A Realizable Data Encryption Strategy


  • Pranjali CMR Institute of Technology
  • Srividya Ramisetty CMR Institute of Technology
  • Vani B Telagade CMR Institute of Technology
  • S Disha Adiga CMR Institute of Technology




Cryptography, DNA, RDES, Encryption, Decryption


As technology continues to advance, data has become an increasingly important element in the sphere of Information Technology. However, enormous data generated by devices presents a major challenge in handling it in real time. Data encryption is a crucial component in ensuring data security and privacy during its transmission in network. Unfortunately, many applications disregard data encryption in order to achieve higher performance. The work proposes a solution to this problem by introducing a data encryption process that is, the Realizable Data Encryption Strategy (RDES) and Deoxyribonucleic Acid (DNA) computing, a revolutionary cryptographic method that improves information security by preventing authorized access to sensitive data, being used. Information security is improved by DNA symmetric cryptography being suggested. The outcomes show that plain-text encryption is a very secure procedure. The RDES approach is designed to improve privacy protection within the constraints of real-time processing. By implementing the RDES approach, data privacy and security can be significantly enhanced without compromising performance.


Sumit V T, Ritukar, Murthy B, Jagadish K S. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing Environment. International Journal of Innovative Research in Science, Engineering and Technology,2018. Vol. 7.

Vikram, A., Kalaivani, S., & Gopinath. G. A Novel Encryption Algorithm based on DNA Cryptography. Proceedings of International Conference on Communication and Electronics Systems (ICCES). 17-19 July 2019, Coimbatore, India.IEEE, 20 February 2020.

Shantha R, Mahender K, Jenifer A: Security analysis of hybrid one time password generation algorithm for IoT data. AIP Conference Proceedings. 2022; 2418:1-10.

Balasubramaniam S, Joe V, Sivakumar TA: Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing. International Journal of Intelligent Systems. 2023; 2023:1-14.

Guo. S, Guo. M, Zhou. W, Yu. A workable architecture for IP traceback using dynamically stochastic session tagging. IEEE Transactions on Computers, 2016. pp. 1418–1427.

Lipton R J. DNA solution of hard computational problems. Science, New Series, American Association for Advancement of Science. 268(5210), 1995, pp. 542-545.

Boneh. D, Dunworth. C, Lipton R J. Breaking DES Using a Molecular Computer. Proceedings of DIMACS workshop on DNA computing, Vol 27, pp. 37-51, published by the AMS, 1995.

Chen Z, Geng X, Xu. J. Efficient DNA Sticker Algorithms for DES. Proceedings of IEEE 3rd International Conference on Bio-Inspired Computing, 28 September 2008 - 01 October 2008, Adelaide, SA, Australia, IEEE, 24 October 2008.

MingXin L, XueJia L, GuoZhen X, Lei Q. Symmetric-key cryptosystem with DNA technology. Science in China Series F: Information Sciences, 2007. Vol. 50(3), pp.324-333.

Kar N, Majumder A, Saha A, Jamatia A. An Improved Data Security using DNA Sequencing. MobileHealth '13: Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare, 29 July 2013, Bengaluru, India. Association for Computing Machinery New York, NY, United States, pp.13-18.

Shiu H J, Ng K L, Fang J F, Lee R C T. Data hiding methods based upon DNA sequences. Information Sciences, 2010, Vol.180.

Liu H, Lin D, Kadir A. A novel data hiding method based on deoxyribonucleic acid coding. Computers and Electrical Engineering, 2013, Vol.39.

Mandge T, Choudhary V. A DNA Encryption Technique Based on Matrix Manipulation and Secure key Generation Scheme. Proceedings of IEEE International conference on Information Communication and Embedded Systems,21-22 February 2013, Chennai, India IEEE, 25 April 2013 pp. 47-52.

Taur J S, Lin H Y, Lee H L, Tao C W. Data hiding in DNA sequences based on Table Lookup Substitution. International Journal of Innovative Computing, Information and Control. 2012, Vol.8(10).

Huang Y H, Chang C C, Wu C Y. A DNA-based data hiding technique with low modification rates. Multimedia Tools Applications, Springer, Volume 70, pages 1439–1451, (2014)

Abbasy M R,Nikfard P, Ordi A, Torkaman M R N. DNA Base Data Hiding Algorithm. International Journal on New Computer Architectures and Their Applications (IJNCAA), January 2012, The Society of Digital Information and Wireless Communications, pp-183-193, Vol.2(1).

Tornea O, Antonini M, Borda M. Multimedia Data Compression and Encryption using DNA Cipher. Communications Department, HAL Open Science. Technical University of ClujNapoca Roumanie 2013.

Feng Z, Li X, Wei G. SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors. IEEE Transactions on Computational Social Systems. 2018. Vol 5(3), pp.1-4.

Cong W, Sherman S, Qian W, KuiRen, Wenjing L. Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE TRANSACTIONS ON COMPUTERS, 2013. Vol.62.

Srividya R and Ramesh B. Implementation of AES using biometric. International Journal of Electrical and Computer Engineering (IJECE), 2019, Vol.9.




How to Cite

Pranjali, Ramisetty S, Telagade VB, Adiga SD. A Realizable Data Encryption Strategy. EAI Endorsed Scal Inf Syst [Internet]. 2024 Feb. 28 [cited 2024 Apr. 20];. Available from: https://publications.eai.eu/index.php/sis/article/view/5230



Short communications