Professional Documents
Culture Documents
Copyright.978-1-5090-3239-6/17/$31.00©2017IEEE
within a DNA molecule is called gene. DNA double helical
structure contains mainly 4 nucleotides bases- A, C, T and G
which are Adenine, Cytosine, Thymine and Guanine
respectively. These bases make pairs to form a double helix
structure. Triplets of nucleotide bases are known as DNA
codons.
Compared to other methods, there exist only a few
cryptographic algorithms based on DNA computing. High
tech lab requirements and computational complexity makes
the applications of DNA computing limited in practice. DNA
operations can be performed in 2 ways- biological DNA
computing (in test tubes) and virtual DNA computing which is
done by simulating the operations.
B. Cellular Automata
A cellular automaton is defined as a system of many Fig. 2. Rule 51 pattern
discrete cells, in which each cell may be in any one state out
of the finite number of states. cells follow a common rule. This behavior of cellular
The automaton changes the state based on some rules. It automata makes it suitable for several applications like the
can be considered as grid of cells [1]. Each cell can be defined study of gas molecules where all molecules obey one rule. In
as a triplet i.e. cell A=(S, T, R) where S is the finite set of addition to this feature, rule 51 has the feature of reversibility.
states, T is the set of transition rules and R is the neighboring That means all information within the system is backward
cell. State transition takes place based on the rule and the traceable.
information contained within the neighbor cell, R. C. UNICODE Encoding
The states can be represented as colors. A two state UNICODE is an encoding technique similar to ASCII and
automaton can be represented as a black and white system [1]. it can process multilingual characters. UNICODE consortium
The defined set of rules determines the state transitions. For defines encoding for above 1 million characters. UNICODE
the next instant of time, a particular cell checks the Transformation Unit(UTF) is the general encoding form used.
information in its neighboring cells. UTF-8, UTF-16 and UTF-2 are different forms of encoding.
Consider the cell definition in Fig. 1. There are 256 such UTF-8 makes use of 8 bits to encode characters in English.
rules and all these have their own characteristics and features. Most commonly used characters are encoded by UTF-16
Some rules are shown in Fig. 1 First transition in the figure technique. Here, UTF-16 is used for encoding.
shows that if 3 ancestor cells(previous cell, current cell and
next cell) were in state 0, next state of the current cell is state D. RGB(Red-Green-Blue) Color model
1. Second rule shows that if the previous cell and current cell RGB stands for the primary colors Red, Green and Blue.
were in state 0 and the 3rd cell was in state 1, then next state of As explained in the introduction part, awe can see millions of
the current cell is 0. 256 such rules exist. We make use of rule colors in this universe. The color appearance is obviously
51 for our algorithm. According to rule 51, next state of the affected by many other conditions like lighting, brightness,
current cell is the ‘NOT’ of current state of the same. other colors in the surroundings etc. Each color has an
Pattern of rule 51 is shown in fig. 2. A cellular automaton equivalent hexadecimal value. That means, reverse conversion
already possesses the feature of uniformity since all is also possible. We can convert any data in our hands to
equivalent color form. This feature is utilized in the proposed
cryptographic algorithm.
IV. PROPOSED ALGORITHM
A flow chart of the proposed encryption algorithm is given
below, see Fig. 3. As explained in above sections, the positives
of various techniques are combined together to get an efficient
encryption algorithm. Plain text is converted to hexadecimal
values (passing through intermediate stages of UNICODE and
colors) in the initial stage and these are directly converted to
binary values. In the second stage, rule 51 is applied to this
Fig. 1. Cell Definition [1] binary sequence. Since the rule is reversible, process of
decryption is possible. After applying the transition rule to
every bit in the sequence, result is divided into 2 equal parts, of
which second part is given as input to a finite automaton. This
will result a state containing a number, say N.
Fig. 4. The finite state automata
Message compression is accomplished by using an XOR Initially, plain text is received either from the input file
operator. XOR is performed between the two binary parts and or from the user. Encode these characters using UNICODE
left rotate the resulting sequence N times. Then, in the final technique. For example, UNICODE of the alphabet “A” is
stage, cipher colors are constructed from the DNA code words u+0041. Convert the UNICODE value to equivalent color
obtained based on the binary sequence. based on a mapping table [2]. Each color is having a
hexadecimal equivalent. Take that value and then convert to
The algorithm is explained below in detail. binary form. We can directly find the binary value from the
Input: Plain text, P from file Dor direct input from the user; text. But, security will be less. Since we include UNICODE-
Color mapping table T; An Automata A; Code books C1[1], color mapping in between, a third party will not easily
C2[1], C3[1], C4[7], C5[7] for conversion. understand the technique.
Output: Cipher colors
Step 1: Encode the characters in plain text, P. Now, In the next stage, apply Rule 51 to the binary sequence
characters under processing P’= UNICODE(P) and then convert it into DNA form based on codebook [1].
Step 2: Convert the UNICODE values to equivalent colors Now, divide the obtained DNA sequence into two equal parts.
and then to corresponding hexadecimal values. And, we obtain Send the second part to an automaton and we get an output
binary sequence from these hexadecimal values. value, N from this machine. Perform XOR operation between
Binary sequence, U= Bin[Hex[Color[P’]]] the two sequence parts. This can be done on the corresponding
binary form. The resulting sequence will be used for further
Step 3: Apply Rule 51 to this binary sequence and we get
processing. Usage of this compression technique provides the
new sequence i.e., U in next state. next layer of protection. Rotate the compressed DNA sequence
State of U at instant t is U(t). According to rule 51, next N times to the left, where N is the output obtained from the
state U(t+1)=NOT[current cell of U at time, t] given automata. The automata used for this step is given below.
Step 4: Convert the binary sequence to DNA sequence See Fig. 4.
form, D.
In the final stage, get the codons from the obtained DNA
Step 5: Divide the sequence into 2 equal parts-D1 and D2.
sequence. Then, convert this to cipher text based on codebook
Send the second part D2 to the automata, A and we get an [3]. Cipher text itself will be unrecognized form since each
output state, say N. D2 is treated as the key. character is represented as a group of a letter and a number. As
Step 6: Perform XOR between D1 and D2. So, D’=D1 D2 a final step, convert these characters in cipher text to colors.
Step 7: The resulting sequence D’ is rotated N times to left. The red and green components of each color are generated
Step 8: The rotated sequence RS will be a plain DNA randomly. Only the third component is formed from the cipher
sequence. Form DNA code words from this sequence. text character. This will again improve the security because;
same character will be represented by different colors at differ-
VI. CONCLUSION
In this paper, a new DNA encryption technique based on
rule 51 and finite automaton is proposed. The system is further
secured by the use of UNICODE encoding as well as RGB
color conversion. Finally, DNA sequence form is converted to
cipher colors. Thus, it provides multiple security layers which
do not give any clue about plain text.