3 PROBLEM STATEMENT
Figure 1 displays a MANET routed message from
Jack to Jill routed at two different times, through
secure and potentially malicious nodes. A truly ad
hoc network permits routing in the presence of un-
trusted peers. In this case, message traffic is between
Jack and Jill. Nodes A, B and C are trustworthy
nodes at time t
1
and nodes α and β are potentially
malicious nodes. At time t
2
, the situation is reversed.
The problem of successful routing of messages
over potentially un-trusted nodes requires:
Routed messages arrive at the destination intact
Routed messages remain confidential in
transmission
Cryptanalysis of message traffic passing through
nodes other Jack or Jill is unlikely to be successful.
Nodes enter and leave the network at will.
Figure 1: MANET routed over secure nodes at t
1
(
___
) and
secure nodes at t
2
(---).
4 ENCRYPTION PROCESS
• Two or more users define a plaintext dictionary,
and a DNA based dictionary. The users define
the method by which plaintext is represented by
the four DNA bases. The DNA dictionary is the
is the source of messages and encryption keys
(chromosomes)
• Messages are pre-coded from plaintext into
DNA using a system of linear equations relating
word position in the message and the ordinal
position in the dictionary
• Chromosomes encrypt multiple permutations of
the message
• The permutations are tested for fitness and the
most fit permutation is selected for transmission
by the source.
• The recipient decrypts the message with the
same chromosomes
• The genome is expanded by mutating the
chromosomes with each other or with message
sequences.
The system is based upon operations upon words
and not individual characters. The only individual
characters that are encrypted are one character
words.
Users of the DNA encryption tool are endowed
with a starter genome which provides the equivalent
of a small dictionary for initiating messages, an
intended recipient capable of possessing a secret,
shared key, and a secret encryption/decryption
sequence to initiate communication. Chromosomes
are “long” compared to message sequences.
Let D represent a dictionary (lexicographically
ordered set) of all words such that D
0
represents the
first word in the dictionary and that sender and
receiver compose messages of W
i
words (genes). A
function U converts words to sequences of DNA
bases B
q
as shown below:
D
i -1
< D
i
< D
i + 1
∀ i < n
(1)
W
i
, ⊆ D
n
(2)
D
i
= U(W
i
,B
q
) (3)
There exists a one-to-one mapping between the
plaintext dictionary and DNA dictionary built from
B
q
={A,T,C,G} and. The binary coding for the bases
is shown in table 1. Note that A and T, and C and G
are inverses.
Table 1: DNA base coding.
Base Binary
value
Base Binary
value
Adenine 0011 Thymine 1100
Cytosine 1001 Guanine 0110
Given an alphabet of n characters, words of
character length m, each plaintext word codes into a
DNA word (gene) of x basepairs in length creating c
i
possible combinations of DNA words for each
plaintext word and Y total combinations DNA words
for the dictionary as shown below.
log
2
(n) = x (4)
c
i
= 2
(x*m)
(5)
Y = Σ c
i
, i=1,…,i
max
(6)
For n=8 with a character set consisting of
{a,e,i,o,u,n,s,t}, and m= 3, there would be 584 total
entries. Selected entries from such a dictionary are
shown in table 2. Sequences of nonsense words can
be inserted between plaintext words. As the
character set and character length increases, the
number of possible words (mostly nonsense words)
increases exponentially. Actual words can be padded
with interspersed nonsense words to increase
security. Figure 2 shows displays the maximum size
of the DNA dictionary for 8, 32 and 256 character
A DNA-INSPIRED ENCRYPTION METHODOLOGY FOR SECURE, MOBILE AD-HOC NETWORKS (MANET)
473