Secure and Compressed Data Transmission Using ECC Key Sharing, DNA Cryptography, and LZ77 Compression
DOI:
https://doi.org/10.70454/JRICST.2026.30101Keywords:
Compressed Data, ECC Key Sharing, DNA Cryptography, LZ77 Compression, Encryption and DecryptionAbstract
In the evolving landscape of digital communication, the need for secure, lightweight, and efficient data protection mechanisms is more critical than ever, particularly for bandwidth-constrained and privacy-sensitive applications. This paper proposes a novel hybrid cryptographic framework that synergistically combines three powerful techniques: Elliptic Curve Cryptography (ECC), DNA-based cryptography, and LZ77 data compression. The framework utilizes ECC for secure key sharing between communication parties due to its strong security and low computational overhead. Once the session key is established, DNA cryptographic techniques are applied for the encryption and decryption of sensitive data, exploiting the high parallelism, randomness, and vast encoding capacity of DNA sequences. To further enhance transmission efficiency, the plaintext is first compressed using the LZ77 algorithm, reducing redundancy before encryption. This layered approach not only ensures high security and resistance to cryptanalytic attacks but also achieves significant data compression, making it suitable for secure data transmission in constrained environments such as Internet of Things (IoT) and telemedicine. Experimental results demonstrate that the proposed scheme maintains confidentiality, integrity, and performance, while significantly optimizing storage and transmission requirements.
Downloads
References
[1] R. Qazi, K. N. Qureshi, F. Bashir, N. U. Islam, S. Iqbal, and A. Arshad, “Security protocol using elliptic curve cryptography algorithm for wireless sensor networks,” J. Ambient Intell. Humanized Comput., vol. 12, pp. 547–566, 2021.
[2] S. Kumar and D. Sharma, “Key generation in cryptography using elliptic-curve cryptography and genetic algorithm,” Eng. Proc., vol. 59, no. 1, p. 59, 2023.
[3] P. Suthanthiramani, S. Muthurajkumar, G. Sannasi, and K. Arputharaj, “Secured data storage and retrieval using elliptic curve cryptography in cloud,” Int. Arab J. Inf. Technol., vol. 18, no. 1, pp. 56–66, 2021.
[4] S. R. Moosavi and A. Izadifar, “End-to-end security scheme for e-Health systems using DNA-based ECC,” in Proc. Silicon Valley Cybersecurity Conf., Cham, Switzerland: Springer, Dec. 2021, pp. 77–89.
[5] R. Ma and L. Du, “Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography,” PLoS One, vol. 19, no. 5, p. e0300153, 2024.
[6] E. A. Hagras, S. Aldosary, H. Khaled, and T. M. Hassan, “Authenticated public key elliptic curve based on deep convolutional neural network for cybersecurity image encryption application,” Sensors, vol. 23, no. 14, p. 6589, 2023.
[7] V. N. Kumaran et al., “A secure medical image encryption technique based on DNA cryptography with elliptic curves,” Sci. Rep., vol. 15, no. 1, pp. 1–18, 2025.
[8] S. Aqeel, A. S. Khan, I. A. Abbasi, F. Algarni, and D. Grzonka, “Enhancing IoT security with a DNA-based lightweight cryptography system,” Sci. Rep., vol. 15, no. 1, p. 13367, 2025.
[9] P. Mukherjee et al., “Best fit DNA-based cryptographic keys: The genetic algorithm approach,” Sensors, vol. 22, no. 19, p. 7332, 2022.
[10] C. T. Berezin, S. Peccoud, D. M. Kar, and J. Peccoud, “Cryptographic approaches to authenticating synthetic DNA sequences,” Trends Biotechnol., 2024.
[11] L. L. Zheng et al., “Enthalpy and entropy synergistic regulation–based programmable DNA motifs for biosensing and information encryption,” Sci. Adv., vol. 9, no. 20, p. eadf5868, 2023.
[12] S. Patel and T. Veeramalai, “Image encryption using a spectrally efficient Halton logistics tent map and DNA encoding,” Entropy, vol. 24, no. 6, p. 803, 2022.
[13] S. Chen et al., “Efficient sequencing data compression and FPGA acceleration based on a two-step framework,” Front. Genet., vol. 14, p. 1260531, 2023.
[14] A. Hong and C. Boucher, “Enhancing data compression: Recent innovations in LZ77 algorithms,” J. Comput. Biol., 2025.
[15] T. Nishimoto and Y. Tabei, “LZRR: LZ77 parsing with right reference,” Inf. Comput., vol. 285, p. 104859, 2022.
[16] D. Kempa and B. Langmead, “Fast and space-efficient construction of AVL grammars from the LZ77 parsing,” in LIPIcs–Leibniz Int. Proc. Informatics, vol. 204, 2021, p. 56.
[17] D. Köppl, “Non-overlapping LZ77 factorization and LZ78 substring compression queries with suffix trees,” Algorithms, vol. 14, no. 2, p. 44, 2021.
[18] N. Dhamala and K. P. Acharya, “A comparative analysis of DES, AES and Blowfish based DNA cryptography,” Adhyayan J., vol. 11, no. 11, pp. 69–80, 2024.
[19] X. Xue, D. Zhou, and C. Zhou, “New insights into the existing image encryption algorithms based on DNA coding,” PLoS One, vol. 15, no. 10, p. e0241184, 2020.
[20] R. K. Giri et al., “An innovation analysis of LZ77 and LZ78 compression algorithms for data compression & source coding,” in Proc. 15th Int. Conf. Comput. Commun. Netw. Technol. (ICCCNT), Kamand, India, 2024, pp. 1–5.
[21] V. Saxena and P. Kumar, “Secure transaction of digital currency through fuzzy based cryptography,” Indian J. Sci. Technol., vol. 16, no. 37, pp. 3148–3158, 2023.
[22] P. Kumar and V. Saxena, “Nested levels of hybrid cryptographical technique for secure information exchange,” J. Comput. Commun., vol. 12, no. 2, pp. 201–210, 2024.
[23] P. Kumar, V. Saxena, and K. V. Singh, “Analysis of hybrid cryptography for secure exchange of information,” Int. J. Comput. Appl., vol. 185, no. 4, pp. 37–42, 2023.
[24] P. Kumar and V. Saxena, “Hybrid cryptography for security key exchange through AES and Paillier,” Eur. Chem. Bull., vol. 12, no. 10, pp. 3913–3921, 2023.
[25] S. Kumar et al., “Securing cloud-based systems: DDoS attack mitigation using hypervisor-intrusion detection approach,” Procedia Comput. Sci., vol. 259, pp. 1366–1375, 2025.
[26] M. Pundir and A. Kumar, “An efficient conference key agreement protocol suited for resource constrained devices,” J. Parallel Distrib. Comput., vol. 196, p. 105011, 2025.
[27] A. Kumar and M. Hussain, “Secure ECC based key exchange mechanism for devices in IoT networks,” in Proc. 14th Int. Conf. Contemporary Comput., Aug. 2022, pp. 175–179.
[28] Z. Qin et al., “An efficient key management scheme based on ECC and AVL tree for large scale wireless sensor networks,” Int. J. Distrib. Sens. Netw., vol. 11, no. 9, 2015.
[29] X. Huang et al., “Towards next-generation DNA encryption via an expanded genetic system,” Nat. Sci. Rev., vol. 12, no. 4, Apr. 2025.
[30] A. Kaushik and S. Satvika, “The chaotic dynamics of DNA: A survey on DNA cryptography,” Int. J. Comput. Appl., vol. 187, no. 16, pp. 29–37, Jun. 2025.
[31] V. N. S. Kumaran et al., “A secure medical image encryption technique based on DNA cryptography with elliptic curves,” Sci. Rep., vol. 15, p. 20003, 2025.
[32] T. Mahjabin et al., “A survey on DNA-based cryptography and steganography,” IEEE Access, vol. 11, pp. 116423–116451, 2023.
[33] L. Chu et al., “A review of DNA cryptography,” Intell. Comput., vol. 4, p. 0106, 2025.
[34] J. Blocki, S. Lee, and B. S. Y. Garcia, “Differentially private compression and the sensitivity of LZ77,” arXiv preprint arXiv:2502.09584, 2025.
[35] Y. Huang, A. Song, C. Guo, and Y. Yang, “ASIC design of LZ77 compressor for computational storage drives,” Electron. Lett., vol. 59, no. 22, p. e13000, 2023.
[36] R. K. Giri et al., “An innovation analysis of LZ77 and LZ78 compression algorithms for data compression & source coding,” in Proc. 15th ICCCNT, Kamand, India, 2024, pp. 1–5.
[37] J. Blocki, S. Lee, and B. S. Y. Garcia, “Differentially private compression and the sensitivity of LZ77,” arXiv preprint arXiv:2502.09584, 2025.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Asamene Kelelom, Addisu Oumer, Pawan Kumar, Beer Singh (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
This is an Open Access article distributed under the term's of the Creative Common Attribution 4.0 International License permitting all use, distribution, and reproduction in any medium, provided the work is properly cited.