Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography

Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of information between the two parties without int...

Full description

Bibliographic Details
Main Authors: Noura A. Mawla, Hussein K. Khafaji
Format: Article
Language:English
Published: MDPI AG 2023-08-01
Series:Computers
Subjects:
Online Access:https://www.mdpi.com/2073-431X/12/8/166
_version_ 1797585110066790400
author Noura A. Mawla
Hussein K. Khafaji
author_facet Noura A. Mawla
Hussein K. Khafaji
author_sort Noura A. Mawla
collection DOAJ
description Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of information between the two parties without interference from an unauthorized third party. This paper proposes a modern approach to cryptography and steganography based on exploiting a new environment: bases and protein chains used to encrypt and hide sensitive data. The protein bases are used to form a cipher key whose length is twice the length of the data to be encrypted. During the encryption process, the plain data and the cipher key are represented in several forms, including hexadecimal and binary representation, and several arithmetic operations are performed on them, in addition to the use of logic gates in the encryption process to increase encrypted data randomness. As for the protein chains, they are used as a cover to hide the encrypted data. The process of hiding inside the protein bases will be performed in a sophisticated manner that is undetectable by statistical analysis methods, where each byte will be fragmented into three groups of bits in a special order, and each group will be included in one specific protein base that will be allocated to this group only, depending on the classifications of bits that have been previously stored in special databases. Each byte of the encrypted data will be hidden in three protein bases, and these protein bases will be distributed randomly over the protein chain, depending on an equation designed for this purpose. The advantages of these proposed algorithms are that they are fast in encrypting and hiding data, scalable, i.e., insensitive to the size of plain data, and lossless algorithms. The experiments showed that the proposed cryptography algorithm outperforms the most recent algorithms in terms of entropy and correlation values that reach −0.6778 and 7.99941, and the proposed steganography algorithm has the highest payload of 2.666 among five well-known hiding algorithms that used DNA sequences as the cover of the data.
first_indexed 2024-03-11T00:01:16Z
format Article
id doaj.art-5ed91a03fe5042d58050ff1c22e13c0c
institution Directory Open Access Journal
issn 2073-431X
language English
last_indexed 2024-03-11T00:01:16Z
publishDate 2023-08-01
publisher MDPI AG
record_format Article
series Computers
spelling doaj.art-5ed91a03fe5042d58050ff1c22e13c0c2023-11-19T00:43:28ZengMDPI AGComputers2073-431X2023-08-0112816610.3390/computers12080166Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and SteganographyNoura A. Mawla0Hussein K. Khafaji1Department of Computer Science, AL-Rafidain University College, Baghdad 46036, IraqDepartment of Computer Science, AL-Rafidain University College, Baghdad 46036, IraqNowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data security and confidentiality is of paramount importance. Several techniques are used in cryptography and steganography to ensure their safety during the transfer of information between the two parties without interference from an unauthorized third party. This paper proposes a modern approach to cryptography and steganography based on exploiting a new environment: bases and protein chains used to encrypt and hide sensitive data. The protein bases are used to form a cipher key whose length is twice the length of the data to be encrypted. During the encryption process, the plain data and the cipher key are represented in several forms, including hexadecimal and binary representation, and several arithmetic operations are performed on them, in addition to the use of logic gates in the encryption process to increase encrypted data randomness. As for the protein chains, they are used as a cover to hide the encrypted data. The process of hiding inside the protein bases will be performed in a sophisticated manner that is undetectable by statistical analysis methods, where each byte will be fragmented into three groups of bits in a special order, and each group will be included in one specific protein base that will be allocated to this group only, depending on the classifications of bits that have been previously stored in special databases. Each byte of the encrypted data will be hidden in three protein bases, and these protein bases will be distributed randomly over the protein chain, depending on an equation designed for this purpose. The advantages of these proposed algorithms are that they are fast in encrypting and hiding data, scalable, i.e., insensitive to the size of plain data, and lossless algorithms. The experiments showed that the proposed cryptography algorithm outperforms the most recent algorithms in terms of entropy and correlation values that reach −0.6778 and 7.99941, and the proposed steganography algorithm has the highest payload of 2.666 among five well-known hiding algorithms that used DNA sequences as the cover of the data.https://www.mdpi.com/2073-431X/12/8/166cyber-attackshackingsecuritycryptographysteganographyhexadecimal system
spellingShingle Noura A. Mawla
Hussein K. Khafaji
Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
Computers
cyber-attacks
hacking
security
cryptography
steganography
hexadecimal system
title Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
title_full Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
title_fullStr Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
title_full_unstemmed Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
title_short Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
title_sort enhancing data security a cutting edge approach utilizing protein chains in cryptography and steganography
topic cyber-attacks
hacking
security
cryptography
steganography
hexadecimal system
url https://www.mdpi.com/2073-431X/12/8/166
work_keys_str_mv AT nouraamawla enhancingdatasecurityacuttingedgeapproachutilizingproteinchainsincryptographyandsteganography
AT husseinkkhafaji enhancingdatasecurityacuttingedgeapproachutilizingproteinchainsincryptographyandsteganography