Page 181 - The-5th-MCAIT2021-eProceeding
P. 181

and Wiener's attack that depending on decryption key calculation. This method differs from the RSA algorithm
        by  the  process  of  key  generation,  where  this  key  is  based  on  alpha,  prime  numbers,  and  Pell's  equation.
        However, this led to making the gain of the private key from the public key is difficult. Viral et al.  (2014)
        distributed a video to photo frames then stored it. Each frame includes three layers: red, blue, and green layers;
        each pixel is 8-bit values than pixel value may be any value with a range from 0 to 255. This system is performed
        by using two pixels for each frame to add text, and these pixels are the top left and the bottom right corner.
        After finishing all changes (the two pixels) for all frames, all images are ordered sequentially and converted to
        a video containing text encryption. Roy et al. (2017) proposed a novel text encrypting method by combining a
        Hopfield neural network and a DNA cryptographic model.
           Firstly, a binary sequence is created and used for key generation, and then this sequence is created by using
        a chaotic neural network. The text is converted to ASCII values which in turn are converted to binary sequences.
        Then  they  encrypted  them  based  on  the  transformation  between  chaotic  neural  network  and  permutation
        function. Singh and Singh (2015) introduced a new technique by removing the traditional choosing method for
        points in the elliptic curve. This system is done by converting text to their equivalent ASCII values, and these
        values are used as input for the Elliptic curve cryptography. The advantages of this system are reducing the cost
        and remove the common lookup table. UbaidurRahman et al. (2015) proposed a new DNA encoding idea, where
        the proposed method generated DNA sequences to encode text as DNA sequences. This text can include the
        alphabet, numbers, and some other characters. Abd El-Latif and Moussa (2019) proposed an encryption method
        that consists of two rounds and similar to the Data Encryption Standard. The method is used two keys to encrypt
        the message, the first key is induced from the elliptic curve cryptography, and the second key is achieved based
        on the mapping of second characters repeated in the key. Then, hide the ciphertext in the second DNA sequence.
        Raj and Panchami (2015) proposed a DNA-based cryptographic key generation method to produce keys for
        ciphering applications. This method is carried out by using a key with a size equal to the half size that is needed
        for  a  cryptographic  key,  and  then  four  vectors  are  derived  to  represent  the  four  DNA  bases.  Finally,  the
        cryptographic key is created by using a linear formula for all DNA vectors. Kamaraj et al. (2016) proposed a
        double-layered security system, where this system is performed by encrypting the plaintext twice; the used key
        length is equal to 1000 characters. Then, they used DNA sequences to increase the cryptanalysis complexity.
           The rest of the paper is organized as follows: Section 2 introduce our proposed cryptography method. The
        performance  results  of  the  proposed  system  and  its  discussion  are  shown  in  Section  3.  Finally,  Section  4
        presented the conclusions of the current work.

        2.  Materials and Methods
           The proposed cryptography method consists of two phases; encryption and decryption.

        2.1.  Encryption phase

           Located at the sender side, and used to encrypt the message before sending it to the receiver, this phase
        contains sex steps of data conversion, as shown in Fig 1.




                Plaintext    ASCII     Binary        DNA   Complementary     RNA   Amino acid     Cipertext


                                                          DNA

        Fig. 1. Encryption steps applied in the encryption phase









        E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021)   [168]
        Artificial Intelligence in the 4th Industrial Revolution
   176   177   178   179   180   181   182   183   184   185   186