Search In this Thesis
   Search In this Thesis  
العنوان
Increasing securing of mobile networks using DNA-Based Cryptography System /
المؤلف
Mohammed, Dina Ibrahim Soliman.
هيئة الاعداد
باحث / دينا ابراهيم سليمان محمد
مشرف / عبد المجيد امين على
مشرف / كريم احمد إبراهيم
مشرف / محمد مسعود عبدالله
الموضوع
Mobile communication systems - Security measures. Application software.
تاريخ النشر
2022.
عدد الصفحات
104 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Computer Science (miscellaneous)
تاريخ الإجازة
1/1/2022
مكان الإجازة
جامعة المنيا - كلية العلوم - علوم الحاسب
الفهرس
Only 14 pages are availabe for public view

from 118

from 118

Abstract

A network is a group of computers, servers, mainframes, network devices, peripherals, or other devices linked together to share data. The World Wide Web, which links billions of individuals around the world, is an example of a network. Several applications and services are supported via networks, including access to the Internet, multimedia, uses applications and storage servers, printers, faxes, and email and mobile messaging programs is shared. Many advantages of the networks allow people to connect, store and access data, and use chat, videoconference, and email to connect quickly. However, the biggest advantage of a network is sharing data and information. Networks make sharing information between network users easy, so we need information security. Nowadays, we use applications to send and received private information between each other. Visuals are one technique to attract an audience’s attention and gain participation. Every day, 3.2 billion images and 720,000 hours of video are exchanged online. These images can be used to entice users to conduct research. For photographers and visual artists, social media is a very important marketing platform. Image theft is common on such platforms, with Pixsy’s image theft report finding that 49% of bloggers and social media users have stolen copyright. So, should be protected to maintain privacy and copyrights. Images may be vulnerable to different types of attacks during transmission or exchange between authenticated users. Some common attacks related to networks are network denial, masquerading, and eavesdropping. For any communication medium to be trusted between parties, it should satisfy reliability, anonymity, confidentiality, integrity, and availability. When exchanging digital images, common ways for securing these images are cryptography and steganography. Cryptography will not only guarantee confidentiality but also it can address other issues such as data integrity, authentication, and non-repudiation. With cryptography, information can be sent securely, and the only authenticated receiver can retrieve this information, thus avoiding compromise or leakage of the private data. Most cryptographic techniques require enormous memory and calculations. A gram of DNA has 〖10〗^21 DNA bases. In addition, with the storage capacity of 〖10〗^8 terabytes in a single cubic decimeter of the DNA solution and one trillion bits of binary data can be stored [1]. Furthermore, when compared to other techniques, DNA-based computations require far less time. DNA computing is a process of executing computations using biological molecules rather than typical silicon chips. DNA encryption is the technique of hiding genetic data using a computer algorithm in addition to enhancing genetic confidentiality in DNA sequencing operations. A cryptography method that uses DNA sequences to encode and decode original data based on biological processes. Individual molecules could be utilized for computation, according to American physicist Richard Feynman, who presented his views on nanotechnology in 1959. But it was not until 1994 that DNA computing was physically achieved when American computer scientist Leonard Adleman demonstrated how molecules could be employed to solve a computational problem. Data in DNA computing is displayed using the four-character genetic adenine (A), Guanine (G), Cytosine (C), and Thymine (T). Due to great interest in the secure storage and transmission of color images, the necessity for an efficient and robust RGB image encryption technique has grown. RGB image encryption ensures the confidentiality of color images during storage and transmission. In the literature, a large number of chaotic-based image encryption techniques have been proposed, but there is still a need for a robust, efficient, and secure technique against different kinds of attacks. In this thesis, a novel RGB image encryption technique is proposed for encrypting individual pixels of RGB images using chaotic systems and 16 rounds of DNA encoding, transpositions, and substitutions. First, round keys are generated randomly using a logistic chaotic function. Then, these keys are used across different rounds to alter individual pixels using a nonlinear randomly generated 16×16 DNA Playfair matrix. Experimental results show the robustness of the proposed technique against most attacks while reducing the consumed time for encryption and decryption. The quantitative metrics show the ability of the proposed technique to maintain reference evaluation values while resisting statistical and differential attacks. The obtained horizontal, vertical and diagonal correlation is less than 0.01, and the NPCR and UACI are larger than 0.99 and 0.33, respectively. Finally, NIST analysis is presented to evaluate the randomness of the proposed technique.