issue 1


1. Anup Bhange 2. Swati Kannake 3. Mrunalini Katekhaye
4. Ayushi Mundwaik 5.Sanghamitra Dekate

Assistant Professor, Computer Technology, KDK college of Engineering, Maharashtra, India
B.E Student, Computer Technology, KDK college of Engineering, Maharashtra, India

Abstract :

Cloud computing is the recent technology in the area of distributed computing it provides different online and on-demand services for data storage, network services etc. In cloud there are many issues related with the security but it can be restricted on the sensitive data of the organization like health care, banking etc. DNA cryptography utilizes the flimsy bio-sub-atomic idea for the security and gives us a desire for non-fragile calculation. The different techniques are developed like ciphers, cryptography, stenography and DN based encryption. DNA atom, have the ability to store, process, transmit data, this DNA cryptography. This is the combination of the biological DNA sequence and classical cryptography secure the non-reputable data transmission. This paper discuss the features of cloud computing the services models and the issues related with secure and suggest a DNA based encryption algorithm for secure the data with the help of the bio – molecular technique.

Key Words: DNA cryptography, cloud computing, Confidentiality, data security, DNA encryption technique, integrity.


Cloud computing has newly extended popular technology and largely developed in IT. Cloud storage is not able to have the huge amount of data which is essential for the business. In the future cloud computing is most important part of everyone’s life because it stored the huge amount of data, scalability , reliability , and availability are main attributes of cloud computing security is always the main issue in the open system architecture . DNA molecule, have the capacity to store, process, transmit information, this DNA cryptography. DNA cryptography is the technique which combines the chemical Characteristics of molecules DNA sequence with cryptography which ensure that non- accessible transmission of data. DNA cryptography is defined the practice and study of technique to convert original message into human non-reliable code. DNA Cryptography is the heat of modern electronic security technology DNA cryptography is a technique based on DNA computing notation, this technology does not contain any mathematical code, and it could be too secure. Cloud computing security is always the main issue in the open system architecture. DNA molecule, have the capacity to store, process, transmit information, this DNA cryptography. DNA cloud computing security is always the main issue in the open system architecture. DNA molecule, have the capacity to store, process; transmit information, this DNA cryptography. DNA cryptography is the technique which combines the chemical Characteristics of molecules DNA sequence with cryptography which ensure that non- accessible transmission of data.


Before the novel period, cryptography was only used to keep message secrete by the moralists, spy and military leaders by the end year encryption techniques have been appreciate to confirm secure calculus, to check message integrity certify recipients and senders, identities etc

DNA cryptography is the rapid emerging technology is based on DNA sequences. DNA is the high time to find the different traditional cryptosystem. When DNA computer will be trading available it will break the modern silicon based technology. Message encryption is the process of transmitting the message. In the message encryption, the original message is transformed into an equivalent alternative by a definite encoding mechanism. This message is then send to the receiver. An encoding scheme by incorporating the important chemical characteristics of biological DNA (Deoxyribonucleic Acid) sequences or structure of purines and Pyrimidines could serve as an effective larceny transmission of a message would be so secure that it. Could not be easily cracked.

Computational properties of DNA turned into another part of science and an exploration zone for cryptographers from 1994 when Dr. Leonard M. Adleman utilized the computational properties of DNA to take care of Hamiltonian way issue

[1]. Research on DNA based encryption methods can be extensively classified into three:

  • DNA Cryptography;
  • DNA Steganography;
  • Pseudo DNA Cryptography.

DNA Cryptography is based on DNA based calculations for encryption and different techniques for both Symmetric and Asymmetric DNA cryptography has been proposed by specialists. The methods dependent on miscomputations got wide acknowledgment because of secure nature of calculations. DNA Steganography got famous with a protected innovation proposed via Carter Bancroft for concealing messages. The proposed method included hiding a DNA-encoded message inside a genomic DNA test followed by further disguise of the DNA test to a microdot [6]. DNA Steganography is likewise considered as cryptographic strategy despite the fact that there is no encryption. Pseudo DNA Cryptography got wide acknowledgment as it includes recreation by methods for calculations and number juggling procedure on Pseudo DNA as opposed to utilizing genuine DNA with cutting edge lab offices. DNA advanced coding innovation indicates the bases A, C, T, G as 00, 01,10,11 and the double qualities can be traded with bases and this coding structures the premise of calculations utilizing Digital DNA [16]. DNA figuring can be acted in two different ways one by the methods for natural tasks utilizing genuine DNA and the other procedure includes reenactment utilizing Digital DNA and Pseudo DNA

1.3 Advanced Encryption Standard (AES):

This is commercialized approved symmetric block cipher. AES has a large range of applications in recent security system such as economic transaction, wireless communication, e-business, encrypted data storage and etc. It is hard-bitten and faster than triple AES both in the hardware and software. The number of length as well as the round of keys of AES is variable. AES is an iterative instead of Feistel figure. It depends on ‘substitution–change organizes’. It contains a progression of connected activities, some of which include supplanting contributions by explicit yields (substitutions) and others include rearranging bits around (changes). AES treats the 128 bits of a plaintext obstruct as 16 bytes. These 16 bytes are masterminded in four sections and four lines for handling as a framework − In contrast to DES, the quantity of rounds in AES is variable and relies upon the length of the key. AES utilizes 10 rounds for 128-piece keys, 12 rounds for 192-piece keys and 14 rounds for 256-piece keys. Every one of these rounds utilizes an alternate 128-piece round key, which is determined from the first AES key.

2. Data Encryption Standard (DES):

DES is a block cipher algorithm that takes plain text in blocks of 64 bits and converts them to cipher text using keys of 48 bits. It is a symmetric key algorithm, which means that the same key is used for encrypting and decrypting data. DES has an effective key length of 56 bits, since 8 of the 64 bit of the key are not used by the encryption algorithm. The block size is 64 bit. It uses 16 rounds Feistel structure. DES is a square figure, and scrambles information in squares of size of 64 pieces each, implies 64 bits of plain content goes as the contribution to DES, which produces 64 bits of figure content. A similar calculation and key are utilized for encryption and unscrambling, with minor contrasts. The key length is 56 bits. We have notice that DES utilizes a 56 piece key. As a matter of fact, the underlying key comprises of 64 bits. Be that as it may, before the DES procedure even beginnings, each eighth piece of the key is disposed of to deliver a 56 piece key. That is bit position 8, 16, 24, 32, 40, 48, 56 and 64 are disposed of. Along these lines, the disposing of each eighth piece of the key creates a 56-piece key from the first 64-piece key. DES depends on the two crucial properties of cryptography: substitution (additionally called as disarray) and transposition (likewise called as dispersion). DES comprises of 16 stages, every one of which is called as a round. Each round plays out the means of substitution and transposition. Let us presently talk about the expansive level strides in DES. In the initial step, the 64 piece plain content square is given over to an underlying Permutation (IP) work.

  1. The underlying change performed on plain content.
  2. Next the underlying change (IP) produces two parts of the permuted square; says Left Plain Text (LPT) and Right Plain Text (RPT).
  3. Presently each LPT and RPT to experience 16 rounds of encryption process.
  4. At last, LPT and RPT are rejoined and a Final Permutation (FP) is performed on the consolidated square

3. Encryption Decryption Process


UTF (8-piece Unicode Transformation Format) is a variable width character encoding fit for encoding each of the 1,112,064 substantial code focuses in Unicode utilizing one to four one-byte (8-piece) code units. The encoding is characterized by the Unicode Standard, and was initially planned by Ken Thompson and Rob Pike.[1][2] The name is gotten from Unicode (or Universal Coded Character Set) Transformation Format – 8-bit.It was intended for in reverse similarity with ASCII. The initial 128 characters of Unicode, which relate balanced with ASCII, are encoded utilizing a solitary byte with a similar parallel an incentive as ASCII, so substantial ASCII content is legitimate UTF-8-encoded Unicode too. Code focuses with lower numerical qualities, which will in general happen all the more much of the time, are encoded utilizing less bytes. Since ASCII bytes don’t happen when encoding non-ASCII code focuses into UTF-8, UTF-8 is sheltered to use inside most programming and archive dialects that decipher certain ASCII characters in a unique manner.

Unicode Converter enables you to easily convert Unicode characters in UTF-16, UTF-8, and UTF-32 formats to their Unicode and decimal representations. In addition, you can percent encode/decode URL parameters. As you type in one of the text boxes above, the other boxes are converted on the fly.


DNA cryptography is a liberal of guarantees. The co-operative twofold information clients two “0” and “1” to the data. Yet, for DNA particles, which are the unconstrained connector of data, information is encoded by four bases viz. ‘A’,’T’,’G’ and ‘C’. DNA cryptography joins the gigantic parallelism and capacity limit of DNA particles with conventional procedures of cryptography. A couple of grams of DNA atom have the effectiveness to confine all information put away on the planet. The DNA Cryptography would now be able to be utilized as the solid calculation for information security as its splitting time and key age are intended to the point that it appears the time taken to unscramble the figured information is very incomprehensible for an actual existence time. So it ought to be the primary decision for the digital security scientists for making sure about information and data. The examination made here is extensive and the data given here will to a great extent help to the specialists for doing further work right now thinking. The modules given for key age, encryption, unscrambling will help the consequent works for executing cryptographic systems. The present work will likewise assist with actualizing furthermore; apply DNA approaches to cryptography and stenography.


  1. Prajapati Ashishkumar B, PrajapatiBarkha Usage of DNA cryptography in distributed computing and utilizing attachment programming 2016 Universal Gathering on Correspondence Framework and System Advances (IEEE PC Society).
  2. Leier, A., Richter, C., Banzhaf, W. also, Rauhe, H. (2000). Cryptography with DNA twofold strands.Bio Frameworks.Vol. 57 (1). pp. 13-22.
  3. Prashant Rewagad, YogitaPawar, “Utilization of Advanced Mark with Diffie-Hellman Key Trade and AES Encryption Calculation to Upgrade Information Security in Distributed computing” 2013 Global Gathering on Correspondence Framework and System Innovations (IEEE PC Society.


First Author – Assistant prof. Anup Bhange, KDK college of Engineering, Nagpur Maharashtra,

Second Author – Swati kannake, KDK college of Engineering, Nagpur Maharashtra,

Third Author – Mrunalini katekhaye, KDK college of Engineering, Nagpur Maharashtra,

Forth Author – Ayushi mundwaik, KDK college of Engineering, Nagpur Maharashtra,

Fifth author – Snaghmitra dekate, KDK college of Engineering, Nagpur Maharashtra,

Related posts



IOT Based Water Distribution Control & Monitoring System


Design Mobile application base Voice command wireless CNC Plotter machine


Leave a Comment