Research Article
BibTex RIS Cite

Application of Classical and Genomic Cryptography on Textual Dataset

Year 2024, Volume: 7 Issue: 3, 389 - 403, 31.12.2024
https://doi.org/10.35377/saucis.7.87942.1483300

Abstract

Cryptology is one of the methods used when sharing confidential or private data over any communication network that poses a security risk. It is applied to restrict access, minimize or completely prevent dangerous situations. Cryptographic algorithms use a combination of mathematical operations and applications to protect information. It strives to ensure the confidentiality, integrity, availability and non-repudiation of information. In other words, it aims to keep data safe against all kinds of threats. However, the performance of these objectives depends on various factors. These factors include the file format used, the volume and complexity of the data. Additionally, the key system and application platform (software and hardware) also affect performance. These variables determine the effectiveness of cryptographic algorithms. In fact, existing cryptographic algorithms may be inadequate or ineffective in the face of new requirements. Therefore, new techniques need to be designed to meet such needs. This study, one of the new generation cryptographic techniques, includes a symmetric key genomics (DNA)-based application. The aim is to test the suitability of genomic encryption on artificial data sets (100 and 500 KB, 1 and 5 MB) generated from the content named "Siyasetname" in the Turkish textual data type. The usability of the genomic encryption technique, which has not been applied before in Turkish data sets, was tested by comparing it with classical algorithms such as AES (symmetric) and ECDH (asymmetric). Performance criteria are determined as encoding and decoding times (seconds), memory consumption (MB) and processor usage (%), which are accepted in the literature for textual data type. It is supported by different indicators according to dimensions and more successful outcomes compared to similar studies in the literature. These findings suggest that DNA/genomic encryption techniques can be considered as an alternative solution to cryptographic requirements.

Thanks

Firat University Scientific Research Projects Coordination Unit (FÜBAP) supported this study with project number ADEP.22.06.

References

  • Md M.A. Aziz, Md N. Sadat, D. Alhadidi, S. Wang, X. Jiang, C.L. Brown, N. Mohammed, “Privacy-preserving techniques of genomic data—a survey”, Briefings in Bioinformatics, vol. 20, 887–895, 2019. https://doi.org/10.1093/bib/bbx139
  • L. Bonomi, Y. Huang &, L. Ohno-Machado, “Privacy challenges and research opportunities for genomic data sharing”, Nat Genet 52, 646–654, 2020. https://doi.org/10.1038/s41588-020-0651-0
  • Z. Wan, J.W. Hazel, E.W. Clayton, et al., “Sociotechnical safeguards for genomic data privacy”, Nat Rev Genet 23, 429–445, 2022. https://doi.org/10.1038/s41576-022-00455-y
  • Y. Jiang, T. Shang, & J. Liu, “SM algorithms-based encryption scheme for large genomic data files”, Digital Communications and Networks, 7(4), 543-550, 2021. https://doi.org/10.1016/j.dcan.2020.12.004
  • H. Feistel, “Cryptography and computer privacy”, Scientific american, 228(5), 15-23, 1973. https://www.jstor.org/stable/24923044
  • G.J. Simmons, “Symmetric and asymmetric encryption”, ACM Computing Surveys (CSUR), 11(4), 305-330, 1979. https://doi.org/10.1145/356789.356793
  • P. Mahajan & A. Sachdeva, “A study of encryption algorithms AES, DES and RSA for security”, Global journal of computer science and technology, 13(15), 15-22, 2013.
  • H. Handschuh, L.R. Knudsen. M.J. Robshaw, 2001, “Analysis of SHA-1 in encryption mode”, In Cryptographers’ Track at the RSA Conference, 70-83, 2001. https://doi.org/10.1007/3-540-45353-9_7
  • M. Kantarcioglu, W. Jiang, Y. Liu, B. Malin, “A cryptographic approach to securely share and query genomic sequence”, IEEE Transactions on information technology in biomedicine, 12(5), 606-617, 2008. https://doi.org/10.1109/TITB.2007.908465
  • S. Kalsi, H. Kaur & V. Chang, “DNA cryptography and deep learning using genetic algorithm with NW algorithm for key generation”, Journal of medical systems, 42, 1-12, 2018. https://doi.org/10.1007/s10916-017-0851-z
  • S. Basu, M. Karuppiah, M. Nasipuri, A. K. Halder, N. Radhakrishnan, “Bio-inspired cryptosystem with DNA cryptography and neural networks”, Journal of Systems Architecture, 94, 24-31, 2019. https://doi.org/10.1016/j.sysarc.2019.02.005
  • E. Şatir & O. Kendirli, “A symmetric DNA encryption process with a biotechnical hardware”, Journal of King Saud University-Science, 34(3), 2018. https://doi.org/10.1016/j.jksus.2022.101838
  • S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar & A. Shanthini, “Towards DNA based data security in the cloud computing environment”, Computer Communications, 151, 539-547, 2020. https://doi.org/10.1016/j.comcom.2019.12.041
  • GZ Cui, "New direction of Data storage: DNA molecular storage technology", Computer Engineering and Applications, vol. 42, 29-32, 2006.
  • S. Pramanik, S.K. Setua, "DNA cryptography", 2012 7th International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, 551-554, 2012.https://doi.org/10.1109/ICECE.2012.6471609
  • Türkiye Yazarlar Birliği (TYB). “nizamulmulk.pdf - TYB KİTAP”. https://kitap.tyb.org.tr/kitap/nizamulmulk.pdf (Access Date: 29.10.2023).
  • L M. Adleman, “Molecular computation of solutions to combinatorial problems”, Science, 266(5187), 1021-1024, 1991. https://doi.org/10.1126/science.7973651
  • R.J. Lipton, “DNA solution of hard computational problems”, Science, 268(5210), 542-545, 1995. https://doi.org/10.1126/science.7725098
  • M. Sohal, S. Sharma, “BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing”, Journal of King Saud University-Computer and Information Sciences, 34(1), 1417-1425, 2018. https://doi.org/10.1016/j.jksuci.2018.09.024
  • M.R. Biswas, K.M.R. Alam, S. Tamura, Y. Morimoto, “A technique for DNA cryptography based on dynamic mechanisms”, Journal of Information Security and Applications, 48, 102363, 2019. https://doi.org/10.1016/j.jisa.2019.102363
  • A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, S. Vo, “A statistical test suite for random and pseudorandom number generators for cryptographic applications”. US Department of Commerce, Technology Administration, National Institute of Standards and Technology, vol(21), 2001. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762
  • B.T. Hammad, A.M. Sagheer, I.T.Ahmed, N. Jamil,“A comparative review on symmetric and asymmetric DNA-based cryptography”, Bulletin of Electrical Engineering and Informatics, 9(6), 2484-2491, 2020. https://doi.org/10.11591/eei.v9i6.2470
  • M. Zengin, “Genetik kod yöntemiyle kriptoloji uygulaması”, Yüksek Lisans Tezi (MSc Thesis), Karabük Üniversitesi, Karabük, Türkiye, 2021.
  • F. Talo, “DNA tabanlı kriptoloji uygulaması”, Yüksek Lisans Tezi (MSc Thesis), Düzce Üniversitesi, Düzce, Türkiye, 2021.
  • A. Kaya, İ. Türkoğlu, “Yeni nesil güvenlik sistemleri: biyo-ilhamlı kriptografi”, 2. International Uludağ Scientific Researches Congress, Bursa/Türkiye, 419-430, 4-5 Kasım 2023.
  • A. Kaya, İ. Türkoğlu, “Evaluation of symmetric cryptography algorithms in terms of performance analysis”, Cukurova 10th Internatıonal Scıentıfıc Researches Conference, Adana/Türkiye, 4048-462, 2-4 April 2023.
  • A. Kaya, İ. Türkoğlu, “Evaluation of asymmetric cryptography algorithms in terms of performance analysis”, 4. International Cappadocia Scientific Research Congress, Nevşehir-/Türkiye, 1056-1070, 16-17 April 2023.
  • A. Kaya, İ. Türkoğlu, “Simetrik ve asimetrik şifreleme algoritmalarının performans karşılaştırılması”, Fırat Üniversitesi Müh. Bil. Dergisi, 35(2), 891-900, 2023. https://doi.org/10.35234/fumbd.1296228
  • R.M. Indrasena, K.A.P. Siva, R.K. Subba, “A secured cryptographic system based on dna and a hybrid key generation approach”, Biosystems, 197: 1-10, 2020. https://doi.org/10.1016/j.biosystems.2020.104207
  • G. Rahman, C.C. Wen, “Omega network pseudorandom key generation based on dna cryptography”, Applied Sciences, 12(16), 1-19, 2022. https://doi.org/10.3390/app12168141
  • SSL2, “Simetrik ve asimetrik şifreleme – farklar nelerdir?. https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences, (Access Date: 10.12.2023).
  • H. Kodaz, F.M. Botsalı “Simetrik ve asimetrik şifreleme algoritmalarının karşılaştırılması”, Selçuk-Teknik Dergisi 9(1), 10-23, 2010.
  • Geeksforgeeks, “Advanced encryption standard (AES)” https://www.geeksforgeeks.org/advanced-encryption-standard-aes/ , (Access Date:10.11.2023).
  • W. Diffie and M. Hellman, "New directions in cryptography", in IEEE Transactions on Information Theory, vol. 22, no. 6,644-654, 1976. https://doi.org/10.1145/3549993.3550007
  • G.N. Krishnamurthy, V. Ramaswamy, “Encryption quality analysis and security evaluation of cast-128 algorithm and its modified version using digital images”, International Journal of Network Security & Its Applications, 1(1):28-33, 2009. https://doi.org/10.48550/arXiv.1004.0571
  • H. Wen, S. Yu & J. Lü, “Breaking an image encryption algorithm based on DNA encoding and spatiotemporal chaos”, Entropy, 21(3), 246, 2019. https://doi.org/10.3390/e21030246
  • M. Şahin, “Memristor-based hyperchaotic system and DNA encoding based image encryption application on LabVIEW”, Uluslararası Muhendislik Arastirma ve Gelistirme Dergisi, 15. 269-276, 2023. https://doi.org/10.29137/umagd.1239725
  • A. Arı“CDIEA: Chaos and dna based image encryption algorithm”, Turkish Journal of Science & Technology, 18(1), 261-273, 2023. https://doi.org/10.55525/tjst.1250419
Year 2024, Volume: 7 Issue: 3, 389 - 403, 31.12.2024
https://doi.org/10.35377/saucis.7.87942.1483300

Abstract

References

  • Md M.A. Aziz, Md N. Sadat, D. Alhadidi, S. Wang, X. Jiang, C.L. Brown, N. Mohammed, “Privacy-preserving techniques of genomic data—a survey”, Briefings in Bioinformatics, vol. 20, 887–895, 2019. https://doi.org/10.1093/bib/bbx139
  • L. Bonomi, Y. Huang &, L. Ohno-Machado, “Privacy challenges and research opportunities for genomic data sharing”, Nat Genet 52, 646–654, 2020. https://doi.org/10.1038/s41588-020-0651-0
  • Z. Wan, J.W. Hazel, E.W. Clayton, et al., “Sociotechnical safeguards for genomic data privacy”, Nat Rev Genet 23, 429–445, 2022. https://doi.org/10.1038/s41576-022-00455-y
  • Y. Jiang, T. Shang, & J. Liu, “SM algorithms-based encryption scheme for large genomic data files”, Digital Communications and Networks, 7(4), 543-550, 2021. https://doi.org/10.1016/j.dcan.2020.12.004
  • H. Feistel, “Cryptography and computer privacy”, Scientific american, 228(5), 15-23, 1973. https://www.jstor.org/stable/24923044
  • G.J. Simmons, “Symmetric and asymmetric encryption”, ACM Computing Surveys (CSUR), 11(4), 305-330, 1979. https://doi.org/10.1145/356789.356793
  • P. Mahajan & A. Sachdeva, “A study of encryption algorithms AES, DES and RSA for security”, Global journal of computer science and technology, 13(15), 15-22, 2013.
  • H. Handschuh, L.R. Knudsen. M.J. Robshaw, 2001, “Analysis of SHA-1 in encryption mode”, In Cryptographers’ Track at the RSA Conference, 70-83, 2001. https://doi.org/10.1007/3-540-45353-9_7
  • M. Kantarcioglu, W. Jiang, Y. Liu, B. Malin, “A cryptographic approach to securely share and query genomic sequence”, IEEE Transactions on information technology in biomedicine, 12(5), 606-617, 2008. https://doi.org/10.1109/TITB.2007.908465
  • S. Kalsi, H. Kaur & V. Chang, “DNA cryptography and deep learning using genetic algorithm with NW algorithm for key generation”, Journal of medical systems, 42, 1-12, 2018. https://doi.org/10.1007/s10916-017-0851-z
  • S. Basu, M. Karuppiah, M. Nasipuri, A. K. Halder, N. Radhakrishnan, “Bio-inspired cryptosystem with DNA cryptography and neural networks”, Journal of Systems Architecture, 94, 24-31, 2019. https://doi.org/10.1016/j.sysarc.2019.02.005
  • E. Şatir & O. Kendirli, “A symmetric DNA encryption process with a biotechnical hardware”, Journal of King Saud University-Science, 34(3), 2018. https://doi.org/10.1016/j.jksus.2022.101838
  • S. Namasudra, D. Devi, S. Kadry, R. Sundarasekar & A. Shanthini, “Towards DNA based data security in the cloud computing environment”, Computer Communications, 151, 539-547, 2020. https://doi.org/10.1016/j.comcom.2019.12.041
  • GZ Cui, "New direction of Data storage: DNA molecular storage technology", Computer Engineering and Applications, vol. 42, 29-32, 2006.
  • S. Pramanik, S.K. Setua, "DNA cryptography", 2012 7th International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, 551-554, 2012.https://doi.org/10.1109/ICECE.2012.6471609
  • Türkiye Yazarlar Birliği (TYB). “nizamulmulk.pdf - TYB KİTAP”. https://kitap.tyb.org.tr/kitap/nizamulmulk.pdf (Access Date: 29.10.2023).
  • L M. Adleman, “Molecular computation of solutions to combinatorial problems”, Science, 266(5187), 1021-1024, 1991. https://doi.org/10.1126/science.7973651
  • R.J. Lipton, “DNA solution of hard computational problems”, Science, 268(5210), 542-545, 1995. https://doi.org/10.1126/science.7725098
  • M. Sohal, S. Sharma, “BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing”, Journal of King Saud University-Computer and Information Sciences, 34(1), 1417-1425, 2018. https://doi.org/10.1016/j.jksuci.2018.09.024
  • M.R. Biswas, K.M.R. Alam, S. Tamura, Y. Morimoto, “A technique for DNA cryptography based on dynamic mechanisms”, Journal of Information Security and Applications, 48, 102363, 2019. https://doi.org/10.1016/j.jisa.2019.102363
  • A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, S. Vo, “A statistical test suite for random and pseudorandom number generators for cryptographic applications”. US Department of Commerce, Technology Administration, National Institute of Standards and Technology, vol(21), 2001. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762
  • B.T. Hammad, A.M. Sagheer, I.T.Ahmed, N. Jamil,“A comparative review on symmetric and asymmetric DNA-based cryptography”, Bulletin of Electrical Engineering and Informatics, 9(6), 2484-2491, 2020. https://doi.org/10.11591/eei.v9i6.2470
  • M. Zengin, “Genetik kod yöntemiyle kriptoloji uygulaması”, Yüksek Lisans Tezi (MSc Thesis), Karabük Üniversitesi, Karabük, Türkiye, 2021.
  • F. Talo, “DNA tabanlı kriptoloji uygulaması”, Yüksek Lisans Tezi (MSc Thesis), Düzce Üniversitesi, Düzce, Türkiye, 2021.
  • A. Kaya, İ. Türkoğlu, “Yeni nesil güvenlik sistemleri: biyo-ilhamlı kriptografi”, 2. International Uludağ Scientific Researches Congress, Bursa/Türkiye, 419-430, 4-5 Kasım 2023.
  • A. Kaya, İ. Türkoğlu, “Evaluation of symmetric cryptography algorithms in terms of performance analysis”, Cukurova 10th Internatıonal Scıentıfıc Researches Conference, Adana/Türkiye, 4048-462, 2-4 April 2023.
  • A. Kaya, İ. Türkoğlu, “Evaluation of asymmetric cryptography algorithms in terms of performance analysis”, 4. International Cappadocia Scientific Research Congress, Nevşehir-/Türkiye, 1056-1070, 16-17 April 2023.
  • A. Kaya, İ. Türkoğlu, “Simetrik ve asimetrik şifreleme algoritmalarının performans karşılaştırılması”, Fırat Üniversitesi Müh. Bil. Dergisi, 35(2), 891-900, 2023. https://doi.org/10.35234/fumbd.1296228
  • R.M. Indrasena, K.A.P. Siva, R.K. Subba, “A secured cryptographic system based on dna and a hybrid key generation approach”, Biosystems, 197: 1-10, 2020. https://doi.org/10.1016/j.biosystems.2020.104207
  • G. Rahman, C.C. Wen, “Omega network pseudorandom key generation based on dna cryptography”, Applied Sciences, 12(16), 1-19, 2022. https://doi.org/10.3390/app12168141
  • SSL2, “Simetrik ve asimetrik şifreleme – farklar nelerdir?. https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences, (Access Date: 10.12.2023).
  • H. Kodaz, F.M. Botsalı “Simetrik ve asimetrik şifreleme algoritmalarının karşılaştırılması”, Selçuk-Teknik Dergisi 9(1), 10-23, 2010.
  • Geeksforgeeks, “Advanced encryption standard (AES)” https://www.geeksforgeeks.org/advanced-encryption-standard-aes/ , (Access Date:10.11.2023).
  • W. Diffie and M. Hellman, "New directions in cryptography", in IEEE Transactions on Information Theory, vol. 22, no. 6,644-654, 1976. https://doi.org/10.1145/3549993.3550007
  • G.N. Krishnamurthy, V. Ramaswamy, “Encryption quality analysis and security evaluation of cast-128 algorithm and its modified version using digital images”, International Journal of Network Security & Its Applications, 1(1):28-33, 2009. https://doi.org/10.48550/arXiv.1004.0571
  • H. Wen, S. Yu & J. Lü, “Breaking an image encryption algorithm based on DNA encoding and spatiotemporal chaos”, Entropy, 21(3), 246, 2019. https://doi.org/10.3390/e21030246
  • M. Şahin, “Memristor-based hyperchaotic system and DNA encoding based image encryption application on LabVIEW”, Uluslararası Muhendislik Arastirma ve Gelistirme Dergisi, 15. 269-276, 2023. https://doi.org/10.29137/umagd.1239725
  • A. Arı“CDIEA: Chaos and dna based image encryption algorithm”, Turkish Journal of Science & Technology, 18(1), 261-273, 2023. https://doi.org/10.55525/tjst.1250419
There are 38 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Research Article
Authors

Alev Kaya 0000-0002-3544-5267

İbrahim Türkoğlu 0000-0003-4938-4167

Early Pub Date December 10, 2024
Publication Date December 31, 2024
Submission Date May 14, 2024
Acceptance Date July 30, 2024
Published in Issue Year 2024Volume: 7 Issue: 3

Cite

IEEE A. Kaya and İ. Türkoğlu, “Application of Classical and Genomic Cryptography on Textual Dataset”, SAUCIS, vol. 7, no. 3, pp. 389–403, 2024, doi: 10.35377/saucis.7.87942.1483300.

29070    The papers in this journal are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License