Skip to main content

An Encryption Scheme Based on DNA Microdots Technology

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 472))

Abstract

As a new research area of information security, DNA cryptography has achieved rapid advancements over recent years. It has been demonstrated that data hiding and encryption can be realized based on DNA digital encoding and microdots steganographic techniques. Here we present a more secure encryption scheme utilizing DNA microdots. It is noteworthy that the scheme achieves double concealing, which combines the properties of traditional cryptography and DNA microdots. The security of the scheme is analyzed from several aspects as well. Finally, the simulation proved a strong confidentiality of the encryption scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xiao, G.Z., Lu, M.X., Qin, L., et al.: New field of cryptography: DNA cryptography. J. Chinese Science Bullentin 51(12), 1413–1420 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  2. Jiao, S.H., Goutte, R.: Hiding data in DNA of living organisms. J. Natural Science 1(3), 181–184 (2009)

    Article  Google Scholar 

  3. Shiu, H.J., Ng, K.L., Fang, J.F., et al.: Data hiding methods based upon DNA sequences. J. Information Sciences 180(11), 2196–2208 (2010)

    Article  MathSciNet  Google Scholar 

  4. Kartalopoulos, S.V.: DNA-inspired cryptographic method in optical communications, authentication and data mimicking. In: Military Communications Conference, pp. 774–779 (2005)

    Google Scholar 

  5. Adleman, L.M., et al.: On applying molecular computation to the data encryption standard. J. Journal of Computational Biology 6(1), 53–63 (1999)

    Article  Google Scholar 

  6. Lu, M.X., Lai, X.J., et al.: Symmetric encryption method based on DNA technology. J. Science in China (Series E) 37(2), 175–182 (2007)

    Google Scholar 

  7. Adleman, L.M.: Molecular computation of solutions to combinatorial problems. J. Science 266, 1021–1021 (1994)

    Article  Google Scholar 

  8. Amos, M., Rozenberg, G., et al.: Topics in the theory of DNA computing. J. Theoretical Computer Science 287(1), 3–38 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  9. Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Information security technology in DNA computing. J. Computer Engineering and Applications 43(20), 139–142 (2007)

    Google Scholar 

  10. Abbasy, M.R., Shanmugam, B.: Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences. In: Proceedings of the 2011 IEEE World Congress on Services, pp. 385–390 (2011)

    Google Scholar 

  11. Leier, A., Richter, C., Banzhaf, W., et al.: Cryptography with DNA binary strands. J. Biosystems 57(1), 13–22 (2000)

    Article  Google Scholar 

  12. Tanaka, K., Okamoto, A., Saito, I.: Public-key system using DNA as a one-way function for key distribution. J. Biosystems 81, 25–29 (2005)

    Article  Google Scholar 

  13. Chen, W.C., Chen, Z.H., et al.: Digital coding of the genetic codons and DNA sequences in high dimension space. J. Acta Biophysica Sinica 16(4), 760–768 (2000)

    Google Scholar 

  14. Gehani, A., Labean, T., Reif, J.: DNA-based cryptography. J. Aspects of Molecular Computing 2950, 167–188 (2004)

    Article  Google Scholar 

  15. Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. J. Nature 399(6736), 533–534 (1999)

    Article  Google Scholar 

  16. Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Encryption scheme research based on DNA technology. J. Computer Engineering and Applications 45(8), 104–106 (2009)

    Google Scholar 

  17. Le Goff, G.C., Blum, L.J., Marquette, C.A.: Shrinking hydrogel-DNA spots generates 3D microdots arrays. J. Macromol Biosci. 13(2), 227–233 (2013)

    Article  Google Scholar 

  18. Wang, Y.F., Han, Q.Q., Han, D., et al.: Information security technology based on nucleic acids. J. Chinese Academy of Sciences 29(001), 83–93 (2014)

    Google Scholar 

  19. Haigh, T.: Emanuel Goldberg and his knowledge machine. J. Am. Soc. Inf. Sci. 63, 427–428 (2012)

    Article  Google Scholar 

  20. Stinson, D.R.: Cryptography: theory and practice. CRC Press, Boca Raton (2005)

    Google Scholar 

  21. Biham, E., Shamir, A.: Differential cryptanalysis of the data encryption standard. Springer, New York (1993)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cui, G., Wang, Y., Han, D., Wang, Y., Wang, Z., Wu, Y. (2014). An Encryption Scheme Based on DNA Microdots Technology. In: Pan, L., Păun, G., Pérez-Jiménez, M.J., Song, T. (eds) Bio-Inspired Computing - Theories and Applications. Communications in Computer and Information Science, vol 472. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45049-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45049-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45048-2

  • Online ISBN: 978-3-662-45049-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics