A COMPETENT MAC SCHEME DESIGNED USING A UNIQUE DNA-BRNG KEY AND A NOVEL HASH ALGORITHM

The current communication sector demands security over anything else. Considering the confidential data transmission and involvement of technology in everyday payment modes, many schemes have been employed in order to achieve this goal. Authentication and integrity form the base of a secure system,...

Full description

Bibliographic Details
Main Authors: GURPREET K. SODHI, GURJOT S. GABA
Format: Article
Language:English
Published: Taylor's University 2018-02-01
Series:Journal of Engineering Science and Technology
Subjects:
DNA
Online Access:http://jestec.taylors.edu.my/Vol%2013%20issue%202%20February%202018/13_2_17.pdf
Description
Summary:The current communication sector demands security over anything else. Considering the confidential data transmission and involvement of technology in everyday payment modes, many schemes have been employed in order to achieve this goal. Authentication and integrity form the base of a secure system, and various research techniques have been employed for primarily prevention and secondarily detection of data modification. MAC serves the best purpose when it comes to retention of integrity, and its efficiency is increased on pairing it up with a secret key. In this paper, a new message authentication code (MAC) is proposed based on feature extraction of the user's DNA and Bernoulli Random Number Generator’s sequence used as key along with a novel hash algorithm. This scheme ensures integrity and the evaluation is done on the basis of NIST test suite for random numbers, which evaluates the outputs by calculating their P value which has to be greater than 0.01 and strict avalanche criteria. Further the performance of the proposed algorithm is analyzed by comparing it with other existing HMAC schemes available and evaluating its behavior towards various network attacks. The proposed scheme has strong security attributes since it involves the fusion of unique biological characteristics along with technical aspects thus making it applicable for data sensitive environments.
ISSN:1823-4690