CN102025482A - Virtual genome-based cryptosystem (VGC) - Google Patents

Virtual genome-based cryptosystem (VGC) Download PDF

Info

Publication number
CN102025482A
CN102025482A CN 200910192218 CN200910192218A CN102025482A CN 102025482 A CN102025482 A CN 102025482A CN 200910192218 CN200910192218 CN 200910192218 CN 200910192218 A CN200910192218 A CN 200910192218A CN 102025482 A CN102025482 A CN 102025482A
Authority
CN
China
Prior art keywords
virtual
vgdb
dna
vdmc
vgc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200910192218
Other languages
Chinese (zh)
Other versions
CN102025482B (en
Inventor
曾纪晴
张明永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China Botanical Garden of CAS
Original Assignee
South China Botanical Garden of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Botanical Garden of CAS filed Critical South China Botanical Garden of CAS
Priority to CN200910192218.0A priority Critical patent/CN102025482B/en
Publication of CN102025482A publication Critical patent/CN102025482A/en
Application granted granted Critical
Publication of CN102025482B publication Critical patent/CN102025482B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to information security technology, in particular to a virtual genome-based cryptosystem (VGC). The cryptosystem is provided with two matched keys, of which one is a virtual genome database (VGDB) consisting of random deoxyribonucleic acid (DNA) sequences and the other one is a position table that virtual genes of the VGDB are randomly distributed in a two-dimensional microarray, namely a virtual DNA microarray chip (VDMC). Any plaintext information can be freely written on the VDMC, namely points for forming the plaintext information are selected from the VDMC microarray. The selected points correspond to the virtual genes in the VGDB; small segments of DNA sequences are randomly selected from the virtual genes; and the uniqueness of the small segments of DNA sequences in the VGDB is determined by using a common tool of the bioinformatics, namely a basic local alignment search tool (BLAST), or other character string search algorithms such as a Knuth-Morris-Pratt (KMP) algorithm and the like. A cipher text is combined by the small segments of DNA sequences. The small segments of DNA sequences need only to perform BLAST on the VGDB during decryption, namely the points for forming the plaintext information can be discovered, and the plaintext information can be restored according to the VDMC. Any non-VGDB sequence can be randomly inserted into the cipher text and does not have any influence on the encryption. Thus, the VGC is an excellent information hiding system. In addition, the VGC key can be updated automatically so as to realize an indecipherable one-time-pad system. The cryptosystem is used for real-time quick secret information communication, digital signature and identity authentication.

Description

A kind of based on virtual genomic cryptographic system (VGC)
Technical field
The invention belongs to information security field, particularly relate to a kind of based on virtual genomic cryptographic system.
Background technology
Cryptographic system is the core of information security.Traditional cryptographic system substantially all is the cryptographic system that depends on mathematics, that is to say that they only have fail safe on the mathematical computations.At present only there is the cryptographic system of so-called one-time pad to have the fail safe that to decode in theory.But in fact therefore the cryptographic system of one-time pad be difficult to use owing to have secret key management and assignment problem.Cryptologists are being explored new cryptographic system now, such as quantum cryptography and DNA password.
Because DNA has ultra-large concurrency, ultralow energy consumption and the memory capacity of super-high density, DNA now has been used to fields such as calculating, data storing and cryptography.The DNA password maturation that in theory and practice, all is far from, effectively DNA cryptographic system and few.At present, the DNA cryptographic system is not paid attention to coding method especially, often adopt G, A, T, C four basic group letter coding binaries information or with 1 out of Memory such as English alphabet, numeral or punctuate of 3 basic group letters codings, this makes as easy as rolling off a log being cracked of this coded system itself.The fail safe of DNA cryptographic system does not just lie in this coded system naturally yet, and is the biology difficult problem of DNA operation itself.Invented little some technology of a kind of DNA such as Celland etc.Gehani etc. have designed an one-time cryptosystem scheme based on DNA, though this scheme can not be decoded in theory, but also have obvious defects: not only cost is huge to make up such One-time pad DNA, encryption and decryption are wasted time and energy, and the pollution of DNA processing ease, thereby cause this scheme in fact unavailable.
In fact, the existing cryptographic system based on DNA all is directly information " to be write " dna molecular, a little less than making that this coded system is highly brittle, and biologic operation all will be through complex processes such as synthetic, the extraction of DNA, clone, pcr amplification, dna sequencing, molecular hyridizations, need the expensive experimental instrument, also waste time and energy simultaneously, exist in addition DNA pollution, PCR and order-checking certain probability of makeing mistakes is arranged, not over against according to problems such as (such as the sequence and the clip size of the dna molecular of not knowing to carry message in advance).The dna molecular that the DNA cryptographic system is transmitted can only rely on the physical transportation mode and transmit, can not pass through electric wire, optical fiber and wireless channel transmission, thereby can not be used for real time communication, can only be used for to the less demanding large-scale parallel data encryption of real-time, secure data storage, and cryptographic applications fields such as authentication, digital signature and Information hiding.
Summary of the invention
The objective of the invention is to set up a kind of based on virtual genomic novel cipher system, this system has utilized BLAST (the Basic Local Alignment Search Tool) algorithm of bioinformatics, avoided direct biologic operation to dna molecular, not only can reach " one-time pad " the such fail safe that can not decode in theory, can on the electronics and the network media, communicate real-time again, equally also can be used for digital signature and authentication.
In order to reach purpose of the present invention, " based on virtual genomic cryptographic system " takes following steps and method (Fig. 1):
(1) at first, produce a large amount of random dna sequences, and random number or name (each random dna sequence numbering or virtual gene of called after), each virtual gene adopts the FASTA form, all these virtual genomic constitutions " virtual genome ", generation " virtual genome database " (Virtual Genome Database, VGDB).Also can be as required, easily " virtual genome database " converted to " virtual Protein Data Bank " (Virtual Protein Database, VPDB).
(2) then, all virtual gene Random assignments in " virtual genome database " are tieed up on the array table at one 2, obtain virtual gene distribution position table, this table be " virtual genetic chip " (Virtual DNA Microarray Chip, VDMC).
(3) information sender can (VDMC) go up " writing " any secret information that will transmit at " virtual genetic chip ", and this " writing " is exactly to select " point " that is used to form secret information on the VDMC of huge dot matrix having.
(4) because each point on the VDMC corresponding to " virtual genome database " virtual gene in (VGDB), is therefore selected the point of forming secret information on VDMC, be exactly to have found out the virtual gene among the VGDB accordingly.
(5) then, from the virtual gene that each is found out, select a dna sequence dna small fragment randomly, utilize local blast program that VGDB is carried out similarity searching, confirm that this small fragment dna sequence dna of random choose is unique in VGDB.That is to say that this small fragment dna sequence dna is one to one with the virtual gene of being selected, in other virtual gene, do not have identical dna sequence dna to exist.
(6) dna sequence dna that all these random chooses are come out in no particular order sequentially random groups altogether (each small fragment dna sequence dna separates with comma or other interval mode such as space, branch or the like and comes) just become cipher-text information.
(7) after the receiving party receives ciphertext, to separate each the small fragment dna sequence dna that comes in modes such as commas VGDB will be carried out BLAST, find out corresponding virtual gene separately, on VDMC these virtual genetic markers are come out, secret information has just displayed naturally.
In order to strengthen security performance, can take following two kinds of methods:
(1) in ciphertext, inserts the random dna sequence of non-VGDB database at random.Can not obtain any result because the random dna sequence of the non-VGDB database in the ciphertext is analyzed through BLAST, so they can not influence decrypted result.The characteristic of this insertion redundant DNA sequence that can be random makes this cryptographic system have unlimited secret key space.
(2) secret key can self, and the VGC cryptographic system becomes the cryptographic system of one-time pad.Such as, the small fragment dna sequence dna of Xuan Zeing is in i position of certain virtual gene at random, m is capable, the n row and this virtual gene is on VDMC.So, after encrypting or deciphering, the small fragment sequence also is inserted into (i+j) individual position again from the i position deletion of virtual gene at random, and the virtual gene after the rearrangement is capable from the m on the VDMC, the deletion of n column position also is inserted on (m+a) row, (n+b) column position again.J, a, numerical value transmit leg and the recipient of b can freely arrange.Therefore, after each encryption and decryption process was finished, secret key was just upgraded once automatically.Like this, the VGC cryptographic system has just become the cryptographic system of one-time pad.
The present invention has following outstanding feature:
1, the secret key of this cryptographic system comprises VGDB and two secret keys of mating mutually of VDMC.VGDB is that a huge random dna sequence is virtual genome database, has huge secret key space; VDMC is virtual gene random distribution 2 dimension array tables among the VGDB.
2, the secret key completely random, ciphertext is completely random also.
3, the algorithm of this cryptographic system is very simple, adopts the similarity searching program BLAST of dna sequence dna.Also can adopt other string search algorithm, such as Knuth-Morris-Pratt (KMP) algorithm.
4, ciphertext can arbitrarily be inserted the random dna sequence of non-VGDB database.In addition,, and also can insert the redundant DNA sequence in the ciphertext at random, thereby same plaintext uses same secret key encryption, obtain diverse ciphertext because virtual gene can be by a plurality of small fragment dna sequence dna institutes " representative ".Expressly and do not have relation one to one between the ciphertext, thereby by expressly or ciphertext, even expressly with ciphertext to causing effective attack to this cryptographic system.
5, secret key can self, becomes the cryptographic system of one-time pad.Send share secret key with the recipient after, can upgrade by continuous secret key, obtain a brand-new secret key, the sharing problem first time that can perfect solution symmetric cryptosystem secret key.That is to say, share the first time of secret key and not necessarily will pass through back channel.
6, because information encryption process process VGMC " writing ", cleartext information can be write on VGMC in any form, comprises image format, cleartext information is encoded into other password form (Fig. 2), personal letter form or the like.Therefore this cryptographic system can easily realize the secondary coding of information.
7, this cryptographic system not only is suitable for top-secret confidential corespondence, also can be used for digital signature and authentication.By the 6th feature as can be known, this cryptographic system can realize real " handwritten " digital signature and authentication.Because the native system one-time pad, digital signature will can't be forged fully.
Description of drawings:
Fig. 1 is " based on virtual genomic cryptographic system " schematic diagram (VGC).With letters of encryption and decryption " T " is example.(1) the virtual genome database of forming by random dna sequence (VGDB); (2) being the virtual genetic chip (VDMC) that is complementary with VGDB, is the position table of the virtual gene random distribution in 2 dimension dot matrix among the VGDB; (3) on VDMC, " write " letter " T ", select the point of forming letter " T "; (4) find out each point corresponding virtual gene in VGDB in (3); (5) from the virtual gene that each is found out, select a dna sequence dna small fragment randomly, utilize local blast program that VGDB is carried out similarity searching, confirm that this small fragment dna sequence dna of random choose is unique in VGDB; (6) dna sequence dna that all these random chooses are come out in no particular order sequentially random groups altogether (each small fragment dna sequence dna separates with comma or other interval mode such as space, branch or the like and comes) just become cipher-text information.The process of deciphering is with separate each the small fragment dna sequence dna that comes in modes such as commas VGDB to be carried out BLAST, finds out corresponding virtual gene separately, on VDMC these virtual genetic markers is come out again, and the letter of encryption " T " has just displayed.
Fig. 2 explanation " based on virtual genomic cryptographic system " (VGC) transmits any information with secret.A, B and C represent that respectively VGC can transmit binary coding, Braille braille and Morse's code and transmit " SOS " information.VGC can transmit any enciphered message, that is to say, can transmit the ciphertext of conventional cipher system with VGC; D represents that VGC can transmit image information.
Embodiment
Embodiment 1 sets up the VGC cryptographic system, and send with a letter of reception " T " (Fig. 1)
(1) at first, produce a large amount of (several more than thousand ten thousand at random, even millions of up to ten million) several kb even longer dna sequence dna, and random number or name (each random dna sequence numbering or virtual gene of called after), each virtual gene adopts the FASTA form, all these virtual genomic constitutions " virtual genome ", and generation " virtual genome database " (VirtualGenome Database, VGDB).
(2) then, all virtual gene Random assignments in " virtual genome database " are tieed up on the array table at one 2, obtain virtual gene distribution position table, this table be " virtual genetic chip " (Virtual DNA Microarray Chip, VDMC).
(3) (VDMC) go up written word mother " T " at " virtual genetic chip ", promptly on VDMC, select " point " that be used for forming letter " T ".
(4) find out the virtual gene of these Ying Yu " virtual genome database " in (VGDB), i.e. B2, C2, D2, C3 and C4.
(5) then, from the virtual gene that each is found out, select a dna sequence dna small fragment randomly: find out " CGACGTGCG " from the virtual gene of B2, find out " ACTCGGC " from the virtual gene of C2, find out " GCCGCGGGA " from the virtual gene of D2, find out " GGAGCCAT " from the virtual gene of C3, find out " CATGCCTCG " from the virtual gene of C4.Utilize local blast program that VGDB is carried out similarity searching, confirm that this small fragment dna sequence dna of random choose is unique in VGDB.That is to say that this small fragment dna sequence dna is one to one with the virtual gene of being selected, in other virtual gene, do not have identical dna sequence dna to exist.
(6) dna sequence dna that all these random chooses are come out in no particular order sequentially random groups altogether (each small fragment dna sequence dna comes with comma) just become cipher-text information: " CGACGTGCG, ACTCGGC, GCCGCGGGA, GGAGCCAT, CATGCCTCG "
(7) after the receiving party receives ciphertext, each small fragment dna sequence dna in the ciphertext " CGACGTGCG, ACTCGGC; GCCGCGGGA; GGAGCCAT, CATGCCTCG " is carried out BLAST to VGDB, find out corresponding virtual gene separately, B2, C2, D2, C3 and C4, on VDMC these virtual genetic markers are come out, letter " T " has just displayed naturally again.
Embodiment 2 digital signature
The VGC system is used for digital signature and has special endorsement method.Because what the VGC system used is the information input and output of image recognition formula, also promptly on VDMC, " write " and restore information, therefore, the information itself that VGC transmits is exactly very personalized.The VGC digital signature can really be accomplished handwritten authentic work signature.Can also on the VDMC specific position, do some special marks, thereby make ciphertext can't forge fully.

Claims (12)

1. one kind based on virtual genomic cryptographic system (VGC), it is characterized in that carrying out with method as follows:
(1) produces a large amount of random dna sequences, and random number or name (each random dna sequence numbering or virtual gene of called after), each virtual gene adopts the FASTA form, all these virtual genomic constitutions " virtual genome ", generation " virtual genome database " (Virtual Genome Database, VGDB).
(2) with all the virtual gene Random assignments among the VGDB on one 2 dimension array table, obtain a virtual gene distribution position table, this table be " virtual genetic chip " (Virtual DNAMicroarray Chip, VDMC).
(3) information sender can " be write " any secret information that will transmit on VDMC, just selects " point " that is used to form secret information on the VDMC of huge dot matrix having.
(4) because each point on the VDMC corresponding to a virtual gene among the VGDB, is therefore selected the point of forming secret information on VDMC, be exactly the virtual gene of finding out among the VGDB accordingly.
(5) from the virtual gene that each is found out, select a dna sequence dna small fragment randomly, utilize local blast program that VGDB is carried out similarity searching, confirm that this small fragment dna sequence dna of random choose is unique in VGDB.That is to say that this small fragment dna sequence dna is one to one with the virtual gene of being selected, in other virtual gene, do not have identical dna sequence dna to exist.
(6) dna sequence dna that all these random chooses are come out in no particular order sequentially random groups altogether (each small fragment dna sequence dna separates with comma or other interval mode such as space, branch or the like and comes) just become cipher-text information.
(7) after the receiving party receives ciphertext, to separate each the small fragment dna sequence dna that comes in modes such as commas VGDB will be carried out the BLAST analysis, find out corresponding virtual gene separately, on VDMC these virtual genetic markers are come out, secret information has just displayed.
2. according to claim 1 based on virtual genomic cryptographic system (VGC), it is characterized in that its secret key is made of jointly virtual genome database (VGDB) and virtual genetic chip (VDMC).
3. VGC cryptographic system according to claim 1 is characterized in that each virtual gene all is the dna sequence dna that produces at random among the described VGDB.The numbering of virtual gene or name be at random or irregular.
4. VGC cryptographic system according to claim 1, it is characterized in that described VGDB can be exchanged into virtual Protein Data Bank (Virtual Protein Database, VPDB).
5. according to claim 1 based on virtual genomic cryptographic system, it is characterized in that described " virtual genetic chip " is one 2 dimension array table (VDMC), each point in the table is corresponding to a virtual gene among the VGDB.
6. VGC cryptographic system according to claim 1 is characterized in that described secret information refers to " writing " on the VDMC to select " point " that is used to form secret information on VDMC, just finds out and each point corresponding virtual gene.
7. VGC cryptographic system according to claim 1, it is characterized in that describedly from virtual gene, selecting a dna sequence dna small fragment randomly and referring to optional position in virtual gene DNA sequence and intercept a bit of dna sequence dna (for the purpose of simplifying, generally getting size about 5-10bp) randomly.
8. VGC cryptographic system according to claim 1 is characterized in that described BLAST algorithm refers to the similarity searching algorithm in the bioinformatics, can download and carry out the localization installation from the NCBI website, by illustrating VGDB is formatd processing.The BLAST algorithm has a variety of, VGDB is carried out BLAST adopt the BLASTn algorithm, and VPDB is then adopted the BLASTx algorithm.The purpose of BLAST is to confirm the uniqueness of small fragment dna sequence dna in this encryption method.
9. VGC cryptographic system according to claim 1 is characterized in that described BLAST algorithm also can replace with other string search algorithm such as Knuth-Morris-Pratt (KMP) algorithm.As use string search algorithms such as KMP, the then available arbitrary string sequence replacing of DNA random sequence.
10. VGC cryptographic system according to claim 1, it is characterized in that described ciphertext through claim 6 and 7 selected all small fragment dna sequence dnas in no particular order sequential combination form, between each small fragment dna sequence dna available comma, space, branch, carriage return etc. arbitrarily the character area different with four basic group letters of DNA separate.
11. VGC cryptographic system according to claim 1 is characterized in that can arbitrarily inserting non-VGDB sequence fragment in order to strengthen security performance in the ciphertext, analyzes or other string search algorithm such as KMP confirm that it is not present among the VGDB with BLAST.
12. VGC cryptographic system according to claim 1 is characterized in that its secret key can self.Such as, the small fragment dna sequence dna of Xuan Zeing is in i position of certain virtual gene at random, m is capable, the n row and this virtual gene is on VDMC.So, after encrypting or deciphering, the small fragment sequence also is inserted into (i+j) individual position again from the i position deletion of virtual gene at random, and the virtual gene after the rearrangement is capable from the m on the VDMC, the deletion of n column position also is inserted on (m+a) row, (n+b) column position again.J, a, numerical value transmit leg and the recipient of b can freely arrange.Therefore, after each encryption and decryption process was finished, secret key was just upgraded once automatically.Like this, the VGC cryptographic system has just become the cryptographic system of one-time pad.
CN200910192218.0A 2009-09-10 2009-09-10 Construction method of virtual genome-based cryptosystem (VGC) Expired - Fee Related CN102025482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910192218.0A CN102025482B (en) 2009-09-10 2009-09-10 Construction method of virtual genome-based cryptosystem (VGC)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910192218.0A CN102025482B (en) 2009-09-10 2009-09-10 Construction method of virtual genome-based cryptosystem (VGC)

Publications (2)

Publication Number Publication Date
CN102025482A true CN102025482A (en) 2011-04-20
CN102025482B CN102025482B (en) 2014-02-12

Family

ID=43866386

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910192218.0A Expired - Fee Related CN102025482B (en) 2009-09-10 2009-09-10 Construction method of virtual genome-based cryptosystem (VGC)

Country Status (1)

Country Link
CN (1) CN102025482B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117850A (en) * 2011-11-16 2013-05-22 中国科学院华南植物园 Cryptosystem based on random sequence database
CN103114127A (en) * 2011-11-16 2013-05-22 中国科学院华南植物园 DNA chip based cipher system
CN103200011A (en) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 Password authentication method and device
CN104243148A (en) * 2013-06-24 2014-12-24 中科英华湖州工程技术研究中心有限公司 Encryption method and encryption device
CN104734848A (en) * 2015-03-02 2015-06-24 郑州轻工业学院 Recombinant DNA technology based information encrypting and hiding method and application
US9350382B1 (en) 2014-12-19 2016-05-24 International Business Machines Corporation Pad encoding and decoding
US9425825B2 (en) 2012-05-22 2016-08-23 International Business Machines Corporation Path encoding and decoding
US9577670B2 (en) 2014-12-19 2017-02-21 International Business Machines Corporation Path encoding and decoding
US10027345B2 (en) 2014-12-19 2018-07-17 International Business Machines Corporation Wall encoding and decoding
CN114285563A (en) * 2021-12-27 2022-04-05 中国电信股份有限公司 Key generation method and device
EP4101120A4 (en) * 2020-02-05 2024-02-28 Quantum Digital Solutions Corp Information theory genomics-enabled hyper-scalability

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9950261B2 (en) 2016-04-29 2018-04-24 International Business Machines Corporation Secure data encoding for low-resource remote systems

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050053968A1 (en) * 2003-03-31 2005-03-10 Council Of Scientific And Industrial Research Method for storing information in DNA
CN1790983A (en) * 2004-12-15 2006-06-21 卢明欣 Method for realizing asymmetric cipher system using DNA chip

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103114127A (en) * 2011-11-16 2013-05-22 中国科学院华南植物园 DNA chip based cipher system
CN103117850A (en) * 2011-11-16 2013-05-22 中国科学院华南植物园 Cryptosystem based on random sequence database
CN103117850B (en) * 2011-11-16 2016-01-20 中国科学院华南植物园 A kind of method for building up of the cryptographic system based on random sequence database
US9425825B2 (en) 2012-05-22 2016-08-23 International Business Machines Corporation Path encoding and decoding
CN103200011A (en) * 2013-04-26 2013-07-10 福建伊时代信息科技股份有限公司 Password authentication method and device
CN103200011B (en) * 2013-04-26 2016-04-13 福建伊时代信息科技股份有限公司 A kind of cipher authentication method and device
CN104243148A (en) * 2013-06-24 2014-12-24 中科英华湖州工程技术研究中心有限公司 Encryption method and encryption device
US9577670B2 (en) 2014-12-19 2017-02-21 International Business Machines Corporation Path encoding and decoding
US9350382B1 (en) 2014-12-19 2016-05-24 International Business Machines Corporation Pad encoding and decoding
US9473167B2 (en) 2014-12-19 2016-10-18 International Business Machines Corporation Pad encoding and decoding
US9647681B2 (en) 2014-12-19 2017-05-09 International Business Machines Corporation Pad encoding and decoding
US9667271B2 (en) 2014-12-19 2017-05-30 International Business Machines Corporation Path encoding and decoding
US9735804B2 (en) 2014-12-19 2017-08-15 International Business Machines Corporation Path encoding and decoding
US9876508B2 (en) 2014-12-19 2018-01-23 International Business Machines Corporation Pad encoding and decoding
US10027345B2 (en) 2014-12-19 2018-07-17 International Business Machines Corporation Wall encoding and decoding
US10396816B2 (en) 2014-12-19 2019-08-27 International Business Machines Corporation Pad encoding and decoding
CN104734848A (en) * 2015-03-02 2015-06-24 郑州轻工业学院 Recombinant DNA technology based information encrypting and hiding method and application
EP4101120A4 (en) * 2020-02-05 2024-02-28 Quantum Digital Solutions Corp Information theory genomics-enabled hyper-scalability
CN114285563A (en) * 2021-12-27 2022-04-05 中国电信股份有限公司 Key generation method and device
CN114285563B (en) * 2021-12-27 2024-05-10 中国电信股份有限公司 Key generation method and device

Also Published As

Publication number Publication date
CN102025482B (en) 2014-02-12

Similar Documents

Publication Publication Date Title
CN102025482B (en) Construction method of virtual genome-based cryptosystem (VGC)
Khalifa et al. High-capacity DNA-based steganography
Al-Harbi et al. Security analysis of DNA based steganography techniques
CN105119717A (en) DNA coding based encryption system and encryption method
CN104917747A (en) Concealed communication method
Hamed et al. DNA based steganography: survey and analysis for parameters optimization
Sreeja et al. DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology
Anwar et al. Message transmission based on DNA cryptography
Namasudra et al. Introduction of DNA computing in cryptography
US20170338943A1 (en) Dna encryption technologies
Mondal et al. Review on DNA cryptography
Khalifa et al. Secure blind data hiding into pseudo DNA sequences using playfair ciphering and generic complementary substitution
Alruily et al. Asymmetric DNA encryption and decryption technique for Arabic plaintext
Vinodhini et al. A survey on DNA and image steganography
Aggarwal et al. Secure data transmission using DNA encryption
Agrawal et al. Data hiding using dictionary based substitution method in DNA sequences
Marwan et al. An Enhanced DNA-based Steganography Technique with a Higher Hiding Capacity.
CN112235101B (en) Coding method and device based on hybrid coding mechanism, decoding method and device
Khalifa A blind DNA-steganography approach using ciphering and random sequence splicing
JP6175453B2 (en) Encryption and decryption method using nucleic acid
Singh et al. A Review on DNA based Cryptography for Data hiding
Hirabayashi et al. Analysis on secure and effective applications of a DNA-based cryptosystem
Aich et al. A symmetric key cryptosystem using DNA sequence with OTP key
CN114221783B (en) Data selective encryption and decryption system
Singh et al. Information hiding techniques based on DNA inconsistency: An overview

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140212

Termination date: 20160910

CF01 Termination of patent right due to non-payment of annual fee