A Dynamic DNA Cryptosystem for Secure File Sharing
Main Article Content
Abstract
The digital age relies heavily on file sharing, which has become more important with the increasing use of digital data and the Internet. Along with this increasing importance come major and widespread security issues, especially for files containing sensitive or vital data, such as those related to commercial, military, or healthcare sectors. The most common and effective way to protect the security and privacy of shared files containing sensitive information is still encryption. With the development of high-efficiency devices and massive processing capabilities, traditional encryption methods are increasingly under pressure from modern computer security threats, particularly quantum computing.
This study aims to raise resistance against these security concerns by proposing a dynamic encryption system based on DNA (Deoxyribonucleic Acid) encryption. DNA bases are selected to encrypt data dynamically and based on the key in the proposed system. Then, another level is added using (Ribonucleic Acid) RNA, which includes 256 * 256 different bases that are also selected dynamically. This makes this algorithm more effective in dealing with modern security attacks, including those from quantum computers. The results demonstrate the system’s ability to encrypt and decrypt various types of files while providing a strong defense against conventional attacks.
Furthermore, because the system is dynamic, it provides enhanced protection against attacks by contemporary quantum computers due to the wide range of encryption rules. This makes it almost impossible to guess or test every potential vulnerability. The suggested cryptosystem also produces reduced file sizes and is more time-efficient. The performance findings show that processing times for various file types closely converge, with an average throughput between 38,000 and 47,000 bytes per second.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] C. J. Lee, M. M. Kimball, E. C. Deussing, and T. D. Kirsch, “Use of Information Technology Systems for Regional Health Care Information-Sharing and Coordination During Large-Scale Medical Surge Events,” Disaster Med Public Health Prep, vol. 18, p. e1, Dec. 2024, doi: 10.1017/dmp.2023.218.
[2] C. Manthiramoorthy, K. M. S. Khan, and N. A. A, “Comparing Several Encrypted Cloud Storage Platforms,” International Journal of Mathematics, Statistics, and Computer Science, vol. 2, pp. 44–62, Aug. 2023, doi: 10.59543/ijmscs.v2i.7971.
[3] Q. Lai and G. Hu, “A Nonuniform Pixel Split Encryption Scheme Integrated With Compressive Sensing and Its Application in IoMT,” IEEE Trans Industr Inform, pp. 1–11, 2024, doi: 10.1109/TII.2024.3403266.
[4] Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, and Philip Olaseni Shoetan, “DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES,” Computer Science & IT Research Journal, vol. 5, no. 3, pp. 606–615, Mar. 2024, doi: 10.51594/csitrj.v5i3.909.
[5] G. E. Al-Kateb, I. Khaleel, and M. Aljanabi, “CryptoGenSec: A Hybrid Generative AI Algorithm for Dynamic Cryptographic Cyber Defence,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 3, pp. 150–163, Sep. 2024, doi: 10.58496/MJCS/2024/013.
[6] S.-I. Ao, World Congress on Engineering : WCE 2019 : 3-5 July, 2019, Imperial College London, London, U.K. 2019.
[7] C.-T. Berezin, S. Peccoud, D. M. Kar, and J. Peccoud, “Cryptographic approaches to authenticating synthetic DNA sequences,” Trends Biotechnol, Feb. 2024, doi: 10.1016/j.tibtech.2024.02.002.
[8] M. Subhi, O. F. Rashid, S. A. Abdulsahib, M. K. Hussein, and S. M. Mohammed, “A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 2, pp. 120–128, Aug. 2024, doi: 10.58496/MJCS/2024/011.
[9] M. Rapacioli, R. Katz, and V. Flores, “Rules governing the genetic code degeneracy/redundancy and spatial organization of the codon informative properties,” Front Appl Math Stat, vol. 10, May 2024, doi: 10.3389/fams.2024.1340640.
[10] S. T. Parvathy, V. Udayasuriyan, and V. Bhadana, “Codon usage bias,” Mol Biol Rep, vol. 49, no. 1, pp. 539–565, Jan. 2022, doi: 10.1007/s11033-021-06749-4.
[11] T. Négadi, “Fibonacci-like Sequences Reveal the Genetic Code Symmetries, Also When the Amino Acids Are in a Physiological Environment,” Symmetry (Basel), vol. 16, no. 3, p. 293, Mar. 2024, doi: 10.3390/sym16030293.
[12] A. S. Demirkol, M. E. Sahin, B. Karakaya, H. Ulutas, A. Ascoli, and R. Tetzlaff, “Real time hybrid medical image encryption algorithm combining memristor-based chaos with DNA coding,” Chaos Solitons Fractals, vol. 183, Jun. 2024, doi: 10.1016/j.chaos.2024.114923.
[13] H. Wen, Z. Xie, Z. Wu, Y. Lin, and W. Feng, “Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography,” Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 1, Jan. 2024, doi: 10.1016/j.jksuci.2023.101871.
[14] S. Almakdi, I. Ishaque, M. Khan, M. S. Alshehri, and N. Munir, “Key dependent information confidentiality scheme based on deoxyribonucleic acid (DNA) and circular shifting,” Heliyon, vol. 10, no. 1, Jan. 2024, doi: 10.1016/j.heliyon.2023.e23572.
[15] D. Gretton et al., “Random adversarial threshold search enables automated DNA screening”, doi: 10.1101/2024.03.20.585782.
[16] E. Vidhya and R. Kiruba Kumari, “Medical Data Security in IOT Using DNA Cryptography and Insertion Method,” Data Analytics and Artificial Intelligence, vol. 3, no. 2, pp. 21–25, Jan. 2023, doi: 10.46632/daai/3/2/5.
[17] K. Selvakumar and S. Lokesh, “A cryptographic method to have a secure communication of health care digital data into the cloud,” Automatika, vol. 65, no. 1, pp. 373–386, Jan. 2024, doi: 10.1080/00051144.2023.2301240.
[18] S. Almakdi, I. Ishaque, M. Khan, M. S. Alshehri, and N. Munir, “Key dependent information confidentiality scheme based on deoxyribonucleic acid (DNA) and circular shifting,” Heliyon, vol. 10, no. 1, Jan. 2024, doi: 10.1016/j.heliyon.2023.e23572.
[19] O. F. Rashid, “Text Encryption Based on DNA Cryptography, RNA, and Amino Acid,” 2023.
[20] Z. N. Al-Khateeb and M. Jader, “Encryption and hiding text using DNA coding and hyperchaotic system,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 2, p. 766, Aug. 2020, doi: 10.11591/ijeecs.v19.i2.pp766-774.
[21] R. Vaishali and S. Manohar Naik, “A DNA Cryptosystem Using Diffie–Hellman Key Exchange,” SN Comput Sci, vol. 5, no. 3, Mar. 2024, doi: 10.1007/s42979-024-02607-9.
[22] J. Balaraju, P. R. Rao, V. Biksham, P. V. R. D. Prasada Rao, and P. Tumuluru, “International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING Dynamic Password to Enforce Secure Authentication Using DNA,” 2024. [Online]. Available: www.ijisae.org
[23] W. Peng, S. Cui, and C. Song, “One-time-pad cipher algorithm based on confusion mapping and DNA storage technology,” PLoS One, vol. 16, no. 1, p. e0245506, Jan. 2021, doi: 10.1371/journal.pone.0245506.