You are on page 1of 7

DNA CRYPTOGRAPHY

Certificate

This is to certify that Garima Jindal (1127/06), Charu Sharma (1138/06), Bismita Mohanty
(1139/06) were working under my supervision on the project “DNA Cryptography”. This project
was carried out by the above mentioned students as a part of their curriculum for B.Tech (7 th
semester) in Information Technology.

The project report submitted by them is a bonafide record of their work and the contents of the
report, in full or in parts, have not been submitted to any other institute or university for award of
any degree or diploma.

Date:………………. (Mr. Virender Kumar Ranga)


Ass. Prof. ,NIT KURUKSHETRA
Dept. of Computer Engineering
NIT Kurukshetra

NIT KURUKSHETRA i
DNA CRYPTOGRAPHY

Certificate

We hereby certify that the work which is presented in the dissertation entitled “DNA
Cryptography” in fulfillment of the requirement for the award of the degree of B.Tech and
submitted to the Department of Information Technology of National Institute of Technology
Kurukshetra, Kurukshetra, is an authentic record of our own, carried out during a period of July
2009 – December 2009, under the supervision of Mr. Virender Kumar Ranga.

We have not submitted the matter presented in this dissertation for the award of any other degree
in any other institute/university.

Garima Jindal(1127/06)
Charu Sharma(1138/06)
Bismita Mohanty (1139/06)

NIT KURUKSHETRA ii
DNA CRYPTOGRAPHY

Acknowledgement

The satisfaction that accompanies the successful completion of any task would be incomplete
without the mention of the people who made it possible and whose constant guidance and
encouragement allowed us to complete the project with success.

We would like to take the opportunity to express our sincere thanks to our project guide, Asst.
Prof. Virender Kumar Ranga for providing us the right direction for the conduction of the project
and also for his enlightening guidance that was vital for the successful completion of the project.

Garima Jindal(1127/06)
Charu Sharma(1138/06)
Bismita Mohanty (1139/06)

NIT KURUKSHETRA iii


DNA CRYPTOGRAPHY

ABSTRACT

DNA cryptography is a new born cryptographic field emerged with the research of DNA
computing, in which DNA is used as information carrier and the modern biological technology is
used as implementation tool. The vast parallelism and extraordinary information density inherent
in DNA molecules are explored for cryptographic purposes such as encryption, authentication,
signature, and so on. The main purpose or goal of the project is to implement the basic
fundamentals of DNA Cryptography using the Java platform so as to produce an encoding tool
capable of applying the elementary encoding transformations to the text.

NIT KURUKSHETRA iv
DNA CRYPTOGRAPHY

List of Figures

Fig 1.2.1 Double helix structure of DNA 2


Fig 1.12.1 Data pre(post) treatment flow chart 12
Fig 1.12.2 Flow chart of encryption scheme system 13
Fig 1.12.3 Result of PCR amplification 14
Fig 3.4.1 Use Case Diagram (Encoder) 24
Fig 3.4.2 Use Case Diagram (Decoder) 25
Fig 4.1 Project overview 27
Fig 5.2.1 Flow Diagram (Encoder) 29
Fig 5.2.2 Flow Diagram (Decoder) 30
Fig 5.3.1 Class Diagram (Encoder) 31
Fig 5.3.2 Class Diagram (Decoder) 32
Fig 5.3.3 Class Diagram (KeyGen) 33
Fig 7.1 Snapshot (Original text) 41
Fig 7.2 Snapshot (Encoded text) 42
Fig 7.3 Snapshot (Decoded text) 43

List of Tables

Table 1.3.1 Amino acids and codes 3


Table 1.13.1 The Huffman code 16
Table 1.13.2 General features of the codes 18
Table 1.13.3 Advantages of the codes 18

NIT KURUKSHETRA v
DNA CRYPTOGRAPHY

Index

CHAPTER 1 INTRODUCTION 1-19


1.1 DNA Cryptography 1
1.2 DNA 1
1.3 Amino Acid codes 3
1.4 Primer 3
1.5 Transcription and Translation 4
1.6 Cryptography 5
1.7 Advantages of DNA Cryptography 5
1.8 Limitations of DNA Cryptography 6
1.9 Comparison between traditional and DNA Cryptography 6
1.10 Development direction of DNA Cryptography 7
1.11 DNA Digital Coding Technology 9
1.12 System design of encryption scheme 10
1.13 The codes 14

CHAPTER 2 OBJECTIVE 20-21


2.1 Objective 21
2.2 Product Perspective 21

CHAPTER 3 SYSTEM REQUIRMENT ANALYSIS 22-25


3.1 Characteristics 23
3.2 System Requirements 23
3.3 Technology Used 24
3.4 Use case diagram 24

CHAPTER 4 PROJECT OVERVIEW 26-27

CHAPTER 5 SOFTWARE DESIGN 28-33


5.1 Methodology of encryption scheme 29

NIT KURUKSHETRA vi
DNA CRYPTOGRAPHY

5.2 Flow Diagram 29


5.3 Class Diagram 31

CHAPTER 6 SOFTWARE TESTING 34-39


6.1 Testing methodology 35
6.2 Testing Objectives 35
6.3 Testing Techniques 35
6.4 Testing Strategies 38

CHAPTER 7 PROJECT SNAPHOTS 40-43


7.1 Text file 41
7.2 Encoded file 42
7.3 Decoded file 43

CHAPTER 8 CONCLUSION 44-45

CHAPTER 9 FUTURE PROSPECTS AND ENHANCEMENTS 46-47

Appendix 48
Bibliography 49

NIT KURUKSHETRA vii

You might also like