Research Article

Application of Classical and Genomic Cryptography on Textual Dataset

Volume: 7 Number: 3 December 31, 2024
EN

Application of Classical and Genomic Cryptography on Textual Dataset

Abstract

Cryptology is one of the methods used when sharing confidential or private data over any communication network that poses a security risk. It is applied to restrict access, minimize or completely prevent dangerous situations. Cryptographic algorithms use a combination of mathematical operations and applications to protect information. It strives to ensure the confidentiality, integrity, availability and non-repudiation of information. In other words, it aims to keep data safe against all kinds of threats. However, the performance of these objectives depends on various factors. These factors include the file format used, the volume and complexity of the data. Additionally, the key system and application platform (software and hardware) also affect performance. These variables determine the effectiveness of cryptographic algorithms. In fact, existing cryptographic algorithms may be inadequate or ineffective in the face of new requirements. Therefore, new techniques need to be designed to meet such needs. This study, one of the new generation cryptographic techniques, includes a symmetric key genomics (DNA)-based application. The aim is to test the suitability of genomic encryption on artificial data sets (100 and 500 KB, 1 and 5 MB) generated from the content named "Siyasetname" in the Turkish textual data type. The usability of the genomic encryption technique, which has not been applied before in Turkish data sets, was tested by comparing it with classical algorithms such as AES (symmetric) and ECDH (asymmetric). Performance criteria are determined as encoding and decoding times (seconds), memory consumption (MB) and processor usage (%), which are accepted in the literature for textual data type. It is supported by different indicators according to dimensions and more successful outcomes compared to similar studies in the literature. These findings suggest that DNA/genomic encryption techniques can be considered as an alternative solution to cryptographic requirements.

Keywords

Supporting Institution

Firat University Scientific Research Projects Coordination Unit (FÜBAP) supported this study with project number ADEP.22.06.

References

  1. Md M.A. Aziz, Md N. Sadat, D. Alhadidi, S. Wang, X. Jiang, C.L. Brown, N. Mohammed, “Privacy-preserving techniques of genomic data—a survey”, Briefings in Bioinformatics, vol. 20, 887–895, 2019. https://doi.org/10.1093/bib/bbx139
  2. L. Bonomi, Y. Huang &, L. Ohno-Machado, “Privacy challenges and research opportunities for genomic data sharing”, Nat Genet 52, 646–654, 2020. https://doi.org/10.1038/s41588-020-0651-0
  3. Z. Wan, J.W. Hazel, E.W. Clayton, et al., “Sociotechnical safeguards for genomic data privacy”, Nat Rev Genet 23, 429–445, 2022. https://doi.org/10.1038/s41576-022-00455-y
  4. Y. Jiang, T. Shang, & J. Liu, “SM algorithms-based encryption scheme for large genomic data files”, Digital Communications and Networks, 7(4), 543-550, 2021. https://doi.org/10.1016/j.dcan.2020.12.004
  5. H. Feistel, “Cryptography and computer privacy”, Scientific american, 228(5), 15-23, 1973. https://www.jstor.org/stable/24923044
  6. G.J. Simmons, “Symmetric and asymmetric encryption”, ACM Computing Surveys (CSUR), 11(4), 305-330, 1979. https://doi.org/10.1145/356789.356793
  7. P. Mahajan & A. Sachdeva, “A study of encryption algorithms AES, DES and RSA for security”, Global journal of computer science and technology, 13(15), 15-22, 2013.
  8. H. Handschuh, L.R. Knudsen. M.J. Robshaw, 2001, “Analysis of SHA-1 in encryption mode”, In Cryptographers’ Track at the RSA Conference, 70-83, 2001. https://doi.org/10.1007/3-540-45353-9_7

Details

Primary Language

English

Subjects

Software Engineering (Other)

Journal Section

Research Article

Early Pub Date

December 10, 2024

Publication Date

December 31, 2024

Submission Date

May 14, 2024

Acceptance Date

July 30, 2024

Published in Issue

Year 2024 Volume: 7 Number: 3

APA
Kaya, A., & Türkoğlu, İ. (2024). Application of Classical and Genomic Cryptography on Textual Dataset. Sakarya University Journal of Computer and Information Sciences, 7(3), 389-403. https://doi.org/10.35377/saucis.7.87942.1483300
AMA
1.Kaya A, Türkoğlu İ. Application of Classical and Genomic Cryptography on Textual Dataset. SAUCIS. 2024;7(3):389-403. doi:10.35377/saucis.7.87942.1483300
Chicago
Kaya, Alev, and İbrahim Türkoğlu. 2024. “Application of Classical and Genomic Cryptography on Textual Dataset”. Sakarya University Journal of Computer and Information Sciences 7 (3): 389-403. https://doi.org/10.35377/saucis.7.87942.1483300.
EndNote
Kaya A, Türkoğlu İ (December 1, 2024) Application of Classical and Genomic Cryptography on Textual Dataset. Sakarya University Journal of Computer and Information Sciences 7 3 389–403.
IEEE
[1]A. Kaya and İ. Türkoğlu, “Application of Classical and Genomic Cryptography on Textual Dataset”, SAUCIS, vol. 7, no. 3, pp. 389–403, Dec. 2024, doi: 10.35377/saucis.7.87942.1483300.
ISNAD
Kaya, Alev - Türkoğlu, İbrahim. “Application of Classical and Genomic Cryptography on Textual Dataset”. Sakarya University Journal of Computer and Information Sciences 7/3 (December 1, 2024): 389-403. https://doi.org/10.35377/saucis.7.87942.1483300.
JAMA
1.Kaya A, Türkoğlu İ. Application of Classical and Genomic Cryptography on Textual Dataset. SAUCIS. 2024;7:389–403.
MLA
Kaya, Alev, and İbrahim Türkoğlu. “Application of Classical and Genomic Cryptography on Textual Dataset”. Sakarya University Journal of Computer and Information Sciences, vol. 7, no. 3, Dec. 2024, pp. 389-03, doi:10.35377/saucis.7.87942.1483300.
Vancouver
1.Alev Kaya, İbrahim Türkoğlu. Application of Classical and Genomic Cryptography on Textual Dataset. SAUCIS. 2024 Dec. 1;7(3):389-403. doi:10.35377/saucis.7.87942.1483300

 

INDEXING & ABSTRACTING & ARCHIVING

 

31045 31044   ResimLink - Resim Yükle  31047 

31043 28939 28938 34240
 

 

29070    The papers in this journal are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License