You are on page 1of 4

Automated DNA Encryption Algorithm based on

UNICODE and Colors


Fasila K.A.
Department of Computer Science & Engineering
Muthoot Institute of Technology and Science, Varikoli
Ernakulam, Kerala, India
fasilaka@mgits.ac.in

Abstract—Cellular Automata based computing paradigm is


an efficient platform for modeling complicated computational II. MOTIVATION
problems. This can be used for various applications in the field of DNA cryptography placed its main footstep in the field of
Cryptography. In this paper, it is used for generating a DNA cryptography within a very short span of time. The massive
cryptography based encryption algorithm. The encoded message parallelism and inherent storage capacity of a DNA molecule
in binary format is encrypted to cipher colors with the help of a
makes it a very good component for cryptographic purposes.
simple algorithm based on the principles of DNA cryptography
There exist some encryption algorithms based on this concept.
and cellular automata. The message will be in compressed form
using XOR operator. Since cellular automata and DNA Some of them are discussed below.
cryptographic principles are exploited, high level of parallelism, A cellular automaton based DNA cryptography method is
reversibility, uniformity etc. can be achieved. given [1], in which rule 51 is used for the binary sequence.
Rule 51 out of the 256 rules [8] has some particular features
Keywords—DNA cryptography; UNICODE encoding; RGB which makes it more suitable for cryptographic purpose. In our
color model; Cellular Automata; Rule 51.
previous work [2], we proposed a hybrid cryptosystem in
which security of both data and key are considered. Data in
I. INTRODUCTION plain text are brought into matrix form and some manipulation
It is a tedious task to design an efficient encryption steps are carried out. In proposed work, this manipulation steps
algorithm which is suitable for messages in multiple languages. are replaced by applying rules of cellular automata. This
DNA (Deoxy-ribo Nucleic Acid) cryptography is a developing reduces the mathematical complexity of processing matrices.
field under the applications of DNA computing. Because of its Authors [3] described 2 methods for encryption in another
high degree of parallelism, density etc., DNA is considered as a work. First method used a mapping graph for converting usual
good information carrier. A data encrypted DNA structure can DNA sequence to a cryptographic sequence. Second method
be embedded within a microorganism so that message used Exclusive OR technique.
exchange can be performed simply by the transfer of this
organism [2]. Before constructing a DNA structure, the A cryptographic algorithm based on UNICODE and colors
encrypted data must be converted to the form of a DNA was proposed [4] by Hemant Suryavanshi. UNICODE can be
sequence. Cellular automaton, which is a discrete model in used for encoding multilingual messages. Mapping and mixing
computability theory, is combined here with the principles of steps are performed for encryption process.
DNA cryptography and the idea of cipher colors in order to Use of cellular automata for cryptography was studied by
provide multilevel security. many researchers. Authors [5] provided a study of DES
In addition to these features, UNICODE encoding algorithm for encryption based on a cellular automaton. In this
technique is used so that texts in multiple languages can be work, the authors proved that using cellular automata rules in
processed using this algorithm. The proposed algorithm gives a cryptography makes the operations simpler.
novel idea of cipher colors. There are more than 10million Another research team [6] proposed encryption of plain text
colors that we are able to see [4]. 16.8million colors can be based on the concept of 2-dimensional CA rules. The algorithm
displayed on a computer screen. These unique colors can be contained two security levels in which first level contains a
easily represented as corresponding hexadecimal values which steganography technique and second level describes the
can be utilized in our algorithm. encryption process.
The following part of this paper is organized as follows.
Next section contains a literature survey. Section 3 contains a III. BACKGROUND STUDY
background of this work. Section 4 describes encryption and
decryption procedures of the proposed algorithm. Section 5 A. DNA Cryptography
gives the implementation details and section 6 concludes the
work. A Deoxy-ribo Nucleic Acid (DNA) molecule has a double
helix structure with two separate strands. Information carrier

Copyright.978-1-5090-3239-6/17/$31.00©2017IEEE
within a DNA molecule is called gene. DNA double helical
structure contains mainly 4 nucleotides bases- A, C, T and G
which are Adenine, Cytosine, Thymine and Guanine
respectively. These bases make pairs to form a double helix
structure. Triplets of nucleotide bases are known as DNA
codons.
Compared to other methods, there exist only a few
cryptographic algorithms based on DNA computing. High
tech lab requirements and computational complexity makes
the applications of DNA computing limited in practice. DNA
operations can be performed in 2 ways- biological DNA
computing (in test tubes) and virtual DNA computing which is
done by simulating the operations.
B. Cellular Automata
A cellular automaton is defined as a system of many Fig. 2. Rule 51 pattern
discrete cells, in which each cell may be in any one state out
of the finite number of states. cells follow a common rule. This behavior of cellular
The automaton changes the state based on some rules. It automata makes it suitable for several applications like the
can be considered as grid of cells [1]. Each cell can be defined study of gas molecules where all molecules obey one rule. In
as a triplet i.e. cell A=(S, T, R) where S is the finite set of addition to this feature, rule 51 has the feature of reversibility.
states, T is the set of transition rules and R is the neighboring That means all information within the system is backward
cell. State transition takes place based on the rule and the traceable.
information contained within the neighbor cell, R. C. UNICODE Encoding
The states can be represented as colors. A two state UNICODE is an encoding technique similar to ASCII and
automaton can be represented as a black and white system [1]. it can process multilingual characters. UNICODE consortium
The defined set of rules determines the state transitions. For defines encoding for above 1 million characters. UNICODE
the next instant of time, a particular cell checks the Transformation Unit(UTF) is the general encoding form used.
information in its neighboring cells. UTF-8, UTF-16 and UTF-2 are different forms of encoding.
Consider the cell definition in Fig. 1. There are 256 such UTF-8 makes use of 8 bits to encode characters in English.
rules and all these have their own characteristics and features. Most commonly used characters are encoded by UTF-16
Some rules are shown in Fig. 1 First transition in the figure technique. Here, UTF-16 is used for encoding.
shows that if 3 ancestor cells(previous cell, current cell and
next cell) were in state 0, next state of the current cell is state D. RGB(Red-Green-Blue) Color model
1. Second rule shows that if the previous cell and current cell RGB stands for the primary colors Red, Green and Blue.
were in state 0 and the 3rd cell was in state 1, then next state of As explained in the introduction part, awe can see millions of
the current cell is 0. 256 such rules exist. We make use of rule colors in this universe. The color appearance is obviously
51 for our algorithm. According to rule 51, next state of the affected by many other conditions like lighting, brightness,
current cell is the ‘NOT’ of current state of the same. other colors in the surroundings etc. Each color has an
Pattern of rule 51 is shown in fig. 2. A cellular automaton equivalent hexadecimal value. That means, reverse conversion
already possesses the feature of uniformity since all is also possible. We can convert any data in our hands to
equivalent color form. This feature is utilized in the proposed
cryptographic algorithm.
IV. PROPOSED ALGORITHM
A flow chart of the proposed encryption algorithm is given
below, see Fig. 3. As explained in above sections, the positives
of various techniques are combined together to get an efficient
encryption algorithm. Plain text is converted to hexadecimal
values (passing through intermediate stages of UNICODE and
colors) in the initial stage and these are directly converted to
binary values. In the second stage, rule 51 is applied to this
Fig. 1. Cell Definition [1] binary sequence. Since the rule is reversible, process of
decryption is possible. After applying the transition rule to
every bit in the sequence, result is divided into 2 equal parts, of
which second part is given as input to a finite automaton. This
will result a state containing a number, say N.
Fig. 4. The finite state automata

Step 9: Convert the codons to cipher text and build colors


from these characters. We get the output.
Fig. 3. Flow chart of encryption algorithm

Message compression is accomplished by using an XOR Initially, plain text is received either from the input file
operator. XOR is performed between the two binary parts and or from the user. Encode these characters using UNICODE
left rotate the resulting sequence N times. Then, in the final technique. For example, UNICODE of the alphabet “A” is
stage, cipher colors are constructed from the DNA code words u+0041. Convert the UNICODE value to equivalent color
obtained based on the binary sequence. based on a mapping table [2]. Each color is having a
hexadecimal equivalent. Take that value and then convert to
The algorithm is explained below in detail. binary form. We can directly find the binary value from the
Input: Plain text, P from file Dor direct input from the user; text. But, security will be less. Since we include UNICODE-
Color mapping table T; An Automata A; Code books C1[1], color mapping in between, a third party will not easily
C2[1], C3[1], C4[7], C5[7] for conversion. understand the technique.
Output: Cipher colors
Step 1: Encode the characters in plain text, P. Now, In the next stage, apply Rule 51 to the binary sequence
characters under processing P’= UNICODE(P) and then convert it into DNA form based on codebook [1].
Step 2: Convert the UNICODE values to equivalent colors Now, divide the obtained DNA sequence into two equal parts.
and then to corresponding hexadecimal values. And, we obtain Send the second part to an automaton and we get an output
binary sequence from these hexadecimal values. value, N from this machine. Perform XOR operation between
Binary sequence, U= Bin[Hex[Color[P’]]] the two sequence parts. This can be done on the corresponding
binary form. The resulting sequence will be used for further
Step 3: Apply Rule 51 to this binary sequence and we get
processing. Usage of this compression technique provides the
new sequence i.e., U in next state. next layer of protection. Rotate the compressed DNA sequence
State of U at instant t is U(t). According to rule 51, next N times to the left, where N is the output obtained from the
state U(t+1)=NOT[current cell of U at time, t] given automata. The automata used for this step is given below.
Step 4: Convert the binary sequence to DNA sequence See Fig. 4.
form, D.
In the final stage, get the codons from the obtained DNA
Step 5: Divide the sequence into 2 equal parts-D1 and D2.
sequence. Then, convert this to cipher text based on codebook
Send the second part D2 to the automata, A and we get an [3]. Cipher text itself will be unrecognized form since each
output state, say N. D2 is treated as the key. character is represented as a group of a letter and a number. As
Step 6: Perform XOR between D1 and D2. So, D’=D1 D2 a final step, convert these characters in cipher text to colors.
Step 7: The resulting sequence D’ is rotated N times to left. The red and green components of each color are generated
Step 8: The rotated sequence RS will be a plain DNA randomly. Only the third component is formed from the cipher
sequence. Form DNA code words from this sequence. text character. This will again improve the security because;
same character will be represented by different colors at differ-
VI. CONCLUSION
In this paper, a new DNA encryption technique based on
rule 51 and finite automaton is proposed. The system is further
secured by the use of UNICODE encoding as well as RGB
color conversion. Finally, DNA sequence form is converted to
cipher colors. Thus, it provides multiple security layers which
do not give any clue about plain text.

Fig. 5. Cipher Colors


ent times. Thus, finally we get the cipher colored image as REFERENCES
output.
[1] G.Shanmuga Sundaram, S Pavithra, A Arthi, B Madubala, S
Mahalakshmi. “Cellular automata based DNA cryptography algorithm”.
V. EXPERIMENTAL RESULTS IEEE conference on ISCO; 978-1-4799-6480-2/15, DOI:
10.1109/ISCO.2015.7282333 January 2015.
JAVA is used to implement the proposed algorithm. [2] Fasila K A, Deepthy Antony. “A multiphase cryptosystem with secure
Consider the plain text BEAD. The UNICODE equivalent of key encapsulation scheme based on principles of DNA computing”.
B is +U0042, E is +U0045, A is +U0041and that of D is IEEE ICACC 2014; DOI 10.1109/ICACC.2014.7, August 2014.
+U0044. These are converted to colors based on the [3] Guangzhao Cui, Cuiling Li, Haobin Li, Xiaoguang Li. “DNA
UNICODE-color mapping. Each color has a hexadecimal Computing and Its Application to Information Security Field”. IEEE
format and from this, binary sequence is obtained. Then, rule ICNC DOI: 10.1109/ICNC.2009.27, August 2009.
51 is applied to this binary sequence and the result is another [4] Hemant Suryavanshi, Dr. Pratosh Bansal , “An Improved Cryptographic
Algorithm using UNICODE and Universal Colors” WOCN-2012:
sequence in binary format. The reason for choosing rule 51 is DOI:10.1109/WOCN.2012.6335543, Vol. 3, p.1 – 3, September 2012.
that it is reversible and stable. Convert this sequence to DNA [5] Rama R, Bala Suyambu J, Andrew Arokiaraj, Shanmugam Saravanan.
sequence form by applying simple substitution steps. Let the “A Study of DES Algorithm with cellular automata” IJIM P 2011:ISSN
sequence obtained now is GCTCTTTAAGTGCAGTCATGC 2185-5439 Volume 3,Number 1,p. 10-16, June 2013.
and so on. Pass the second half of the sequence to the given [6] Pratibha Sharma, NiranjanLal, ManojDiwakar . “Text Security using 2D
automata and we get a number as output. Perform XOR Cellular Automata Rules”. CACCS 2013, p. 363-368, .
operation among the two halves and rotate this result to left that [7] Panchami V, Fasila K A, Sudhin Vamattam, “A multilevel security
much times. From this DNA sequence obtained, DNA codons scheme based on UNICODE and RGB color model using DNA
are formed and this sequence is converted to cipher text. Cipher cryptography” IJCA Proceedings on Emerging Technology Trends on
Advanced Engineering Research - 2012 ICETT(3):29-34, January 2012 .
text obtained is C4A1L4A2A4V2 and so on. Finally, cipher
[8] Standard encyclopedia of Philosophy, “Cellular Automata”,March
colors are formed from this letters. The output is shown is Fig. 2012, Available : http://plato.stanford.edu/entries/cellular-automata/#toc.
5.

You might also like