Open Access iconOpen Access

ARTICLE

crossmark

Amino Acid Encryption Method Using Genetic Algorithm for Key Generation

Ahmed S. Sakr1, M. Y. Shams2, Amena Mahmoud3, Mohammed Zidan4,*

1 Department of Information System, Faculty of Computers and Information, Menofia University, Egypt
2 Department of Machine learning and Information Retrieval, Faculty of Artificial Intelligence, Kafrelsheikh University, Egypt
3 Department of Computer Science, Faculty of Computers and Information, Kafrelshiekh University, Egypt
4 Hurghada Faculty of Computers and Artificial Intelligence, South Valley University, Egypt

* Corresponding Author: Mohammed Zidan. Email: email

(This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)

Computers, Materials & Continua 2022, 70(1), 123-134. https://doi.org/10.32604/cmc.2022.019455

Abstract

In this new information era, the transfer of data and information has become a very important matter. Transferred data must be kept secured from unauthorized persons using cryptography. The science of cryptography depends not only on complex mathematical models but also on encryption keys. Amino acid encryption is a promising model for data security. In this paper, we propose an amino acid encryption model with two encryption keys. The first key is generated randomly using the genetic algorithm. The second key is called the protein key which is generated from converting DNA to a protein message. Then, the protein message and the first key are used in the modified Playfair matrix to generate the cypher message. The experimental results show that the proposed model survives against known attacks such as the Brute-force attack and the Ciphertext-only attack. In addition, the proposed model has been tested over different types of characters including white spaces and special characters, as all the data is encoded to 8-bit binary. The performance of the proposed model is compared with other models using encryption time and decryption time. The model also balances all three principles in the CIA triad.

Keywords


Cite This Article

A. S. Sakr, M. Y. Shams, A. Mahmoud and M. Zidan, "Amino acid encryption method using genetic algorithm for key generation," Computers, Materials & Continua, vol. 70, no.1, pp. 123–134, 2022.

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2374

    View

  • 1287

    Download

  • 0

    Like

Share Link