Page 181 - The-5th-MCAIT2021-eProceeding
P. 181
and Wiener's attack that depending on decryption key calculation. This method differs from the RSA algorithm
by the process of key generation, where this key is based on alpha, prime numbers, and Pell's equation.
However, this led to making the gain of the private key from the public key is difficult. Viral et al. (2014)
distributed a video to photo frames then stored it. Each frame includes three layers: red, blue, and green layers;
each pixel is 8-bit values than pixel value may be any value with a range from 0 to 255. This system is performed
by using two pixels for each frame to add text, and these pixels are the top left and the bottom right corner.
After finishing all changes (the two pixels) for all frames, all images are ordered sequentially and converted to
a video containing text encryption. Roy et al. (2017) proposed a novel text encrypting method by combining a
Hopfield neural network and a DNA cryptographic model.
Firstly, a binary sequence is created and used for key generation, and then this sequence is created by using
a chaotic neural network. The text is converted to ASCII values which in turn are converted to binary sequences.
Then they encrypted them based on the transformation between chaotic neural network and permutation
function. Singh and Singh (2015) introduced a new technique by removing the traditional choosing method for
points in the elliptic curve. This system is done by converting text to their equivalent ASCII values, and these
values are used as input for the Elliptic curve cryptography. The advantages of this system are reducing the cost
and remove the common lookup table. UbaidurRahman et al. (2015) proposed a new DNA encoding idea, where
the proposed method generated DNA sequences to encode text as DNA sequences. This text can include the
alphabet, numbers, and some other characters. Abd El-Latif and Moussa (2019) proposed an encryption method
that consists of two rounds and similar to the Data Encryption Standard. The method is used two keys to encrypt
the message, the first key is induced from the elliptic curve cryptography, and the second key is achieved based
on the mapping of second characters repeated in the key. Then, hide the ciphertext in the second DNA sequence.
Raj and Panchami (2015) proposed a DNA-based cryptographic key generation method to produce keys for
ciphering applications. This method is carried out by using a key with a size equal to the half size that is needed
for a cryptographic key, and then four vectors are derived to represent the four DNA bases. Finally, the
cryptographic key is created by using a linear formula for all DNA vectors. Kamaraj et al. (2016) proposed a
double-layered security system, where this system is performed by encrypting the plaintext twice; the used key
length is equal to 1000 characters. Then, they used DNA sequences to increase the cryptanalysis complexity.
The rest of the paper is organized as follows: Section 2 introduce our proposed cryptography method. The
performance results of the proposed system and its discussion are shown in Section 3. Finally, Section 4
presented the conclusions of the current work.
2. Materials and Methods
The proposed cryptography method consists of two phases; encryption and decryption.
2.1. Encryption phase
Located at the sender side, and used to encrypt the message before sending it to the receiver, this phase
contains sex steps of data conversion, as shown in Fig 1.
Plaintext ASCII Binary DNA Complementary RNA Amino acid Cipertext
DNA
Fig. 1. Encryption steps applied in the encryption phase
E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021) [168]
Artificial Intelligence in the 4th Industrial Revolution