Skip to main content

Full Duplex OTP Cryptosystem Based on DNA Key for Text Transmissions

  • Conference paper
  • First Online:
Innovative Security Solutions for Information Technology and Communications (SECITC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9522))

Included in the following conference series:

Abstract

The present work aims at finding an alternative way to set up an OTP cryptosystem which generates secret keys based on DNA random sequences. The main advantage of the proposed procedure is that it generates a pure random secret key based on multiplexing genetic sequences randomly selected. Experimental results are given for text transmissions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  2. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code. Wiley, New York (1996)

    MATH  Google Scholar 

  3. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall, Englewood Cliffs (2011)

    Google Scholar 

  4. Vernam, G.S.: Cipher printing telegraph systems. J. Am. Inst. Electr. Eng. 11(5), 109–115 (1926)

    Google Scholar 

  5. Nevill-Manning, C.G., Witten, I.H.: Protein is incompressible. In: Proceedings of the Conference on Data Compression, p. 257 (1999)

    Google Scholar 

  6. Borda, M., Tornea, M., Terebes, R., Malutan, R.: New DNA based random sequence generation and OTP encryption systems for transmission and storage. In: Proceedings of SECITC (2013)

    Google Scholar 

  7. Borda, M., Tornea, M., Terebes, R., Malutan, R.: Method and Cryptographic OTP System Based on DNA Random Sequences. Best Patent Request at ProInvent 2013, No. of patent application A10003/14.02.2013 (2013)

    Google Scholar 

  8. Tornea, O.: Ph.D. thesis Contributions to DNA Cryptography: Applications to Text and Image Secure Transmission. UTCN (2013)

    Google Scholar 

  9. Besnon, D.A., Karsch-Mizrachi, I., Lipman, D.J., Ostell, J., Sayers, E.W.: National Center for Bio-technology Information. http://www.ncbi.nlm.nih.gov/pubmed/21071399

  10. Calladine, C.R., Drew, H.R., Luisi, B.F., Travers, A.A.: Understanding DNA the Molecule & How it Works. Academic Press, Amsterdam (2004)

    Google Scholar 

  11. Borda, M.: Fundamentals in Information Theory and Coding. Springer, Heidelberg (2011)

    Book  MATH  Google Scholar 

  12. Stark, H., Woods, J.W.: Probability and Random Processes with Application to Signal Processing, 3rd edn. Prentice Hall, Upper Saddle River (2002)

    Google Scholar 

  13. Kay, S.M.: Statistical Signal Processing. Prentice Hall, Englewood Cliffs (1993/1998)

    Google Scholar 

  14. Mathworks (2015): Global Optimization Toolbox: User’s Guide (R2015a), The MathWorks (1994–2015), Inc. http://www.mathworks.com/help/matlab/index.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Monica Borda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Balanici, D., Tomsa, V., Borda, M., Malutan, R. (2015). Full Duplex OTP Cryptosystem Based on DNA Key for Text Transmissions. In: Bica, I., Naccache, D., Simion, E. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2015. Lecture Notes in Computer Science(), vol 9522. Springer, Cham. https://doi.org/10.1007/978-3-319-27179-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27179-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27178-1

  • Online ISBN: 978-3-319-27179-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics