Innovative Approach to Improve Hybrid Cryptography by Using DNA Steganography
Total Page:16
File Type:pdf, Size:1020Kb
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Directory of Open Access Journals International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 224-235 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Innovative Approach to Improve Hybrid Cryptography by Using DNA Steganography Mohammad Reza Najaf Torkaman1, Nazanin Sadat Kazazi1, Azizallah Rouddini2 1 Faculy of Computer Science and Information System, UNIVERSITI TEKNOLOGI MALAYSIA (UTM), Kuala Lumpur, Malaysia 2Faculty of Management and Human Resources Development, UNIVERSITI TEKNOLOGI MALAYSIA (UTM), Kuala Lumpur, Malaysia {[email protected], [email protected], [email protected]} Consequently, the attackers are not aware of ABSTRACT transmission of session key through unsecure channel. Finally, the strength point There exists a big demand for innovative of the DNA steganography is discussed. secure electronic communications while the expertise level of attackers increases rapidly and that causes even bigger demands and KEYWORDS needs for an extreme secure connection. An ideal security protocol should always be Cryptography; Cryptography Protocols; protecting the security of connections in DNA steganography; Innovation; many aspects, and leaves no trapdoor for the creativity; attackers. Nowadays, one of the popular cryptography protocols is hybrid cryptosystem that uses private and public key cryptography to change secret message. 1 INTRODUCTION In available cryptography protocol attackers are always aware of transmission of One of the scientific topic sensitive data. Even non-interested attackers investigations in disciplines has been can get interested to break the ciphertext out creativity [1]. The human creative of curiosity and challenge, when suddenly thinking capabilities and the solving of catches some scrambled data over the problems make possible by evolvements network. First of all, we try to explain the of computer science and technology of roles of innovative approaches in information. On the other hand, the cryptography. After that we discuss about fundamental cells of an innovative the disadvantages of public key system are the talents of entrepreneurial cryptography to exchange secret key. Furthermore, DNA steganography is and creativity [2]. In addition, Creativity explained as an innovative paradigm to has defined an evident that crates the diminish the usage of public cryptography to useful and new ideas such as involving exchange session key. In this protocol, the discovery of scientific, the invention session key between a sender and receiver is of social, the innovation of technological hidden by novel DNA data hiding technique. 224 International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 224-235 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) and the imagination of artistic in the 1.1 Innovation and Creativity many human activity [3]. Cryptography is the science and art of One of the scientific subject secret writing that it cannot form investigations in disciplines has been without creativity actions with creativity [1]. The human creative entrepreneurial talent [4][5][6]. It studies thinking capabilities and the solving of some mathematical techniques and problems make possible by evolvements provides mechanisms necessary to of computer science and technology of provide aspects related to information information. For instance, According to security like confidentiality, data Ratten internet capabilities make integrity, entity authentication, and data possible mobile banking and it has origin authentication [6]. caused that the most people can use from Symmetric algorithms are cryptosystems electronic all communication, which has that either a secret key will be shared for enable them to market products and both encryption and decryption [7][8]. services by the mobile phones [12]. The algorithms of symmetric Moreover, it has increased and cryptosystems are very strong against improvement these capabilities through possible attacks, but mainly weakness of gain entrance to the resources of large symmetric cryptosystems is brute- information and the interaction of forcing the secret key. This characteristic multimodal with algorithms [13] [11]. creates the biggest critical act in any On the other hand, the fundamental cells cryptosystem that uses symmetric of an innovative system are the talents of algorithms which is distribution of the entrepreneurial and creativity [2] [14] .In shared secret between the two parties addition, education and research in like DES algorithms [8] [9]. entrepreneurship are developing as a Asymmetric algorithms use different critical area of a study program for the values for encryption and decryption and students of computer science [15]. do not need to share secret between two Entrepreneurship matters are greatly parties. Each party only has to keep a believed that it can be significant to the secret of its own. The earliest foundation global modern business [16]. Nowadays, of asymmetric algorithms known as there is a great correlation among public key cryptosystems comes from knowledge, education, economic growth, key exchange problem of symmetric and information and communication algorithms. In 1976, Whitfield Diffie technology in the knowledge-based and Martin Hellman proposed a method economy [17]. Therefore, what is were the sender and receiver do not have entrepreneurship? to share a secret. That was the first work A wide of domain activeness and on hybrid cryptosystem [6][7][10]. processes has covered the meanings of The information of this study shows that entrepreneurship, involving foundation how DNA steganography can be used in of an organization and innovation [18]. the information security. In fact Based on Styles and Seymour, proposed approach is innovative concept claimed that Entrepreneurship has a in hybrid cryptography. direct attention to distinct or individual opportunistic actions [19]. These activities are forcefully connected with innovation that they produce the value 225 International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 224-235 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) and give birth risk. Although, the key management have been discussed in scholars have had a different definition [29]: from the word of the entrepreneurship, they accepted that entrepreneurship i. Data confidentiality – the first role of connects with the creative activity of cryptography is to protect data something new [20] [21]. In addition, confidentiality. Given that keys have a Creativity has defined an evident that major role in security of cryptosystem, crates the useful and new ideas such as they should fulfill this obligation. involving the discovery of scientific, the invention of social, the innovation of ii. Secure key distribution – the keys technological and the imagination of should be well protected in the process artistic in the many human activity of distribution to parties. They are the [3][22]. easiest way that Eve can get access to encrypted data. There are many points that Eve can get opportunity to attack 1.2 Key Management in cryptography the keys like key distribution, key updates, key revocation, etc. To create the best cryptosystem, it is feasible to use symmetric algorithms iii. Data authentication – the keys can be since they are extremely fast in process a tool to authenticate the and secure in algorithms comparing to communicating party. Public key asymmetric algorithms. However, the cryptography can provide this feature. distribution of the secret key over an insecure channel is one of the most iv. Efficiency of key management – challenging topics in cryptosystems nowadays most of the cryptosystems [4][7][8][9][10][23][24][25][26]. rely on centralized key certification Here on wards, this paper will express authorities for key management viable information on how to incorporate processes. Here all value and symmetric algorithms with other significance of the security of the keys methods to provide a new method that is granted to these authorities. holds a strong security in many aspects. Consequently, the efficiency and There are several steps in key security performance of these management of a cryptosystem. The certification authorities has a great deal main ones are: Key generation, Key in providing security to communicating distribution, and Key revocation [27]. parties. The distribution of the key is the critical step since it is the most interest of Eve to intercept and catch the key. If the 1.3 Public Key Methods Hybrid cryptosystem uses the strongest Cryptosystem algorithm with best generated key but distribution of the key has lack of The best existing method for a security, the overall security of that cryptosystem to provide best security cryptosystem would be zero. Diffie possible seems to be hybrid Hellman algorithm was the establisher of cryptosystems. They are called hybrid key distribution over insecure channels because they are a mixture of symmetric [28]. Some of the concerns of security in and asymmetric algorithms, using 226 International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 224-235 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) security and speed of symmetric together much of a time period that authority is with asymmetric