Page 185 - The-5th-MCAIT2021-eProceeding
P. 185
Step-6: Convert ASCII to alphabet characters, which is considered as the plaintext that was sent by the
sender: “This is an example of encryption steps”.
The proposed method consists of six levels of encryption, and this leads to keeps attackers from accessing
the sending data, information, or messages, also make the process of break this system is more complicated.
The performance evaluation for the proposed system is calculated based on encryption time and decryption
time, where six text files are used with different sizes. These text files have sizes of 1K, 2K, 3K, 5K, 10K, and
20K. The obtained encryption time and decryption time for different file sizes are shown in Table 3 and Fig 3.
Table 3. Encryption and decryption times
Size Total Plaintext Characters Total Ciphertext Encryption Time (ms) Decryption Time (ms)
Characters
1K 1001 1335 2.578 2.625
2K 1327 1769 3.406 3.734
3K 3000 4000 12.515 12.203
5K 5115 6820 25.24 31.094
10K 10229 13639 110.266 97.171
20K 20442 27256 268.422 245.469
300
250
200
Time (ms) 150 Encryption Time (ms)
100
Decryption Time (ms)
50
0
1K 2K 3K 5K 10K 20K
Data size (KB)
Fig. 3. Encryption and decryption times
4. Conclusion
A new cryptography system is proposed, this system is divided into two phases: encryption and decryption.
The encryption phase has six steps, where firstly convert plaintext to their equivalent ASCII values, secondly
convert ASCII values to binary values, thirdly convert binary values to DNA character, fourthly convert DNA
sequences to their equivalent complementary DNA, fifthly convert these DNA sequences to RNA sequences,
and finally convert RNA sequences to an amino acid, and this sequence sends it to the receiver as ciphertext.
The decryption phase also includes six steps which are the same encryption steps but in reverse order. Six text
files with different sizes have been used for evaluation purposes. Performance evaluation for the proposed
system is calculated based on encryption time and decryption time. It concluded that the proposed method could
be a successful one in this trend of increasing the security of data transfer.
E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021) [172]
Artificial Intelligence in the 4th Industrial Revolution