Abstract
As a new research area of information security, DNA cryptography has achieved rapid advancements over recent years. It has been demonstrated that data hiding and encryption can be realized based on DNA digital encoding and microdots steganographic techniques. Here we present a more secure encryption scheme utilizing DNA microdots. It is noteworthy that the scheme achieves double concealing, which combines the properties of traditional cryptography and DNA microdots. The security of the scheme is analyzed from several aspects as well. Finally, the simulation proved a strong confidentiality of the encryption scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Xiao, G.Z., Lu, M.X., Qin, L., et al.: New field of cryptography: DNA cryptography. J. Chinese Science Bullentin 51(12), 1413–1420 (2006)
Jiao, S.H., Goutte, R.: Hiding data in DNA of living organisms. J. Natural Science 1(3), 181–184 (2009)
Shiu, H.J., Ng, K.L., Fang, J.F., et al.: Data hiding methods based upon DNA sequences. J. Information Sciences 180(11), 2196–2208 (2010)
Kartalopoulos, S.V.: DNA-inspired cryptographic method in optical communications, authentication and data mimicking. In: Military Communications Conference, pp. 774–779 (2005)
Adleman, L.M., et al.: On applying molecular computation to the data encryption standard. J. Journal of Computational Biology 6(1), 53–63 (1999)
Lu, M.X., Lai, X.J., et al.: Symmetric encryption method based on DNA technology. J. Science in China (Series E) 37(2), 175–182 (2007)
Adleman, L.M.: Molecular computation of solutions to combinatorial problems. J. Science 266, 1021–1021 (1994)
Amos, M., Rozenberg, G., et al.: Topics in the theory of DNA computing. J. Theoretical Computer Science 287(1), 3–38 (2002)
Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Information security technology in DNA computing. J. Computer Engineering and Applications 43(20), 139–142 (2007)
Abbasy, M.R., Shanmugam, B.: Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences. In: Proceedings of the 2011 IEEE World Congress on Services, pp. 385–390 (2011)
Leier, A., Richter, C., Banzhaf, W., et al.: Cryptography with DNA binary strands. J. Biosystems 57(1), 13–22 (2000)
Tanaka, K., Okamoto, A., Saito, I.: Public-key system using DNA as a one-way function for key distribution. J. Biosystems 81, 25–29 (2005)
Chen, W.C., Chen, Z.H., et al.: Digital coding of the genetic codons and DNA sequences in high dimension space. J. Acta Biophysica Sinica 16(4), 760–768 (2000)
Gehani, A., Labean, T., Reif, J.: DNA-based cryptography. J. Aspects of Molecular Computing 2950, 167–188 (2004)
Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. J. Nature 399(6736), 533–534 (1999)
Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Encryption scheme research based on DNA technology. J. Computer Engineering and Applications 45(8), 104–106 (2009)
Le Goff, G.C., Blum, L.J., Marquette, C.A.: Shrinking hydrogel-DNA spots generates 3D microdots arrays. J. Macromol Biosci. 13(2), 227–233 (2013)
Wang, Y.F., Han, Q.Q., Han, D., et al.: Information security technology based on nucleic acids. J. Chinese Academy of Sciences 29(001), 83–93 (2014)
Haigh, T.: Emanuel Goldberg and his knowledge machine. J. Am. Soc. Inf. Sci. 63, 427–428 (2012)
Stinson, D.R.: Cryptography: theory and practice. CRC Press, Boca Raton (2005)
Biham, E., Shamir, A.: Differential cryptanalysis of the data encryption standard. Springer, New York (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cui, G., Wang, Y., Han, D., Wang, Y., Wang, Z., Wu, Y. (2014). An Encryption Scheme Based on DNA Microdots Technology. In: Pan, L., Păun, G., Pérez-Jiménez, M.J., Song, T. (eds) Bio-Inspired Computing - Theories and Applications. Communications in Computer and Information Science, vol 472. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45049-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-662-45049-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45048-2
Online ISBN: 978-3-662-45049-9
eBook Packages: Computer ScienceComputer Science (R0)