Abstract
A scheme utilizing DNA technology for the purposes of DNA cryptography has been developed. To enhance the security of DNA cryptosystem, we used DNA digital encoding, complementary rules and biotechnological methods in this scheme. The experimental result showed that the scheme is feasible and the security analysis indicated that the scheme has a strong confidentiality.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Adleman, L.: Molecular computation of solutions to combinational problems. J. Science 266(11), 1021–1024 (1994)
Adleman, L., et al.: On applying molecular computation to the data encryption standard. J. Journal of Computational Biology 6(1), 53–63 (1999)
Amos, M., et al.: Topics in the theory of DNA computing. J. Theoretical Computer Science 287(1), 3–38 (2002)
Zhang, X.C., Wang, Y.F., Cui, G.Z., et al.: Application of a novel IWO to the design of encoding sequences for DNA computing. J. Computers & Mathematics with Applications 57(11), 2001–2008 (2009)
Qian, L., Winfree, E.: Scaling up digital circuit computation with DNA strand displacement cascades. J. Science 332, 1196–1201 (2011)
Gehani, A., LaBean, T.H., Reif, J.H.: DNA-based cryptography. DNA Based Computers V. Providence: American Mathematical Society 54, 233–249 (2000)
Kazuo, T., Akimitsu, O., Isao, S.: Public-key system using DNA as a one-way function for key distribution. J. Biosystems 81, 25–29 (2005)
Xiao, G.Z., Lu, M.X., Qin, L., et al.: New field of cryptography: DNA cryptography. J. Chinese Science Bullentin 51(12), 1413–1420 (2006)
Jiao, S.-H., Goutte, R.: Hiding data in DNA of living organisms. J. Natural Science 1(3), 181–184 (2009)
Celland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. J. Nature 399, 533–534 (1999)
Leier, A., Richter, C., Banzhaf, W., et al.: Cryptography with DNA binary strands. J. Biosystems 57(1), 13–22 (2000)
Rao, N.N.: A cryptosystem based on recombinant DNA technique. J. Acta Electronica Sinica 32(7), 1216–1218 (2004)
Lai, X.J., Lu, M.X., Qin, L., et al.: Asymmetric encryption and signature method with DNA technology. J. Science China Information Sciences 53(3), 506–514 (2010)
Abbasy, M.R., Shanmugam, B.: Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences. In: Proceedings of the 2011 IEEE World Congress on Services, pp. 385–390 (2011)
Morford, L.: A theoretical application of selectable markers in bacterial episomes for a DNA cryptosystem. J. Journal of Theoretical Biology 273(1), 100–102 (2011)
Zhang, Y., Fu, B., Zhang, X.: DNA cryptography based on DNA Fragment assembly. In: 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT), pp. 179–182. IEEE Press, Jeju (2012)
Babaei, M.: A novel text and image encryption method based on chaos theory and DNA computing. J. Natural Computing 12(1), 101–107 (2013)
Chen, W.C., Chen, Z.H., et al.: Digital coding of the genetic codons and DNA sequences in high dimension space. J. Acta Biophysica Sinica 16(4), 760–768 (2000)
Shiu, H.J., Ng, K.L., Fang, J.F., et al.: Data hiding methods based upon DNA sequences. J. Information Sciences 180(11), 2196–2208 (2010)
Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Encryption scheme research based on DNA technology. J. Computer Engineering and Applications 45(8), 104–106 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cui, G., Han, D., Wang, Y., Wang, Y., Wang, Z. (2014). An Improved Method of DNA Information Encryption. In: Pan, L., Păun, G., Pérez-Jiménez, M.J., Song, T. (eds) Bio-Inspired Computing - Theories and Applications. Communications in Computer and Information Science, vol 472. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45049-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-662-45049-9_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45048-2
Online ISBN: 978-3-662-45049-9
eBook Packages: Computer ScienceComputer Science (R0)