Page 185 - The-5th-MCAIT2021-eProceeding
P. 185

Step-6: Convert ASCII to alphabet characters, which is considered as the plaintext that was sent by the
        sender: “This is an example of encryption steps”.

           The proposed method consists of six levels of encryption, and this leads to keeps attackers from accessing
        the sending data, information, or messages, also make the process of break this system is more complicated.
        The performance evaluation for the proposed system is calculated based on encryption time and decryption
        time, where six text files are used with different sizes. These text files have sizes of 1K, 2K, 3K, 5K, 10K, and
        20K. The obtained encryption time and decryption time for different file sizes are shown in Table 3 and Fig 3.

        Table 3. Encryption and decryption times

           Size   Total Plaintext Characters   Total Ciphertext   Encryption Time (ms)   Decryption Time (ms)
                                          Characters
            1K          1001                1335                2.578               2.625
            2K          1327                1769                3.406               3.734
            3K          3000                4000               12.515               12.203
            5K          5115                6820                25.24               31.094
           10K         10229               13639               110.266              97.171
           20K         20442               27256               268.422             245.469

              300
              250
              200
             Time (ms)  150                                                 Encryption Time (ms)

              100
                                                                            Decryption Time (ms)
               50
                0
                     1K       2K      3K       5K      10K     20K
                                       Data size (KB)

        Fig. 3. Encryption and decryption times

        4.  Conclusion

           A new cryptography system is proposed, this system is divided into two phases: encryption and decryption.
        The encryption phase has six steps, where firstly convert plaintext to their equivalent ASCII values, secondly
        convert ASCII values to binary values, thirdly convert binary values to DNA character, fourthly convert DNA
        sequences to their equivalent complementary DNA, fifthly convert these DNA sequences to RNA sequences,
        and finally convert RNA sequences to an amino acid, and this sequence sends it to the receiver as ciphertext.
        The decryption phase also includes six steps which are the same encryption steps but in reverse order. Six text
        files with different sizes have been used for evaluation purposes. Performance evaluation for the proposed
        system is calculated based on encryption time and decryption time. It concluded that the proposed method could
        be a successful one in this trend of increasing the security of data transfer.










        E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021)   [172]
        Artificial Intelligence in the 4th Industrial Revolution
   180   181   182   183   184   185   186   187   188   189   190