Advertisement

An Improved Method of DNA Information Encryption

  • Guangzhao Cui
  • Dong Han
  • Yan Wang
  • Yanfeng Wang
  • Zicheng Wang
Part of the Communications in Computer and Information Science book series (CCIS, volume 472)

Abstract

A scheme utilizing DNA technology for the purposes of DNA cryptography has been developed. To enhance the security of DNA cryptosystem, we used DNA digital encoding, complementary rules and biotechnological methods in this scheme. The experimental result showed that the scheme is feasible and the security analysis indicated that the scheme has a strong confidentiality.

Keywords

DNA computing DNA cryptography DNA digital encoding Complementary rule Steganography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adleman, L.: Molecular computation of solutions to combinational problems. J. Science 266(11), 1021–1024 (1994)CrossRefGoogle Scholar
  2. 2.
    Adleman, L., et al.: On applying molecular computation to the data encryption standard. J. Journal of Computational Biology 6(1), 53–63 (1999)CrossRefGoogle Scholar
  3. 3.
    Amos, M., et al.: Topics in the theory of DNA computing. J. Theoretical Computer Science 287(1), 3–38 (2002)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Zhang, X.C., Wang, Y.F., Cui, G.Z., et al.: Application of a novel IWO to the design of encoding sequences for DNA computing. J. Computers & Mathematics with Applications 57(11), 2001–2008 (2009)CrossRefGoogle Scholar
  5. 5.
    Qian, L., Winfree, E.: Scaling up digital circuit computation with DNA strand displacement cascades. J. Science 332, 1196–1201 (2011)CrossRefGoogle Scholar
  6. 6.
    Gehani, A., LaBean, T.H., Reif, J.H.: DNA-based cryptography. DNA Based Computers V. Providence: American Mathematical Society 54, 233–249 (2000)MathSciNetGoogle Scholar
  7. 7.
    Kazuo, T., Akimitsu, O., Isao, S.: Public-key system using DNA as a one-way function for key distribution. J. Biosystems 81, 25–29 (2005)CrossRefGoogle Scholar
  8. 8.
    Xiao, G.Z., Lu, M.X., Qin, L., et al.: New field of cryptography: DNA cryptography. J. Chinese Science Bullentin 51(12), 1413–1420 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Jiao, S.-H., Goutte, R.: Hiding data in DNA of living organisms. J. Natural Science 1(3), 181–184 (2009)CrossRefGoogle Scholar
  10. 10.
    Celland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. J. Nature 399, 533–534 (1999)CrossRefGoogle Scholar
  11. 11.
    Leier, A., Richter, C., Banzhaf, W., et al.: Cryptography with DNA binary strands. J. Biosystems 57(1), 13–22 (2000)CrossRefGoogle Scholar
  12. 12.
    Rao, N.N.: A cryptosystem based on recombinant DNA technique. J. Acta Electronica Sinica 32(7), 1216–1218 (2004)Google Scholar
  13. 13.
    Lai, X.J., Lu, M.X., Qin, L., et al.: Asymmetric encryption and signature method with DNA technology. J. Science China Information Sciences 53(3), 506–514 (2010)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Abbasy, M.R., Shanmugam, B.: Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences. In: Proceedings of the 2011 IEEE World Congress on Services, pp. 385–390 (2011)Google Scholar
  15. 15.
    Morford, L.: A theoretical application of selectable markers in bacterial episomes for a DNA cryptosystem. J. Journal of Theoretical Biology 273(1), 100–102 (2011)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Zhang, Y., Fu, B., Zhang, X.: DNA cryptography based on DNA Fragment assembly. In: 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT), pp. 179–182. IEEE Press, Jeju (2012)Google Scholar
  17. 17.
    Babaei, M.: A novel text and image encryption method based on chaos theory and DNA computing. J. Natural Computing 12(1), 101–107 (2013)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Chen, W.C., Chen, Z.H., et al.: Digital coding of the genetic codons and DNA sequences in high dimension space. J. Acta Biophysica Sinica 16(4), 760–768 (2000)Google Scholar
  19. 19.
    Shiu, H.J., Ng, K.L., Fang, J.F., et al.: Data hiding methods based upon DNA sequences. J. Information Sciences 180(11), 2196–2208 (2010)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Encryption scheme research based on DNA technology. J. Computer Engineering and Applications 45(8), 104–106 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Guangzhao Cui
    • 1
  • Dong Han
    • 1
  • Yan Wang
    • 1
  • Yanfeng Wang
    • 1
  • Zicheng Wang
    • 1
  1. 1.School of Electrical and Information Engineering, Henan Key Lab of Information-Based Electrical AppliancesZhengzhou University of Light IndustryZhengzhouChina

Personalised recommendations