Nothing Special   »   [go: up one dir, main page]

A Bio-Inspired DNA Cryptographic-Based Morse Code Ciphering Strategy for Secure Data Transmission

A Bio-Inspired DNA Cryptographic-Based Morse Code Ciphering Strategy for Secure Data Transmission

Adithya B., Santhi G.
Copyright: © 2022 |Volume: 12 |Issue: 3 |Pages: 18
ISSN: 2155-6393|EISSN: 2155-6407|EISBN13: 9781683182061|DOI: 10.4018/IJKBO.299969
Cite Article Cite Article

MLA

B., Adithya, and Santhi G. "A Bio-Inspired DNA Cryptographic-Based Morse Code Ciphering Strategy for Secure Data Transmission." IJKBO vol.12, no.3 2022: pp.1-18. http://doi.org/10.4018/IJKBO.299969

APA

B., A. & G., S. (2022). A Bio-Inspired DNA Cryptographic-Based Morse Code Ciphering Strategy for Secure Data Transmission. International Journal of Knowledge-Based Organizations (IJKBO), 12(3), 1-18. http://doi.org/10.4018/IJKBO.299969

Chicago

B., Adithya, and Santhi G. "A Bio-Inspired DNA Cryptographic-Based Morse Code Ciphering Strategy for Secure Data Transmission," International Journal of Knowledge-Based Organizations (IJKBO) 12, no.3: 1-18. http://doi.org/10.4018/IJKBO.299969

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this research, DNA cryptography-based Morse code encoding is proposed to bulwark the delicate knowledge within the demanding environment. The plaintext is changed over to DNA sequences utilizing the Morse code encoding table to create original DNA references. The encoded information is transcribed and translated by the Ribonucleic Acid (RNA) arrangements of Morse code. Translated RNA Morse code is hidden by the standard genetic code utilizing organic compounds, and the hidden DNA Morse code is again ciphered by Morse code encoding table to create bogus Morse DNA references. However, the Morse code encoding pattern is used to compress the generated ciphertext with a reducible size rate of 25% to 30% of the plaintext value. The designed bio explores analysis, and results show that the transmission's security is high compared to the existing techniques in terms of cryptography properties, attacks, CIA triad, and it preserves the biological process without repudiating the nature of the organic forms of DNA.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.