Advertisement

Chinese Science Bulletin

, Volume 59, Issue 11, pp 1192–1198 | Cite as

A molecular cryptography model based on structures of DNA self-assembly

  • Jing YangEmail author
  • Jingjing Ma
  • Shi Liu
  • Cheng ZhangEmail author
Article Computer Science & Technology

Abstract

With the progress of DNA computing, DNA-based cryptography becomes an emerging interdisciplinary research field. In this paper, we present a novel DNA cryptography that takes advantage of DNA self-assembled structure. Making use of the toehold strands recognition and strand displacement, the bit-wise exclusive-or (XOR) operation is carried out to fulfill the information encryption and decryption in the form of a one-time-pad. The security of this system mainly comes from the physical isolation and specificity of DNA molecules. The system is constructed by using complex DNA self-assembly, in which technique of fluorescent detection is utilized to implement the signal processing. In the proposed DNA cryptography, the XOR operation at each bit is carried out individually, thus the encryption and decryption process could be conducted in a massive, parallel way. This work may demonstrate that DNA cryptography has the great potential applications in the field of information security.

Keywords

Molecular cryptography One-time-pad Fluorescent signal DNA self-assembly Strand displacement 

Notes

Acknowledgments

This work was supported by the National Natural Science Foundation of China (61370099, 61143003, 61272161, 61127005, 61133010, and 61272246), the Beijing Excellent Talent Training Project (2013D009005000002), the Program of Introducing Talents of Discipline to Universities (B13009), the Program for Changjiang Scholars and Innovative Research Team in University (IRT0952), and the Fundamental Research Funds for the Central University (13QN14).

References

  1. 1.
    Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Science 266:1021–1024CrossRefGoogle Scholar
  2. 2.
    Lipton RJ (1995) DNA solution of hard computational problems. Science 268:542–545CrossRefGoogle Scholar
  3. 3.
    Ouyang Q, Kaplan PD, Liu S et al (1997) DNA solution of the maximal clique problem. Science 278:446–449CrossRefGoogle Scholar
  4. 4.
    Yang J, Zhang C, Xu J et al (2010) A novel computing model of the maximum clique problem based on circular DNA. Sci China Inf Sci 53:1409–1416CrossRefGoogle Scholar
  5. 5.
    Zhang C, Yang J, Xu J (2011) Molecular logic computing model based on self-assembly of DNA nanoparticles. Chin Sci Bull 56:3566–3571CrossRefGoogle Scholar
  6. 6.
    Fang X, Lai X (2010) DNA modular subtraction algorithm based on linear self-assembly. Chin Sci Bull 55:1574–1580CrossRefGoogle Scholar
  7. 7.
    Song S, Wang C (2012) Recent development in quantum communication. Chin Sci Bull 57:4694–4700CrossRefGoogle Scholar
  8. 8.
    Zhang S, Feng H, Li X et al (2010) Genome research profile of two cordyceps sinensis cDNA libraries. Chin Sci Bull 55:1403–1411CrossRefGoogle Scholar
  9. 9.
    Shin JS, Pierce NA (2004) Rewritable memory by controllable nanopatterning of DNA. Nano Lett 4:905–909CrossRefGoogle Scholar
  10. 10.
    Celland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399:533–534CrossRefGoogle Scholar
  11. 11.
    Gehani A, LaBean TH, Reif JH (2000) DNA-based cryptography. In: Winfree E, Gifford DK (eds) DNA Based Computers V. American Mathematical Society, Providence, pp 233–249Google Scholar
  12. 12.
    Leier A, Richter C, Banzhaf W et al (2000) Cryptography with DNA binary strands. Biosystems 57:13–22CrossRefGoogle Scholar
  13. 13.
    Xiao G, Lu M, Qin L et al (2006) New field of cryptography: DNA cryptography. Chin Sci Bull 51:1413–1420CrossRefGoogle Scholar
  14. 14.
    Chen Z, Xu J (2010) One-time-pads encryption in the tile assembly model. J Comput Theor Nanosci 7:848–855CrossRefGoogle Scholar
  15. 15.
    Lu M, Lai X, Xiao G et al (2007) Symmetric-key cryptosystem with DNA technology. Sci China Ser F Inf Sci 50:324–333CrossRefGoogle Scholar
  16. 16.
    Schneier B (1996) Applied cryptography. Protocol, algorithms, and source code in C, 2nd edn. Wiley, New YorkGoogle Scholar
  17. 17.
    Elbaz J, Moshe M, Willner I (2009) Coherent activation of DNA tweezers: a “SET–RESET” logic system. Angew Chem Int Ed 48:3834–3837CrossRefGoogle Scholar
  18. 18.
    Zhang C, Yang J, Xu J (2010) The circular DNA logic gates with branch migration. Langmuir 26:1416–1419CrossRefGoogle Scholar
  19. 19.
    Qian L, Winfree E (2011) Scaling up digital circuit computation with DNA strand displacement cascades. Science 332:1196–1201CrossRefGoogle Scholar
  20. 20.
    Heiss G, Lapiene V, Kukolka F et al (2009) Single-molecule investigations of a photoswitchable nanodevice. Small 5:1169–1175Google Scholar
  21. 21.
    Shin SR, Jin KS, Lee CK et al (2009) Fullerene attachment enhances performance of a DNA nanomachine. Adv Mater 21:1907–1910CrossRefGoogle Scholar
  22. 22.
    Chakraborty B, Sha R, Seeman NC (2008) A DNA-based nanomechanical device with three robust states. Proc Natl Acad Sci USA 45:17245–17249CrossRefGoogle Scholar
  23. 23.
    Cui G, Liu Y, Zhang X (2006) New direction of data storage: DNA molecular storage technology. Comput Eng Appl 42:29–32Google Scholar
  24. 24.
    Chen J (2003) A DNA-based, biomolecular cryptography design. Proceedings of the 2003 IEEE international symposium on circuits and systems (ISCAS). Div. of Eng., Brown University Press, United States, pp 822–825Google Scholar

Copyright information

© Science China Press and Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Beijing Key Laboratory of New Technology and System on Measuring and Control for Industrial Process, School of Control and Computer EngineeringNorth China Electric Power UniversityBeijingChina
  2. 2.Key Laboratory of High Confidence Software Technologies, Ministry of Education, Institute of Software, School of Electronics Engineering and Computer SciencePeking UniversityBeijingChina

Personalised recommendations