Open Access
ARTICLE
Amino Acid Encryption Method Using Genetic Algorithm for Key Generation
1 Department of Information System, Faculty of Computers and Information, Menofia University, Egypt
2 Department of Machine learning and Information Retrieval, Faculty of Artificial Intelligence, Kafrelsheikh University, Egypt
3 Department of Computer Science, Faculty of Computers and Information, Kafrelshiekh University, Egypt
4 Hurghada Faculty of Computers and Artificial Intelligence, South Valley University, Egypt
* Corresponding Author: Mohammed Zidan. Email:
(This article belongs to the Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
Computers, Materials & Continua 2022, 70(1), 123-134. https://doi.org/10.32604/cmc.2022.019455
Received 13 April 2021; Accepted 14 May 2021; Issue published 07 September 2021
Abstract
In this new information era, the transfer of data and information has become a very important matter. Transferred data must be kept secured from unauthorized persons using cryptography. The science of cryptography depends not only on complex mathematical models but also on encryption keys. Amino acid encryption is a promising model for data security. In this paper, we propose an amino acid encryption model with two encryption keys. The first key is generated randomly using the genetic algorithm. The second key is called the protein key which is generated from converting DNA to a protein message. Then, the protein message and the first key are used in the modified Playfair matrix to generate the cypher message. The experimental results show that the proposed model survives against known attacks such as the Brute-force attack and the Ciphertext-only attack. In addition, the proposed model has been tested over different types of characters including white spaces and special characters, as all the data is encoded to 8-bit binary. The performance of the proposed model is compared with other models using encryption time and decryption time. The model also balances all three principles in the CIA triad.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.