Академический Документы
Профессиональный Документы
Культура Документы
161
Input Output service is called “Web Service Composition” and it is identify
by using automata theory [13].
Next Current Output
State Logic State Logic Logic
B. Triple State DNA Cryptography [14]
Security of personal information, business transactions
Fig.1. Moore Machine of FSM information, financial data information and other important
related information are important in current era with E-
B. DNA Commence technology.
To make E-Commence transaction more secure and
Deoxyribo Nucleic Acid, commonly known as DNA in the
reliable, theory of cryptography is apply. Cryptography is the
short form. In molecular of the biology, the human genetic
technique of transfer or converts the plain (original) message
information is representing in DNA. The structure of the DNA
into the unrecognized form during the transmission of the
is made by the four types of the nucleotides, which [1][2][3]:
message. This is to prevent the original message to reach at
i. Thymine (T) unauthorized user or easily accessing by unauthorized person
ii. Cytosine ( C ) [14].
iii. Guanine ( G ) and IV. METHODOLOGY
iv. Adenine (A) This chapter defines the summary of theoretical framework
done in the research and the methods used.
A. Proposed Algorithm and Works Flow
Algorithm/Steps:
Begin:
Fig.3 The Backbone of DNA Strand [3][5] Step 1: The Internet users insert password to login
into the service.
Figure 3 is shown the structure of the DNA, where the
structure of the DNA at each of the single strand is linked Step 2: Password inserted will converted into
together with the hydrogen bond. encrypted password based on the DNA
Approach Password Conversion Generator,
This is to make the DNA structure becomes double strand
with the System Private Key (complement).
and it make the hydrogen bond between each other, which is C
and G is bond and A and T is link [1] [3]. Step 3: The new password with the key will transfer
to the service provider.
Step 4: The password will be verified by the service
III. LITERATURE REVIEW provider with System Private Key
(complement).
There have been several studies done before to develop an
algorithm by using the Automata Theory or DNA Approach. Step 5: Let the user’s access to the service, if the
These reviews of the related literature on the topics were done password is valid and reject the user’s, if the
in previous journals or article presented in the past conference. password is invalid.
There are comparisons made between the review on the End.
security, Cryptography, and the algorithm.
Below is the description of the review which is most
importantly related to this critical review title.
A. Automated Choreographer Synthesis for Web Service [13]
162
TABLE 1. MEALY MACHINE TRANSITIONS TABLE
Qx∑ Δ
vi. Sn :
It is an Initial State of mealy machine, Q.
163
3) Expected Result of the JFLAP Simulation Code Book and
Figure 06 shown JFLAP Simulation Results.
164
VII. CONCLUSION & FUTURE RESEARCH [3] G.Jacob & A.Murugan. “DNA Based Cryptography: An Overview and
Analysia.” International Journal of Emerging Science. Vol. 3, No.1,
The evolution of the information technology expended in March 2013.
this era especially in an internet services. The sensitive [4] J.Patarin. “The “coefficients H” Technique.” University De Versailles.
personal data such as, personal login password, identification 2008.
numbers, credit card numbers, internet banking authentication [5] M. Reza, S.K.Nazanin & R.Azizallah. “Innovative Approach to Improve
password and others. All of the sensitive personal data is Hybrid Cryptography by Using DNA Steganography.” International
required more careful and alert during the transactions is made Journal on New Computer Architectures and Applications. Vol. 2, No.1,
Pg.224-235, 2012.
over the network.
[6] S.Harneet, C.Karan, D.Harsh & A.K.Verma. “DNA Based
This study explorer an algorithm with using the Finite State Cryptography: An Approach to Secure Mobile Network.” International
Machine (Mealy Machine) theory to simulate that, an Journal of Computer Applications. Vol. 1, No.19, 2010.
algorithm is secure and able to provide the high level [7] P.A.Jyotirmie, A.C.Sekhar & S.U.Devi. “Application of Mealy Machine
and Recurrence Matrices in Cryptography.” International Journal of
protection on the sensitive personal data during transmissions Computer Science and Management Research. Vol. 2, Issue No. 6, June
via the internet connections. 2013.
Based on the fundamental of the algorithm designed, it able [8] R.Kalihari, T.Verma & A.Jaiswal. “Concept of Automated Machine
Using Mealy.” International Journal of Computer Applications
to secure up to 3 levels of combination of the conversion and Technology and Research. Vol. 2, Issue No. 3, Pg.335-339, 2013.
the algorithm production of the conversion is not easy to break [9] M.Ana & S.Balwinder. “Finite State Machine Based Vending Machine
by the unauthorized persons. Controller with Auto-Billing Features.” International Journal of VLSI
Design & Communication System (VLSICS). Vol. 3, No.2, 2012.
ACKNOWLEDGMENT [10] R.Susan. “Automata Theory and Application (JFLAP Ver. 7.0).” Duke
The authors wish to thanks Dr. Mohd Taufik Abdullah University, 2010.
from the Department of Computer Science, Faculty of [11] XILINX. “Lab Workbook – Finite State Machines (Ver. Nexys3) .”
Xilinx University, 2013.
Computer Science and Information Technology, Universiti
Putra Malaysia (UPM) for his knowledge support on this study. [12] J.K.Hu & X.Kai. “Handbook of Information and Communication
Security (Bio-Cryptography).” Springer, 2010.
REFERENCES [13] R.Kumar & S.Basu. “Automated Choreographer Synthesis For Web
Services Composition Using I/O Automata.” IEEE International
[1] A.M.Ban, & K.A.Adeeba. “Proposed Steganography Approach Using Conference, July 2007.
DNA Properties.” International Journal of Information Technology and
[14] S.Rupali, P.Gopal, K.Arif & K.Deepak. “Triple Stage DNA
Business Management. Vol. 14, No.1, June 2013.
Cryptography Using Sequential Machine.” International Journal of
[2] P.Vijayakumar, V.Vijayalakshmi & G.Zayaraz. “Enhanced Level of Advanced Research in Computer Science and Software Engineering.
Security Using DNA Computing Technique with Hyperelliptic Curve Vol. 3, Issue 8, August 2013.
Cryptography.” ACEEE Int. J. On Network Security. Vol. 4, No.1, July
2013.
165