CN112685784A - MEDA biochip copyright protection method based on logic encryption - Google Patents

MEDA biochip copyright protection method based on logic encryption Download PDF

Info

Publication number
CN112685784A
CN112685784A CN202110014813.6A CN202110014813A CN112685784A CN 112685784 A CN112685784 A CN 112685784A CN 202110014813 A CN202110014813 A CN 202110014813A CN 112685784 A CN112685784 A CN 112685784A
Authority
CN
China
Prior art keywords
key
meda
biochip
logic encryption
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110014813.6A
Other languages
Chinese (zh)
Other versions
CN112685784B (en
Inventor
董晨
刘灵清
刘西蒙
柳煌达
邹剑
连思璜
陈震亦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou University
Original Assignee
Fuzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou University filed Critical Fuzhou University
Priority to CN202110014813.6A priority Critical patent/CN112685784B/en
Publication of CN112685784A publication Critical patent/CN112685784A/en
Application granted granted Critical
Publication of CN112685784B publication Critical patent/CN112685784B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a MEDA biochip copyright protection method based on logic encryption, which comprises the following steps: s1, obtaining mixed separation operation used in a biochemical protocol operated by the MEDA biochip; s2, calculating the influence factor of each mixing and separating operation; s3, for each mixed separation operation, if the influence factor is larger than or equal to the threshold value, replacing the mixed separation operation with a logic encryption module, and distributing a gold input key for the logic encryption module; s4, combining the gold input keys of each logic encryption module in sequence to be used as gold activation keys required by the activation of the MEDA biochip; s5, constructing a key coupling enhancement module according to the length of the gold activation key; s6, taking the output result of the gold activation key through the key coupling enhancement module as the gold decryption key of the logic encryption module; and S7, performing security evaluation on the currently constructed logic encryption system. The method is beneficial to improving the safety of the MEDA biochip in the production process and protecting the biochemical protocol of the MEDA biochip from being stolen by attackers.

Description

MEDA biochip copyright protection method based on logic encryption
Technical Field
The invention belongs to the field of biochip security, and particularly relates to a MEDA biochip copyright protection method based on logic encryption.
Background
Digital microfluidic biochips (DMFBs) are an emerging platform that drastically changes the procedure for preparing biochemical reagents in biochemical laboratories. Compared with the traditional biochemical reagent preparation in a biochemical laboratory, the digital microfluidic biochip has the advantages of high automation, small reagent consumption, high large-scale production and analysis speed and the like.
Digital microfluidic biochips have transitioned into the market for commercial development over the past few years due to recent industry advances in materials, applications, and design automation. The Illumina corporation of the United states introduced a product based on a digital microfluidic biochip platform named NeoPrep NGS Library Prep. The U.S. department of agriculture also developed a Baebies SEEKER platform for detecting neonatal disease using digital microfluidic biochips. However, as the materials, equipment and techniques required to manufacture digital microfluidic biochips become more and more complex, it becomes impractical to manufacture digital microfluidic biochips independently from one company only. And the biochip industry has followed the trend of semiconductor industry in the last decade, and will give priority to the globalization of design and manufacturing processes. Therefore, the design and manufacturing process of biochips will employ a lateral supply chain.
However, in the production mode of the horizontal supply chain, no other parties than the holders of intellectual property rights are trusted entities, which leads to numerous security concerns. Recent studies have found security vulnerabilities specific to digital microfluidic biochips, most of which arise from the involvement of untrusted third party entities in the manufacturing process. The lateral supply chain provides many available avenues for malicious attackers. Because the lateral supply chain production model requires the holders of intellectual property rights to send the intellectual property rights to third-party factories, the intellectual property rights are vulnerable to intellectual property right piracy or over-manufacturing attacks. In the horizontal supply chain production mode, the relationship between the designer and the foundry is asymmetric, i.e. the designer faces a series of security problems, and the cost required for the foundry to pirate the intellectual property is negligible. The MEDA biochip is currently entering a rapid commercialization phase, and thus the potential safety issue in the MEDA biochip is currently being studied.
Disclosure of Invention
The invention aims to provide a logic encryption-based MEDA biochip copyright protection method, which is beneficial to improving the safety of the MEDA biochip in the production process and protecting the biochemical protocol of the MEDA biochip from being stolen by attackers.
In order to achieve the purpose, the invention adopts the technical scheme that: a MEDA biochip copyright protection method based on logic encryption comprises the following steps:
step S1: acquiring the number M of mixed separation operations used in a biochemical protocol according to the biochemical protocol operated by the current MEDA biochip;
step S2: calculating an influence factor IF for each mixed separation operation;
step S3: setting a threshold IFthFor each mixed separation operation, IF its IF ≧ IFthIt is replaced by a logical encryption module and assigned a gold input key k with a value of 0 or 1jJ represents the serial number of the logical encryption module;
step S4: combining gold input keys of all logic encryption modules in sequence as required by activation of MEDA biochipKey k is activated to golden1,k2,...,kNN is the number of the logic encryption modules which are replaced by the mixed separation operation;
step S5: constructing a key coupling enhancement module according to the length of the gold activation key; the input key of the key coupling enhancement module is converted to make each bit of the output key strongly coupled with each bit of the input key, namely the input key is coupled with { k1,k2,...,kNEven if only one bit is different, the output results are completely different;
step S6: will { k }1,k2,...,kNThe output result of the key coupling enhancement module is used as a golden decryption key { k ] of the logic encryption module1 D,k2 D,...,kN D},{k1 D,k2 D,...,kN DThe control bit is used as the control bit of the logic encryption module for controlling the splitting ratio of the mixed splitting operation;
step S7: the security evaluation is carried out on the currently constructed logic encryption system, IF the required security is achieved, the operation is stopped, otherwise, the operation returns to the step S3, and a smaller IF is setthAnd continuing to operate circularly.
Further, the influence factor IF of the mixing separation operation is defined as shown in (1):
Figure BDA0002886366040000021
wherein in is the volume of the liquid drop input in the current mixing and separating operation, out is the volume of the liquid drop participating in the subsequent reaction in the current mixing and separating operation output, and outwasteIs the volume of the WASTE droplet IN the output of the current mix and separate operation, IN is the sum of the volumes of all input reagents IN the biochemical protocol, OUT is the sum of the volumes of all output reagents IN the biochemical protocol, and wait is the sum of the volumes of all WASTE reagents IN the biochemical protocol.
Further, the key coupling enhancement module consists of an exclusive-or gate, an and gate and a not gate.
Further, the security evaluation algorithm is adopted to carry out security evaluation on the currently constructed logic encryption system, and the method comprises the following steps:
step S71: calculating the real ratio r of input reagent used in all biochemical protocols to output reagent in the biochemical protocolsiAnd golden ratio ri GAnd i represents the serial number of the input reagent;
step S72: calculating riAnd ri GThe absolute value of the difference between them, as shown in (2):
di=|ri-ri G| (2)
wherein d isiIs represented by riAnd ri GThe distance between them;
step S73: finding allowable r in biochemical protocoliAnd ri GMaximum value d of the distance betweeni G
Step S74: defining a parameter bi,biAnd diAnd di GThe relationship between them is shown in (3):
Figure BDA0002886366040000031
step S75: and (3) evaluating the RRA by adopting the reagent ratio to indicate whether the current modified biochemical protocol is safe, if the value of the RRA is 1, the current evaluation is passed, otherwise, the evaluation is not passed, and the RRA is defined as (4):
Figure BDA0002886366040000032
where M represents the total number of input reagents.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention fully utilizes the multiple mixing model provided by the MEDA biochip, only supports 1:1 separation on mixed liquid drops in the traditional digital microfluidic biochip, and the multiple mixing model can separate the mixed liquid drops in different proportions. Based on the characteristics of the MEDA biochip, the logic encryption module provided by the invention has no additional time or money overhead, and only needs to adjust the separation proportion during droplet separation at the software level.
2. The key coupling enhancement module adopted by the invention can enhance the correlation degree between the input keys, and can provide higher security under the condition of violently breaking the input keys on the same scale when an attacker tries to break the MEDA biochip by using violent attack.
Drawings
FIG. 1 is a flow chart of a method of an embodiment of the present invention.
FIG. 2 is a schematic diagram of an MEDA biochip in an embodiment of the present invention.
FIG. 3 is a side view of a MEDA biochip in an embodiment of the invention.
Fig. 4 is a schematic diagram of an operating state of a logic encryption module according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of another operation state of the logic encryption module in the embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a key coupling enhancement module in an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and the embodiments.
For the MEDA biochip shown in fig. 2 and 3, the invention provides a method for protecting the copyright of the MEDA biochip based on logic encryption, which comprises the following steps as shown in fig. 1:
step S1: and acquiring the number M of the mixed separation operations used in the biochemical protocol according to the biochemical protocol operated by the current MEDA biochip.
Step S2: the influence factor IF is calculated for each mixing and separation operation.
Wherein, the definition of the influence factor IF of the mixing and separating operation is shown as (1):
Figure BDA0002886366040000041
wherein in is the volume of the liquid drop input in the current mixing and separating operation, out is the volume of the liquid drop participating in the subsequent reaction in the current mixing and separating operation output, and outwasteIs the volume of the WASTE droplet IN the output of the current mix and separate operation, IN is the sum of the volumes of all input reagents IN the biochemical protocol, OUT is the sum of the volumes of all output reagents IN the biochemical protocol, and wait is the sum of the volumes of all WASTE reagents IN the biochemical protocol.
Step S3: setting a threshold IFthFor each mixed separation operation, IF its IF ≧ IFthIt is replaced by a logical encryption module and assigned a gold input key k with a value of 0 or 1jAnd j denotes a serial number of the logical cryptographic module.
Step S4: combining the gold input keys of the logic encryption modules in sequence to be used as the gold activation key k required by the activation of the MEDA biochip1,k2,...,kNAnd N is the number of the logic encryption modules which are replaced by the mixed separation operation.
Step S5: constructing a key coupling enhancement module according to the length of the gold activation key; the key coupling enhancement module consists of an exclusive-OR gate, an AND gate and a NOT gate; the input key of the key coupling enhancement module is converted to make each bit of the output key strongly coupled with each bit of the input key, namely the input key is coupled with { k1,k2,...,kNEven if only one bit is different, the output results are all completely different.
Step S6: will { k }1,k2,...,kNThe output result of the key coupling enhancement module is used as a golden decryption key { k ] of the logic encryption module1 D,k2 D,...,kN D},{k1 D,k2 D,...,kN DAnd the control bit is used as a control bit of the logic encryption module for controlling the splitting ratio of the mixed splitting operation.
Step S7: applying a security evaluation algorithm to the currentThe constructed logic encryption system, namely the above steps, is subjected to security evaluation, and the operation is stopped IF the required security is achieved, otherwise, the operation returns to the step S3, and a smaller IF is setth(increasing the number of logic encryption modules to improve the security) and continuing the circular operation. The method specifically comprises the following steps:
step S71: calculating the real ratio r of input reagent used in all biochemical protocols to output reagent in the biochemical protocolsiAnd golden ratio ri GAnd i represents the serial number of the input reagent;
step S72: calculating riAnd ri GThe absolute value of the difference between them, as shown in (2):
di=|ri-ri G| (2)
wherein d isiIs represented by riAnd ri GThe distance between them;
step S73: finding allowable r in biochemical protocoliAnd ri GMaximum value d of the distance betweeni G
Step S74: defining a parameter bi,biAnd diAnd di GThe relationship between them is shown in (3):
Figure BDA0002886366040000052
step S75: and (3) evaluating the RRA by adopting the reagent ratio to indicate whether the current modified biochemical protocol is safe, if the value of the RRA is 1, the current evaluation is passed, otherwise, the evaluation is not passed, and the RRA is defined as (4):
Figure BDA0002886366040000051
where M represents the total number of input reagents.
Fig. 4 and 5 are schematic diagrams illustrating different working states of the logic encryption module in this embodiment. Fig. 6 is a schematic structural diagram of the key coupling enhancement module in this embodiment.
Key coupling enhancement module
The invention designs a set of experiments to verify the effectiveness of the proposed method, and the experimental results are shown in the following table. The invention uses five common biochemical protocols to carry out grouping test on the errs with different sizes, wherein the err is di G,
Figure BDA0002886366040000053
Inputting 1000 random activation keys different from the gold activation key into each group; two groups of comparison groups are set, namely a key coupling enhancement module and a key coupling enhancement module which is not added, so as to test the improvement of the key coupling enhancement module on the safety. As shown in the data in table 1, in general, as the number of hybrid splitting operations increases and err decreases, the logical encryption module proposed by the present invention can prevent attacks more effectively. Except for the PCR mixture, under the same err condition, the defense success rate of the experimental group without the key coupling enhancement module in 4 biochemical detections is lower than that of the experimental group with the key coupling enhancement module.
TABLE 1
Figure BDA0002886366040000061
The above are preferred embodiments of the present invention, and all changes made according to the technical scheme of the present invention that produce functional effects do not exceed the scope of the technical scheme of the present invention belong to the protection scope of the present invention.

Claims (4)

1. A MEDA biochip copyright protection method based on logic encryption is characterized by comprising the following steps:
step S1: acquiring the number M of mixed separation operations used in a biochemical protocol according to the biochemical protocol operated by the current MEDA biochip;
step S2: calculating an influence factor IF for each mixed separation operation;
step S3: setting a threshold IFthFor each mixed separation operation, IF its IF ≧ IFthIt is replaced by a logical encryption module and assigned a gold input key k with a value of 0 or 1jJ represents the serial number of the logical encryption module;
step S4: combining the gold input keys of the logic encryption modules in sequence to be used as the gold activation key k required by the activation of the MEDA biochip1,k2,...,kNN is the number of the logic encryption modules which are replaced by the mixed separation operation;
step S5: constructing a key coupling enhancement module according to the length of the gold activation key; the input key of the key coupling enhancement module is converted to make each bit of the output key strongly coupled with each bit of the input key, namely the input key is coupled with { k1,k2,...,kNEven if only one bit is different, the output results are completely different;
step S6: will { k }1,k2,...,kNThe output result of the key coupling enhancement module is used as a golden decryption key { k ] of the logic encryption module1 D,k2 D,...,kN D},{k1 D,k2 D,...,kN DThe control bit is used as the control bit of the logic encryption module for controlling the splitting ratio of the mixed splitting operation;
step S7: the security evaluation is carried out on the currently constructed logic encryption system, IF the required security is achieved, the operation is stopped, otherwise, the operation returns to the step S3, and a smaller IF is setthAnd continuing to operate circularly.
2. The method for protecting the copyright of the MEDA biochip based on logic encryption as claimed in claim 1, wherein the influence factor IF of the hybrid separation operation is defined as (1):
Figure FDA0002886366030000011
wherein in is the volume of the liquid drop input in the current mixing and separating operation, out is the volume of the liquid drop participating in the subsequent reaction in the current mixing and separating operation output, and outwasteIs the volume of the WASTE droplet IN the output of the current mix and separate operation, IN is the sum of the volumes of all input reagents IN the biochemical protocol, OUT is the sum of the volumes of all output reagents IN the biochemical protocol, and wait is the sum of the volumes of all WASTE reagents IN the biochemical protocol.
3. The method for protecting the copyright of the MEDA biochip based on logic encryption of claim 1, wherein the key coupling enhancement module is composed of an exclusive OR gate, an AND gate and a NOT gate.
4. The method for protecting the copyright of the MEDA biochip based on the logic encryption, according to claim 1, wherein the security evaluation algorithm is used to perform the security evaluation on the currently constructed logic encryption system, and the method comprises the following steps:
step S71: calculating the real ratio r of input reagent used in all biochemical protocols to output reagent in the biochemical protocolsiAnd golden ratio ri GAnd i represents the serial number of the input reagent;
step S72: calculating riAnd ri GThe absolute value of the difference between them, as shown in (2):
di=|ri-ri G| (2)
wherein d isiIs represented by riAnd ri GThe distance between them;
step S73: finding allowable r in biochemical protocoliAnd ri GMaximum value d of the distance betweeni G
Step S74: defining a parameter bi,biAnd diAnd di GThe relationship between them is shown in (3):
Figure FDA0002886366030000021
step S75: and (3) evaluating the RRA by adopting the reagent ratio to indicate whether the current modified biochemical protocol is safe, if the value of the RRA is 1, the current evaluation is passed, otherwise, the evaluation is not passed, and the RRA is defined as (4):
Figure FDA0002886366030000022
where M represents the total number of input reagents.
CN202110014813.6A 2021-01-06 2021-01-06 MEDA biochip copyright protection method based on logic encryption Expired - Fee Related CN112685784B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110014813.6A CN112685784B (en) 2021-01-06 2021-01-06 MEDA biochip copyright protection method based on logic encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110014813.6A CN112685784B (en) 2021-01-06 2021-01-06 MEDA biochip copyright protection method based on logic encryption

Publications (2)

Publication Number Publication Date
CN112685784A true CN112685784A (en) 2021-04-20
CN112685784B CN112685784B (en) 2022-07-08

Family

ID=75456067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110014813.6A Expired - Fee Related CN112685784B (en) 2021-01-06 2021-01-06 MEDA biochip copyright protection method based on logic encryption

Country Status (1)

Country Link
CN (1) CN112685784B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468519A (en) * 2014-11-12 2015-03-25 成都卫士通信息产业股份有限公司 Embedded electric power safety protection terminal encryption device
US20170277898A1 (en) * 2016-03-25 2017-09-28 Advanced Micro Devices, Inc. Key management for secure memory address spaces
CN108566501A (en) * 2018-03-29 2018-09-21 河南大学 Color image encrypting method based on hybrid domain and LSS type coupled map lattice systems
CN111414618A (en) * 2020-03-16 2020-07-14 福州大学 Digital microfluidic biochip field-level hardware Trojan horse detection method based on Hamming distance
CN111464286A (en) * 2019-01-22 2020-07-28 北京大学 Logic encryption defense method based on secret key door position selection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468519A (en) * 2014-11-12 2015-03-25 成都卫士通信息产业股份有限公司 Embedded electric power safety protection terminal encryption device
US20170277898A1 (en) * 2016-03-25 2017-09-28 Advanced Micro Devices, Inc. Key management for secure memory address spaces
CN108566501A (en) * 2018-03-29 2018-09-21 河南大学 Color image encrypting method based on hybrid domain and LSS type coupled map lattice systems
CN111464286A (en) * 2019-01-22 2020-07-28 北京大学 Logic encryption defense method based on secret key door position selection
CN111414618A (en) * 2020-03-16 2020-07-14 福州大学 Digital microfluidic biochip field-level hardware Trojan horse detection method based on Hamming distance

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王宇溪: "PUF信息的安全提取及其在IC计量技术中的应用研究", 《万方数据学位论文库》 *

Also Published As

Publication number Publication date
CN112685784B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
Zhu et al. 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption
Wang et al. An audio encryption algorithm based on DNA coding and chaotic system
Chen et al. Biochipwork: Reverse engineering of microfluidic biochips
Zhang et al. A novel image encryption scheme based on DNA coding and multi-chaotic maps
Hsieh et al. Piracy prevention of digital microfluidic biochips
Shayan et al. Desieve the attacker: Thwarting ip theft in sieve-valve-based biochips
CN111414618B (en) Micro-fluidic biochip field-level hardware Trojan horse detection method based on Hamming distance
CN112685784B (en) MEDA biochip copyright protection method based on logic encryption
Zhang et al. An image encryption algorithm based on DNA sequence addition operation
Guo et al. A survey on security of digital microfluidic biochips: Technology, attack, and defense
Mondal et al. Review on DNA cryptography
CN103997404B (en) A kind of DNA self-assembled structures and the symmetric encryption system based on it
Fang et al. A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding
CN110866255A (en) Intelligent contract vulnerability detection method
CN106576047A (en) Protecting against malicious modification in cryptographic operations
Hertzog How robust are structural equation models to model miss-specification? A simulation study
CN104360869B (en) Method for preventing underlying driver from intercepting messages
Chakraborty et al. Securing module-less synthesis on cyberphysical digital microfluidic biochips from malicious intrusions
Shayan et al. Thwarting bio-ip theft through dummy-valve-based obfuscation
Gountia et al. Security model for protecting intellectual property of state-of-the-art microfluidic biochips
CN114153808A (en) Sorting method and system based on secret sharing
CN116417072B (en) Sensitive data security association analysis method and device based on secure multiparty calculation
CN105447339B (en) A kind of combinatory logic circuit design method based on Chemical Kinetics
CN116599657A (en) Multipartite half-quantum secret size comparison method based on two-dimensional Bayer state
CN105989278B (en) A kind of password auditing method based on motivation pattern analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220708

CF01 Termination of patent right due to non-payment of annual fee