Genetic Code-Based Data Encryption Algorithm
Genetic Code-Based Data Encryption Algorithm
net/publication/356986640
CITATIONS READS
4 293
2 authors:
All content following this page was uploaded by Zafer Albayrak on 13 December 2021.
Abstract: Today, the widespread use of information and communication tools along with the
developing technology has facilitated access to information. These developments have
revealed the importance of data security. Many encryption algorithms have been developed
to ensure secure data transfer. In this article, we have developed a new Genetic Encryption
Algorithm (GEA) inspired by the DNA structure. The GEA is compared to a DES (Standard
Encryption Algorithm), an AES (Advanced Encryption Algorithm) and a RSA encryption
algorithm. A short evaluation is made, presenting the results, along with tables and graphs.
1 Introduction
The widespread use of computer technology has increased the importance of data
security. With the effect of the Covid-19 epidemic, the use of internet and mobile
devices has increased dramatically, especially studies in areas including, e-
commerce, banking, finance, security and education are being carried out using the
internet. A survey conducted during the Covid-19 progress, exploring the time that
people spend on the Internet found the world average is 6 hours and 45 minutes.
In a world where access to information is so easy, it has become an essential need
to ensure data security. The secure transfer of data against attacks or threats, has
become an important topic. The thought that data, that is needed to be kept
confidential and correct, in the communications between computers, can be
intercepted by unauthorized persons, is a big problem. The encryption of data is one
of the simplest methods to ensure secure data exchange between computers.
There are many encryption methods developed to ensure data security and
protection of data [1]. These methods are explained in the subject of Cryptography.
Cryptography is the process of making a message or data temporarily unreadable
by passing it through various mathematical operations and converting this message
to a normal readable state, upon reaching the desired target.
‒ 235 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
The cryptographic algorithms used today, are examined in two parts, symmetrically
or asymmetrically, depending on the key structure [2]. In symmetric encryption
algorithms, a single secret key is used for encryption and resolution of data. Using
a single key while encrypting and resolving data creates a security problem. Because
the key used in encryption is transmitted securely to the recipient and is used to
resolve the same message, reveals the importance of key security. Symmetric
encryption algorithms are faster and more efficient than asymmetric encryption
algorithms [3]. However, they create security weaknesses because a single common
key is used. DES, 3DES, AES are shown as the most widely used symmetric
encryption algorithms [4]. The basic feature of symmetric encryption algorithms
performs encryption by dividing the desired message into blocks and converting
them into bits. For example, when the working principle of the DES algorithm is
examined, it first divides the message into 64-bit blocks and then a 64-bit block
back into 32-bit right and left bits. A 32- bit encrypted result is obtained by passing
the 32-bit right bit through the f function with a 48-bit key bit. Then, the 32-bit left
bit is passed through the f function with the same 48-bit key bit, and a 32-bit
encrypted result is obtained. This f function produces a 32-bit result, using 32-bit
data and a 48-bit key. This is the process of performing the action. This operation
allows multiple results to be produced for the same bit. By extending with a 32-bit
key, 48-bit data is provided. It splits the 48-bit data into groups, dividing the data
into 8 blocks. Each block consists of a 6-bit segment. Each 6-bit piece has been
reduced to 4 bits militarily this time. It consists of 8 blocks of 4 bits, that is, a total
of 32 bits of data. A 64-bit block is obtained from 32-bit right and left messages that
are encrypted [5]. With this method, all blocks are encrypted and form the working
principle of the DES algorithm. Two public keys are used in asymmetric encryption
algorithms. Using two different keys for encryption and resolution of data provides
high security. However, compared to symmetric encryption algorithms, it is very
slow and processing speed takes longer. The most widely used asymmetric
encryption algorithm is the RSA algorithm. The main feature of asymmetric
encryption algorithms is that they are easy to do, difficult to undo and time
consuming because they operate with large prime numbers. For example,
multiplying two numbers is easy, but finding their factors is difficult or takes time.
Squaring a number is easy, but finding its square root is difficult. For this reason,
asymmetric encryption algorithms are the most reliable encryption algorithms.
The performance and success of cryptographic algorithms are determined according
to the key size used in encryption, processing speed and the amount of memory used
[6]. The “brute force” breaking times of the algorithms vary according to the key
size used. The sample DES algorithm has a key structure of 56 bits. The brute force
password cracking time is 256 seconds. [7].
The aim of this study is to develop algorithms that perform better than the
encryption algorithms used today in order to provide secure data transfer between
large computer networks. GEA (Genetic Encryption Algorithm), which was
developed as a result of the studies, has a symmetric encryption algorithm feature,
so its processing speed is faster than asymmetric encryption algorithms [8].
‒ 236 ‒
Acta Polytechnica Hungarica Vol. 19, No. 2, 2022
Since the key size used is 128 bits, it is harder to crack a brute force password, it is
more secure 2128 seconds. Because the brute force break time is The GEA encryption
algorithm is faster than the DES, 3DES and RSA encryption algorithms, and the
breaking time is more difficult than the DES and 3DES algorithms [9].
In the continuation of the study, in Section 2, cryptology and encryption algorithms,
in Section 3, the studies in the literature, in Section 4, the structure of the genetic
encryption algorithm developed inspired by the structure of DNA is explained.
In Section 5, performance analysis of encryption algorithms is made and explained.
The results of the study were evaluated in the last section.
‒ 237 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
Key Key
Figure 1
Symmetric Encryption Algorithms
A common key is used between people who provide encryption of data and analyze
encrypted data. Therefore, in symmetric encryption algorithms, it is very important
to securely transmit the key to the other party [8].
Expanded text
48-bit
B1 B2 B3 ……………………. B8
32-bit result
Figure 2
DES Encryption Algorithm
‒ 238 ‒
Acta Polytechnica Hungarica Vol. 19, No. 2, 2022
When the DES algorithm encrypts the data, it is processed in 64-bit blocks and the
data is encrypted according to the symmetric encryption method with the help of a
56-bit key. Thus, 64-bit encrypted data is obtained [13]. The DES (Data Encryption
Standard) algorithm is split into 64-bit data blocks encrypted with the same 56-bit
key to restore data to 56-bit blocks. Thus, readable, meaningful data is obtained.
As a result, data that seems meaningless by encrypting the data becomes
meaningfully readable [4] [14].
Status - 0
Status - 1
Key
generator
Replace bytes line
wrapping column mixing
picking by key
.
Status
. (r-1)
Replace bytes line
wrapping picking by key
Encrypted data
Figure 3
AES Encryption Algorithm
‒ 239 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
Key Key
Encryption Decryption
Figure 4
Asymmetric Encryption Algorithms
‒ 240 ‒
Acta Polytechnica Hungarica Vol. 19, No. 2, 2022
Sender
Number Blocks
Secret Key(D ,n )
P1, P2, …
Encrypted Data
D = Eı mod f(n) C1=P1Emod n
f(n) = (p-1) . (q-1) C2=P2Emod n
n = pxq …
Encrypted Text
P1=C1Emod n
E.p.q
P2=C2Dmod n
…
Random Number
Generator
Figure 5
RSA Encryption Algorithm
‒ 241 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
In [20], parameters such as the accuracy, efficiency and key exchange of a preferred
algorithm for BLOWFISH, IDEA, CAST-128, RC6, DES, 3DES, AES and RSA
encryption were analyzed. It is emphasized that it can be provided by applying to
multiple algorithms to create efficient encryption systems.
Thakur et al, Among the symmetric encryption algorithms, the most commonly
used DES, AES and Blowfish symmetric encryption algorithms were examined and
performance analyzes were compared in terms of speed, block size and key size.
As a result of the java simulation program used, Blowfish showed that the
encryption algorithm has better performance. [21]
In [22], DES, AES, 3DES, RC2, Blowfish, IDEA, Twofish, TEA, symmetric
encryption algorithms and RSA asymmetric encryption algorithm were used to
ensure data security. While these encryption algorithms encrypt the data, time,
memory and processor usage performance criteria are compared. As a result of the
studies, the DES algorithm performed better than the AES algorithm in small data
sizes. The DES algorithm did not perform well on large data sizes compared to the
AES algorithm.
In [23] symmetric and asymmetric encryption algorithms are examined. Key sizes
were analyzed during encryption or decryption. They examined the factors that
affect the performance of data encryption algorithms.
Matching of organic bases in Deoxyribbo Nucleic Acid (DNA) structure was
investigated. As a result of this research, the matching of the bases inspired us to
develop a symmetric encryption algorithm with 128-bit random key structure [24].
‒ 242 ‒
Acta Polytechnica Hungarica Vol. 19, No. 2, 2022
convert the data in the decimal number system to the system of four numbers, the
remaining values are 0, 1, 2, and 3.)
The main reason for converting our ASCII values to four number systems is to
match four organic bases. This match is shown in Figure 6. The mapping of DNA
bases on the left. By assigning a number value to each of the middle DNA bases,
which base matches which number matches. The figure on the right shows how
DNA bases match the number values we assign.
Figure 6
Coding of DNA Organic Bases
In this way, our numbers turn into organic bases that match the corresponding
organic bases, as in DNA matching. (There is a match between Adenine and
Thymine, Guanine and Cytosine, and vice versa.) This 3 - 0, 2 - 1. Thus, the quad
number system creates a new DNA chain. The keyword match used in encryption
with this DNA match is aggregated in a quadruple system. A single DNA chain is
created. In the quad number system, these newly created numbers are converted to
their equivalents in the decimal system. Finally, character values in the ASCII
number table in the decimal system are obtained. Although these values seem
meaningless and complex, they show encrypted data. By recycling these encrypted
ASCII values, the encrypted data is converted to the original state, that is, by
reversing these processes to decode the encrypted data [26] [27]. Among the biggest
disadvantages of symmetric encryption algorithms is the use of a single key when
encrypting and decrypting data, and the small key size. In this study, greater
usability of the key size is provided.
‒ 243 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
application with the developed genetic code method. The performance of GEA,
DES, AES and RSA algorithms of the data to be encrypted was calculated by using
experimental measurements in accordance with the processor (CPU) and memory
(RAM) usage values during this process (encryption and decryption). In this
analysis method, the processing time was evaluated in minutes, the memory
megabyte used and the processor % used. This experiment was calculated according
to the encryption and decryption of data packets of 58 Bytes, 102 Kilobytes,
1 Megabyte and 5 Megabytes.
5.1 Encryption and Decryption Analysis of 58 Bytes of Data
The process time, processor usage, and memory usage values obtained during the
encryption and decryption of data with 58 bytes of character length were examined.
Table 1 shows the performance values of DES, AES, GEA and RSA encryption
algorithms when 58 bytes of data are encrypted.
Table 1
58 Byte Data Encryption
When the graphic in Figure 7 is examined, it is seen that the processor values used
when encrypting 58 bytes of data are the same.
40
30
Processing Time (s)
20
RAM Usage (MB)
10
CPU Usage (%)
0
DES AES RSA GEA
Figure 7
Byte Data Encryption
Although the processing time value of the GEA algorithm is the same as the DES
algorithm, memory usage values perform better than other DES, AES and RSA
algorithms. The reason for this is the switch structure used and the working principle
used. While the GEA uses a 128-bit key structure, the DES algorithm uses a 56-bit
key structure. Although this affects the processing speed, it increases the memory
usage of the DES algorithm.
‒ 244 ‒
Acta Polytechnica Hungarica Vol. 19, No. 2, 2022
Table 2
Decryption of 58 Bytes of Data
Table 2 shows the performance values of DES, AES, GEA and RSA encryption
algorithms for deciphering data of 58 bytes. While analyzing the 58 byte encrypted
data in the analysis of the graph in Figure 8, the processing time and processor usage
performance of DES, AES and GEA symmetric encryption algorithms are better
than RSA, which is the asymmetric encryption algorithm. Symmetric encryption
algorithms have the same values.
30
Figure 8
Decryption of 58 Byte Data
‒ 245 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
Table 3
102 Kilobyte Data Encryption
When the graphic in Figure 9 is analyzed, it is seen that GEA algorithm processing
time, memory and CPU usage performance are better than other DES and AES
algorithms. The reason for the good performance of the GEA symmetric encryption
algorithm is due to the key size used and the working principle of the algorithm.
200
150
Processing Time (s)
100
RAM Usage (MB)
50 CPU Usage (%)
0
DES AES GEA
Figure 9
102 Kilobyte Data Encryptions
Table 4 shows the performance values of DES, AES and GEA symmetric
encryption algorithms in the process of deciphering 102 Kilobyte data.
Table 4
Decryption Table of 102 Kilobyte Data
When the graphic in Figure 10 is examined, it is seen that the processing time,
memory and processor usage values of the GEA algorithm perform better than the
DES and AES algorithms. This is just because of the key size and working principle
used when encrypting data.
‒ 246 ‒
Acta Polytechnica Hungarica Vol. 19, No. 2, 2022
200
150
Processing Time (s)
100
RAM Usage (MB)
50
CPU Usage (%)
0
DES AES GEA
Figure 10
Decryption of 102 Kilobytes Data
Table 5 shows the performance values of DES, AES and GEA symmetric
encryption algorithms for encrypting 1 Megabyte data.
When the graphic in Figure 11 is examined, it is seen that the AES encryption
algorithm, memory and processor usage performance is better than DES and GEA
algorithms. The reason that the AES algorithm performs better is due to the structure
and working principle of the AES algorithm. The AES algorithm is that it has a
flexible structure. Processing speed and performance do not change even if 128-bit,
192-bit or 256-bit keys of different sizes are used.
‒ 247 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
1000
800
600 Processing Time (s)
Figure 11
1 Megabyte Data Encryption
Table 6 shows the performance values of DES, AES and GEA symmetric
encryption algorithms for password decoding of 1 Megabyte data.
Table 6
Decryption Table of 1 Megabyte Data
When the graphic in Figure 12 is analyzed, it is seen that the performance of AES
encryption algorithm, memory and processor usage is better than DES and GEA
algorithms. The reason for the good performance of the AES symmetric encryption
algorithm is the structure and working principle of the AES encryption algorithm.
700
600
500
400 Processing Time (s)
300 RAM Usage (MB)
200 CPU Usage (%)
100
0
DES AES GEA
Figure 12
Decryption of 1 Megabyte Data
‒ 248 ‒
Acta Polytechnica Hungarica Vol. 19, No. 2, 2022
When the graphic in Figure 13 is examined, it is seen that the performance values
of the AES encryption algorithm are better, while the DES and GEA algorithm
processing time, memory and processor usage performance values are very close to
each other.
1000
800
600 Processing Time (s)
400 RAM Usage (MB)
200 CPU Usage (%)
0
DES AES GEA
Figure 13
5 Megabyte Data Encryption
The reason for the good performance of the AES encryption algorithm is that it is
more successful in terms of working principle in encrypting big data. Table 8 shows
the performance values of DES, AES and GEA symmetric encryption algorithms
for deciphering 5 Megabyte encrypted data.
Table 8
Decryption Table of 5 Megabyte Data
‒ 249 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
When the graphic in Figure 14 is examined, it is seen that the performance values
of the AES encryption algorithm are better than the performance values of the DES
and GEA encryption algorithms in the analysis of 5 Megabyte encrypted data.
The reason for the better performance of the AES encryption algorithm is that the
algorithm has its own unique working principle.
800
600
Processing Time (s)
400
RAM Usage (MB)
200
CPU Usage (%)
0
DES AES GEA
Figure 14
Decryption Graph of 5 Megabyte Data
Conclusions
Symmetric encryption algorithms performed better than asymmetric encryption
algorithms, in encrypting data and analyzing encrypted data. Depending on the size
of the key used for encryption and decryption, brute force breakage times vary.
Since the DES algorithm uses a 56-bit key, the brute force break time is 256 seconds.
AES and GEA algorithms use 128-bit keys; the brute force break time is 2128
seconds. Genetic encryption algorithm developed to encrypt and decrypt small size
data. DES performed better than AES and RSA encryption algorithms.
The performance of the GEA algorithm is due to the amount of memory used for
data encryption and recycling of encrypted data, processing speed, key size used
and working principle. The AES encryption algorithm has been shown to be more
successful in encrypting and decrypting large data. Since the RSA encryption
algorithm does not tend to encrypt big data, it performs encryption based on the
multiplication of large prime numbers, based on mathematical operations.
References
[1] C. C. Chang, M. S. Hwang, and T. S. Chen, “A new encryption algorithm for
image cryptosystems,” J. Syst. Softw., 2001, doi: 10.1016/S0164-
1212(01)00029-2
[2] K. Raeburn and MIT, “RFC 3962 - Advanced Encryption Standard (AES)
Encryption for Kerberos 5,” 2005
[3] W. M. H. Company, “Modern Cryptography: Theory and Practice,” Theory
Pract. 2003
[4] R. Bhanot and R. Hans, “A review and comparative analysis of various
encryption algorithms,” Int. J. Secur. its Appl., 2015, doi:
10.14257/ijsia.2015.9.4.27
‒ 250 ‒
Acta Polytechnica Hungarica Vol. 19, No. 2, 2022
‒ 251 ‒
M. Zengin et al. Designing a New Data Encryption Algorithm Using a Genetic Code Method
‒ 252 ‒