an important perception
Standard" [AES]. We built our algorithm with all its needs to be developed that the DNA cryptography is not to
specifications (data, algorithms operations and used functions) on negate the tradition, but to create a bridge between existing
DNA basis instead of bits. This aims at proving the possibility of and new technology. DNA cryptography should be
building such a complex system on DNA basis in a way of making
implemented by using modem biological techniques as tools
it a suitable candidate for implementation in biological
and biological hard problems as main security basis to fully
environment or on DNA computers. Our algorithm kept the
exert the special advantages. The power of DNA computing
same security strength and robustness of the standard algorithm.
will strengthen the existing security systems by opening up a
Keywords- Advanced Encryption standard; AES; DNA; RNA; new possibility of a hybrid cryptographic system.
Cryptography; DNA cryptography; block cipher; symmetric cipher.
From DNA based encryption algorithms proposed, few studies
I. INTRODUCTION have conducted simulating the processes of central Dogma in
With the inspiring advances in the field of DNA cryptography, cryptographic applications. There is a simple cryptographic
multiple theories have been conducted for implementing DNA method based on the same idea [7], and a symmetric
computers which are DNA based and use biological functions encryption DNA-based algorithm called YAEA that was
to implement the desired operations. DNA cryptography is a proposed by Amin et al in [8]. In this research, the binary form
cryptographic field emerged with the research of DNA of data, such as plaintext messages, and images are
computing [1], [2], [3], [4] in which DNA is used as transformed into sequences of DNA nucleotides. Then,
information carrier and the modem biological technology is efficient searching algorithms are used to locate the multiple
used as implementation tool. The high parallelism, exceptional positions of a sequence of four DNA nucleotides that
energy efficiency and extraordinary information density represent the binary octet plaintext character within a Canis
inherent in DNA molecules are explored for cryptographic Familiaris genomic chromosome. Randomly selected pointers
purposes such as encryption, authentication, signature, and so of the four DNA nucleotides for each plain text character are
on. In fact, the tremendous storage capacity of DNA as well as assembled in a file that constitutes the ciphered text. This
the ability to synthesize DNA sequences in any desirable technique can be used to enforce other conventional
length makes DNA a perfect medium for cryptography and cryptographic algorithms.
The Advanced Encryption Standard (AES) specifies a Federal mechanisms of the central dogma of biology, and also presents
Information Processing Standards (FIPS) which approves a symmetric encryption algorithm designed according the
cryptographic algorithm that can be used to protect electronic recommendations of experts in cryptography [10] and
data. The AES algorithm is a symmetric block cipher that can containing a part called DNA module that simulates critical
encrypt (encipher) and decrypt (decipher) information [5], [6]. processes of the central dogma in order to enhance its security.
AES is based on the Rijndael cipher developed by Recently in 2013, Jun Peng, Shangzhu, Jin Hiang Lei and Qia
two Belgian cryptographers, Joan Daemen and Vincent Han proposed an encryption algorithm with a 192-bit key by
Rijmen, who submitted a proposal to NIST during the AES utilizing the hyper chaotic system and combination with DNA
390
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS'15)
complementary rule [11]. Author uses the Arnold cat map for II. AES DESIGN
obtaining the better confusion, and then it is encoded into
AES is based on a design principle known as a substitution
DNA image. After that, each nucleotide of DNA image is
permutation network, and is fast in both software and
transformed into its base pair by means of the complementary
hardware. Unlike its predecessor DES, AES does not use a
rule and XORED with a hyper-chaotic binary sequence.
Feistel network. AES is a variant of Rijndael which has a
Other DNA cryptographic approaches involved the use of fixed block size of 128 bits, and a key size of 128, 192, or 256
AES like DNA-Crypt approach proposed by Heider and bits. By contrast, the Rijndael specification per se is specified
Bamekow [12] that combines and extends the steganographic with block and key sizes that may be any multiple of 32 bits,
and cryptographic methodologies proposed by Wong et al. both with a minimum of 128 and a maximum of 256 bits
[13] and Arita and Ohashi [14]. DNA-Crypt encodes [5], [6].
information using a substitution cipher and two types of error
AES operates on a 4x4 column-major order matrix of bytes,
correcting codes, namely, Hamming and WDH [15]. DNA
termed the state, although some versions of Rijndael have a
Crypt incorporates a fuzzy controller and powerful
larger block size and have additional columns in the state.
cryptographic algorithms such as one-time pad, AES,
Most AES calculations are done in a special [mite field.
Blowfish, and RSA.
The key size used for an AES cipher specifies the number of
In 2014, a combination of DNA computing and round-reduced
repetitions of transformation rounds that convert the input,
AES block cipher is proposed by Eman Shehab et al. [16] The
called the plaintext, into the final output, called the ciphertext.
method proved to have high resistance to most of the known
The nwnber of rounds are as follows:
attacks such as exhaustive search, statistical analysis, and
differential analysis concluding that the method achieves high • lO rounds for 128-bit keys.
level of security and fast implementation.
• 12 rounds for 192-bit keys.
Lately on 2015, AI-Wattar et al. proposed an approach for
altering the MixColumns transformation engaged in the AES
• 14 rounds for 256-bit keys.
algorithm [17]. The approach employed methods inspired At each round (Nr), AES has four basic steps for the plaintext
from DNA processes and structure, which relied on the key. to be implemented. AES should implement another step of key
The analyzing of the obtained results showed that, this new expansion to expand the cipher key to the round keys schedule
transformation is more secure, resistance against the attacks, presenting a round key for each round with size equals to the
and will increases the stability of AES against linear and block size. Cipher key is Nb= 128, 192, or 256 bits according
differential cryptanalysis. to each Nr: 10, 12, and 14 respectively. The binary form of
In this paper, we are trying to facilitate the link and interaction plaintext is divided into blocks of Nb bits [STATE] and each
between the fields of DNA computing and digital computing block goes through Nr rounds of encryption.
391
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS'15)
TABLE I. AES SUBSTITUTION S-BOX III. THE PROPOSED DNA-BAESD ADVANCED ENCRYPTION
y STANDARD
0 1 2 3 4 5 6 7 8 9 a b c d e f
8d 4e f4 08
b e7 08 37 6d d5 a9 6c 56 ea 65 7a ae
inputs, outputs, the operations and keys.
0 ba 78 25 2e 10 a6 b4 06 e8 dd 74 If 4b bd 8b 8a
d 70 3e b5 66 48 03 f6 Oe 61 35 57 b9 86 cl Id ge
e el f8 98 11 69 d9 8e 94 9b Ie 87 e9 ce 55 28 df
f 80 al 8' Od bf e6 42 68 41 99 2d Of bO 54 bb 16 A. Inputs and Outputs
The plaintext is to be introduced in the form of block each of
3- Shift Rows: Left Circular shift of each row (0<r<3) 128 bits. Initial key is in lengths 128, 192 or 256 bits. Table 2
with the value of r ,As stream: shift (0,3)=do nothing; is to be used to convert all the inputs to DNA streams. The
shijt( 1,4) = 1; shijt(2,4) = 2 ; shijt(3, 4) = 3, result is input stream of size =64 DNA value-considered one
s s' block ( 128 bit). Key size is 64, 96, or 128 DNA. The
So,O SO SO, SO 3 SO, SO,I SO, S ,3
ciphertext will be of the same size as the plaintext.
,I 2 , O 2 O
Sl,O S} ,1 SI,2 $
1,3 SI,
1
S1,
2
Sr 3
,
SI,
O TABLE IT. DNA AND RNA REPRESENTATION OF BITS (TRUTH TABLE FOR
TWO BITS)
S2 , 0 S }, 1 S2, S2 3 S2, S 3 S},O S2,I
2 , 2 2,
DNA RotWord.
MixColumns ()
DNA SubWord: substitute in the s-box.
s o ,c so
DNA XOR with Rcon.
sO o , SO, 2 SO 3
,
so,o
,c
0. 2
SO,]
392
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS'15)
TABLE TIT. S-Box SAVED IN THE FORM OF DNA STREAMS (TABULAR VIEW )
�
0 1 2 3 4 5 6 7 8 9 . b c d e f
AA AC AG AU CA CC CG CU GA GC GG GU UA UC UG UU
0 AA CGAU CUUA CUCU CUGU UUAG CGGU CGUU UACC AUAA AAAC CGCU AGGU UUUG UCCU GGGU CUCG
1 AC UAGG GAAG UAGC CUUC UUGG CCGC CACU UUAA GGUC UCCA GGAG GGUU GCUA GGCA CUAG UAAA
2 AG GUCU UUUC GCAU AGCG AUCG AUUU UUCU UAUA AUCA GGCC UGCC UUAC CUAC UeGA AUAC ACCC
3 AU AACA UACU AGAU UAAU ACGA GCCG AACC GCGG AACU ACAG GAAA UGAG UGGU AGCU GUAG CUCC
4 CA AAGC GAAU AGUA ACGG ACGU CGUG CCGG GGAA CCAG AUGU UCCG GUAU AGGC UGAU AGUU GACA
5 CC CCAU UCAC AAAA UGUC AGAA UUUA GUAC CCGU CGGG UAGU GUUG AUGC CAGG CAUA CCGA UAUU
6 CG UCAA UGUU GGGG UUGU CAAU CAUC AUAU GACC CACC UUGC AAAG cuuu CCAA AUUA GCUU GGGA
7 CU CCAC GGAU CAAA GAUU GCAG GCUC AUGA UUCC GUUA GUCG UCGG AGAC ACAA UUUU UUAU UCAG
8 GA UAUC AAUA ACAU UGUA CCUU GCCU CACA ACCU UACA GGCU CUUG AUUC CGCA CCUC ACGC CUAU
9 GC CGAA GAAC CAUU UCUA AGAG AGGG GCAA GAGA CACG UGUG GUGA ACCA UCUG CCUG AAGU UCGU
. GG UGAA AUAG AUGG AAGG CAGC AACG AGCA CCUA UAAG UCAU GGUA CGAG GCAC GCCC UGCA CUGC
b GU UGCU UAGA AUCU CGUC GAUC UCCC CAUG GGGC CGUA CCCG UUCA UGGG CGCC CUGG GGUG AAGA
c UA GUGG CUGA AGCC AGUG ACUA GGCG GUCA UACG UGGA UCUC CUCA ACUU CAGU GUUC GAGU GAGG
d UC CUAA AUUG GUCC CGCG CAGA AAAU UUCG AAUG CGAC AUCC CCCU GUGC GACG UAAC ACUC GCUG
e UG UGAC UUGA GCGA ACAC CGGC UCGC GAUG GCCA GCGU ACUG GACU UGGC UAUG CCCC AGGA UCUU
f UU GAUA GGAC GAGC AAUC GUUU UGCG CAAG CGGA CAAC GCGC AGUC AAUU GUAA CCCA GUGU ACCG
Substitution to reach the right output includes two rows and 2 DNA for columns). Each row is saved as
sub operations: a stream of DNA named according to the row
1- Finding the right DNA stream (row) which is number from AA to TT ( 16 values). Parallel search
one of 16 streams. which is available in DNA computers is used to reach
2- Finding the right sequence in this stream the right row. Suppose the pointer is on the right row,
(column). now we will read the other 2 DNA characters to find
We have the input in the form of 4 DNA characters the right column through the following rules:
which act as key for search (divided into 2 DNA for
393
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS'15)
TABLE IV. RULES FOR SEARCHING A SPECIFIC STREAM IN THE S-TABLE. Take 4 by 4 DNA from input
Search the s-box streams (as explained in the
DNA Move Action if First Move Action if Second previous section)
input character character Return an output 4 DNA
Collect all outputs to give 16 DNA
A Do nothing Do nothing
p riva t e v o id f_sen_RCon ()
{
RCon = ne'.... string[NRound s + 1 ] ..;.
Ilfor ( i n t i =' 0;i <NRound s ;:i ++ )
·"AAA.C AAAA. AAAA. AAAA.' • ..:. //91
The table above explains the steps to be taken with RCon[1.]
RCon[2] •• AAAG AAAA. AAAA. AAAA." .;. //92
different inputs included in the first and second DNA RCon[3] "AACA AAAA. AAAA. AAAA,";//04
RCon[4] · ' AA.GA AAAA. AAAA AAAA."..;. //98 0000 1000
characters which are inputs to search the right column. The RCon[5] •• ACAA AAAA. AAAA. AAAA.";. //10' 000001 0000
RCon[6] "AGAA AAAA. AAAA. AAAA.' · ;//20 00010 0000
move action means moving the pointer from the beginning RCon[ 7 ] "CAAA AAAA. AAAA. AAAA.";//40 001000 0009
RCon[8] "GAAA AAAA. AAAA AAAA."..;. //80 1000 0000
of the s-box right row stream. The entry means one value of RCon[9] "ACG'U AAAA. AAAA AAAA,";//1B 0001 1011
the s-box which is equals to 4 DNA. Once the pointer is RCon[1.0] = "AUCG AAAA AAAA. AAAA,o;,//36 '00 011 00119
2- Substitute in S-box:
394
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS'15)
""'."AlMSCMa:
: ::::::
1
ISM(lOI ... a:"" IttMM&lai•• a: �MIIIlMMUN.»M ICX"""'al8lIlitt ltli .... W••• M.O ..r...==...-- size.
11 OI."".«CA .. Each stream is put in the form of STATE. The STATE
«ecMCUUACUI;
consists of 4 streams (rows), each row contains16 DNA. We
11
1- SubBytes:
In this step, each 4 DNA in STATE streams will be
Fig. 5. Detailed example of the steps of Key Expansion generation
an input to the function substitute in the S-Box which
- is explained before.
: :::::: "''''''CMMlIC8I
J
",'UCOCCUUUt J:.liCMMMAWMMI ",uuit CCa;MeUC l"·CACA"tt(U( -r...=ii'r.""
n (I."'''iClIC'''CI
u ••• "''''''". 2- Shift rows
: :::::: .«oI(<<".oIiCl( J CecCCKCSa:,..., J:-w-.wuw.MMI"ClCCUCCSCC"''' lIlCCAllou,a;.", "","==;;- 1 It is a transformation that operates row by row on
»IACACM" ••• lIC I separating each
STATE. It is basically a function of
11 1IC •• tlCilCSCAAC
Key 2 1
1- Initially we have 4 pointers pointing to the
__ tIClX_m8IIMX58IKCNWIClKI«LIillAACWoIalMcac.ai<.w
Key 3
I
AlM:IillACAal
A lw::CAalMD; ____ OIIlOKA<-=CWoI __
beginning of each row stream and one empty
_CACAIIIIIIXCAN.�lXAIilXac.lWOlic_=MiIX_ ... column stream to fill.
Key 4
I
NI/II_=ANI.A
Key 6
1C-= __ CWoIMK.NI/II_�"IM(WliCN£ __ «M"
from each row.
Fig. 7. Example of complete key expansion given the initial secret key in operations: XOR '.' Multiplication by 02 and '.'
KeyO. Multiplication by 03. DNA XOR is explained before. While
'.' multiplication by 02 can be simplified to simple one bit
Having prepared the round keys for each of the 10 rounds, we left shift followed by XOR with the value "lb". While X • 03
will now investigate the round functions which are repeated can be implemented by:
for 10 rounds to encrypt the DNA plaintext.
395
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS'15)
Let Res = X. 02 Standard [AES] [5] using the same key and same plaintext to
verify the operation.
X • 03 = X EB Res
Input = "32 43 f6 a8 88 5a 30 8d 31 31 98 a2 eO 37 07 34"
One bit Shift left on DNA stream can be implemented by the
following algorithm: Or input = "AA UA GC AA UU UC GG GG AG AG AC CG
GA UA AG AU CU AC AU AC GC GA GG AG UG AA AU
1- Define the following groups:
CU AA CU AU CA"
Xl: DNA with the first bit = 0 -7 A,C Cipher Key = "2b 7e 15 16 28 ae d2 a6 ab f7 15 88 09 cf 4f
Y1: DNA with the first bit = 1 -7 T,G 3c" which is expanded to different round keys in a previous
example.
X2: DNA with the second bit = 0 -7 A,G
Y2: DNA with the second bit = 1 -7 C, T ,...t!'I.... roawCANJIAIai� �('OiI5IWMWIC Jl"ll#lCIiAJM&CGo\CiIGM f'tiiMAUl'IMaiNICA
�� ���� ���� ���� ����
2- For shift left by one bit follow the following IHfMCA ..... UUCU""" MWCUUGACttKCti
I "',",CC"NlM'"'UC
rules table: F"1N.t�NJN:.t;C"'''M 1----- 1------ 1-----
I"'MAUCUMOIMCA
JDR 1=::::::=
IMK .... UUCAWHJ ....
AlfIlCWCA""a;uu,",
r.IK���.�MT.W���.�
MOUilfWWCACAAC
r.IK��T..�M�W7.����.�IMCA"MCA"'M'"
IWCl5OCCACi5Ma;v.
IOAUUUC.UC ..... AIIM IOfMUAACCillla:N;M IIIAACCillla:MMCU ..... IUCiUAMCilllUA M ..... a: IIOAMIICOiM ..... cua;
IKNOC5AUC;UAC"'� I CAUlUlIlllIIof.IiAC5M IUUUIIof.IiAC5MCAW IUCIlCIICIIC ..... "CAUA I·AC IiA ..... WNOWCiIC
The remainder is to be used with the next DNA as an input to
r--IOIlUaiNlAUUCUUG ICMUI .. «OiClliUG IIiIC 00 Clli " UCM IUIiU I"«C AC MMUAM XORIM ai IiC C"' ''' �CC
the next iteration. If for example, the first DNA is X2 [A or G] I"'IOAMMCC MMAC IK",wa;a:MOIUA ItllUACilCWWa;OCM ICiliUCC5IiAIiAUIiliVM IWIiAIOA til "'UAW""
WACIlAACatUACCUC IliAII:ClI04
ll A11:MCAUA l"'II£QlIiAAll:MCAIIA CA"'MUA .... ........ 01 1OiUCAII:II£UC"'UAClIi
and second DNA is Xl [A or C], then the output is 'A'. If the
MMIilC MUA "' ''' U C5 ..... CAW ", I04 I1C CC ICAWUGI04UCctC5 ..... IOA� tA "IiICIICIIC M IOAIOII.MwW�MM
second DNA is [A] then remainder is X2 which is input to the rIOiWCAMIiAWIICa: IIIiIiAMClCAUUCM ..... I ..... UCMMClIi"'MK IIiAUCIiACiCWCAACIiA CiliAU AUU5liAaiCilCAU
stream. If the second DNA is [C] then the remainder is Y2. IMUCiCAAC�CAUCM IIIIi W"AI,I
" IIiA M CAAUGUCC fiilO GU IACCCA C tl: CA OiM fiiIO
CAMIIIICC CC CA CC WIjIIOOO"OO
for the next step till the end of the four characters. The last ICA ACCAKUliiM"'UA IIOA ..... NJliUU5ACC5CA INJWU5ACC5CA"'AU ICCACUA"'C.C5I1CW IICMIiAUCNiiWIiAUC
remainder is not used. jQlACA(.WOia:M ..... jM"'UAMCAUCW15 11IIU5\1o\""""'MCAUC IUCACWWIU\ UCUili " IMACUCAGC5MNiW
rla:M ..... ..... ClCliAliU M ICACiliUANJCAtl:U5t11 jCAC5UGalCACiG""AU jClCCAUCiCA ..... ClIiCANii XOA1tl:a."'MCilCMM
396
2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS'15)
"' .......
requirements. Our main contribution was to prove the
I�ut F�o�w�����ttOO�M�oc����OCgOO��M�ruMm�o
availability of implementing such a complex system on DNA
Round 0 1M1iCAW:UGNJGWGGGMWCA�o\GQJGCGGUACGGAUCAGGGUGGCWCACAGAMGA Encryption
computers using DNA basis.
Round 1 IGGtAGCUAOJUUWACiCfiGAGCWMlCCAGQJ(f,QJCCGUUGGGWUM/tt.CGGGCCMCNiC
Round 2 I
GQ;GGAWccwWJJ«K.OCOCUGAUUGWGMCiOCACiCAGGUCAGCliQAlIAGCACGGtGG
REFERENCES
Round 3 ICAGACWAr..u;UW6COOJIlCUCOOJCMUCCAOCUGMltil.MCAUGAlIIDiCCWccr.AUOOI
[I] A. Gehani, T.H LaBean, 1.H. Reif, "DNA-based cryptography", In:
Round 4 IUGMIiOGll.UllKiGAlIMiAcr.NJaiAUUMAOCGCGUACAOCCCCMr.IlCGUCiAGWGMN. 5th DiMACS Series in Discrete Mathematics and Theoretical Computer
5 IWACWACGWCCCCUMCIiCAGCAUAI.GAJOJUAl.IAGAr.AGUAlJAGCCUCGUCCucttMUA Science, MIT,vol. 54,pp. 233-249,1999.
Round
IAOOiAoUiMiUGoIiCOIAWCCMCGUQ/(1JU(IXi(iACWaw;(i(i6(lUlCUCAGCillWAGCC [2] A. Leier, C. Richter, and W. Banzhaf. "Cryptography with DNA
Round 6
binary strands", Biosystems. pp. 13- 22,2000.
7 ICCGGCNl(JN;QU£ACOCCAGC�ACllIGGAUIJGAAIlOCCGCC(IJG(jGNJAAI£AMUA
Round [3] S.V. Kartalopoulos, "DNA-inspired cryptographic method in optical
Round 8
IUGGGGMUCOIAWAAIJO.CN;CAUo\UAGUCCGCCCCUCGCGAGGUCr.IlCGCaiGUMIMCC communications, authentication and data mimicking", in Military
Communications Conference. pp. 774-779,2005.
Round 9 I
tmlWAWNiACUGctGCAQJGAl.lGAGACAGAQlGGACACNJUGOJACQIUMUWGUCAG
4- Store DNA value and its inverse. [10] National Security Agency, Fact sheet NSA Suite B cryptography, 30
Mars 2008, http://www.nsa.gov/iai files/SuiteB Implementer G-
5- Way of separating one stream of DNA into small 113808.pdf.
streams. [Il] Peng, 1., Jin, S., Lei, L., & Han, Q.. "Research on a novel imali:e
6- A mechanism to read the instructions and encryption alli:orithm based on the hybrid of chaotic maps and DNA
implement them. in In Cognitive Informatics & Cognitive Computing (lCCI*
encodinli:".
CC), 2013 12th IEEE International Conference on IEEE, pp. 403-408,
According to our explained algorithm with all its details, these July 2013.
are the least requirements needed in the DNA computer to be [12] D. Heider and A. Barnekow, "DNA-based watermarks using the
DNA-Crypt algorithm," BMC Bioinformatics, vol. 8, article 176,
used to implement the DNA-based AES encryption algorithm
2007.
[D-AES].
[13] P. C. Wong,K. Wong,and H. Foote,"Organic data memory using the
DNA approach,"Communications of the ACM, vol. 46, no. I, pp. 95-
CONCLUSION 98,2003.
[14] M. Arita and Y. Ohashi, "Secret signatures inside genomic
We explained how we can use DNA as a basic element for DNA," Biotechnology Progress,vol. 20,no. 5,pp. 1605-1607,2004.
many processes which lead to the implementation of a DNA [15] A. S. Tanenbaum, "Computer Networks", Prentice Hall, New York,
based version of the "Advanced Encryption Standard" (D NY,USA,4th edition,2002.
AES). We succeeded to put all functions, rules and data in the [16] Shehab, Eman, Abdelalim K. Farag, and Arabi Keshk. "An Jmali:e
form of DNA. We proved that our algorithm leads to the same Encryption Technique based on DNA Encodinli: and Round-reduced
AES Block Cipher." International Journal of Computer Applications,
results of the binary-based AES. We have lead the same
vol. I07 no.20, December 2014.
example proposed in the AES announcement [5] and proved
[17] Al-Wattar, A. H., Mahmod, R., Zukarnain, Z. A., Udzir, N. "A New
we obtained the same results. The DNA- based AES have the DNA Based Approach of generating key-dependent
same strength properties and high security proved by AES. MIXCOLUMNS transformation". International Journal of Computer
We showed also how the complicated binary based operations Networks & Communications (IJCNC) Vol.7, No.2, March 2015.
397