CN102025482A - Virtual genome-based cryptosystem (VGC) - Google Patents
Virtual genome-based cryptosystem (VGC) Download PDFInfo
- Publication number
- CN102025482A CN102025482A CN 200910192218 CN200910192218A CN102025482A CN 102025482 A CN102025482 A CN 102025482A CN 200910192218 CN200910192218 CN 200910192218 CN 200910192218 A CN200910192218 A CN 200910192218A CN 102025482 A CN102025482 A CN 102025482A
- Authority
- CN
- China
- Prior art keywords
- virtual
- vgdb
- dna
- vdmc
- vgc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to information security technology, in particular to a virtual genome-based cryptosystem (VGC). The cryptosystem is provided with two matched keys, of which one is a virtual genome database (VGDB) consisting of random deoxyribonucleic acid (DNA) sequences and the other one is a position table that virtual genes of the VGDB are randomly distributed in a two-dimensional microarray, namely a virtual DNA microarray chip (VDMC). Any plaintext information can be freely written on the VDMC, namely points for forming the plaintext information are selected from the VDMC microarray. The selected points correspond to the virtual genes in the VGDB; small segments of DNA sequences are randomly selected from the virtual genes; and the uniqueness of the small segments of DNA sequences in the VGDB is determined by using a common tool of the bioinformatics, namely a basic local alignment search tool (BLAST), or other character string search algorithms such as a Knuth-Morris-Pratt (KMP) algorithm and the like. A cipher text is combined by the small segments of DNA sequences. The small segments of DNA sequences need only to perform BLAST on the VGDB during decryption, namely the points for forming the plaintext information can be discovered, and the plaintext information can be restored according to the VDMC. Any non-VGDB sequence can be randomly inserted into the cipher text and does not have any influence on the encryption. Thus, the VGC is an excellent information hiding system. In addition, the VGC key can be updated automatically so as to realize an indecipherable one-time-pad system. The cryptosystem is used for real-time quick secret information communication, digital signature and identity authentication.
Description
Technical field
The invention belongs to information security field, particularly relate to a kind of based on virtual genomic cryptographic system.
Background technology
Cryptographic system is the core of information security.Traditional cryptographic system substantially all is the cryptographic system that depends on mathematics, that is to say that they only have fail safe on the mathematical computations.At present only there is the cryptographic system of so-called one-time pad to have the fail safe that to decode in theory.But in fact therefore the cryptographic system of one-time pad be difficult to use owing to have secret key management and assignment problem.Cryptologists are being explored new cryptographic system now, such as quantum cryptography and DNA password.
Because DNA has ultra-large concurrency, ultralow energy consumption and the memory capacity of super-high density, DNA now has been used to fields such as calculating, data storing and cryptography.The DNA password maturation that in theory and practice, all is far from, effectively DNA cryptographic system and few.At present, the DNA cryptographic system is not paid attention to coding method especially, often adopt G, A, T, C four basic group letter coding binaries information or with 1 out of Memory such as English alphabet, numeral or punctuate of 3 basic group letters codings, this makes as easy as rolling off a log being cracked of this coded system itself.The fail safe of DNA cryptographic system does not just lie in this coded system naturally yet, and is the biology difficult problem of DNA operation itself.Invented little some technology of a kind of DNA such as Celland etc.Gehani etc. have designed an one-time cryptosystem scheme based on DNA, though this scheme can not be decoded in theory, but also have obvious defects: not only cost is huge to make up such One-time pad DNA, encryption and decryption are wasted time and energy, and the pollution of DNA processing ease, thereby cause this scheme in fact unavailable.
In fact, the existing cryptographic system based on DNA all is directly information " to be write " dna molecular, a little less than making that this coded system is highly brittle, and biologic operation all will be through complex processes such as synthetic, the extraction of DNA, clone, pcr amplification, dna sequencing, molecular hyridizations, need the expensive experimental instrument, also waste time and energy simultaneously, exist in addition DNA pollution, PCR and order-checking certain probability of makeing mistakes is arranged, not over against according to problems such as (such as the sequence and the clip size of the dna molecular of not knowing to carry message in advance).The dna molecular that the DNA cryptographic system is transmitted can only rely on the physical transportation mode and transmit, can not pass through electric wire, optical fiber and wireless channel transmission, thereby can not be used for real time communication, can only be used for to the less demanding large-scale parallel data encryption of real-time, secure data storage, and cryptographic applications fields such as authentication, digital signature and Information hiding.
Summary of the invention
The objective of the invention is to set up a kind of based on virtual genomic novel cipher system, this system has utilized BLAST (the Basic Local Alignment Search Tool) algorithm of bioinformatics, avoided direct biologic operation to dna molecular, not only can reach " one-time pad " the such fail safe that can not decode in theory, can on the electronics and the network media, communicate real-time again, equally also can be used for digital signature and authentication.
In order to reach purpose of the present invention, " based on virtual genomic cryptographic system " takes following steps and method (Fig. 1):
(1) at first, produce a large amount of random dna sequences, and random number or name (each random dna sequence numbering or virtual gene of called after), each virtual gene adopts the FASTA form, all these virtual genomic constitutions " virtual genome ", generation " virtual genome database " (Virtual Genome Database, VGDB).Also can be as required, easily " virtual genome database " converted to " virtual Protein Data Bank " (Virtual Protein Database, VPDB).
(2) then, all virtual gene Random assignments in " virtual genome database " are tieed up on the array table at one 2, obtain virtual gene distribution position table, this table be " virtual genetic chip " (Virtual DNA Microarray Chip, VDMC).
(3) information sender can (VDMC) go up " writing " any secret information that will transmit at " virtual genetic chip ", and this " writing " is exactly to select " point " that is used to form secret information on the VDMC of huge dot matrix having.
(4) because each point on the VDMC corresponding to " virtual genome database " virtual gene in (VGDB), is therefore selected the point of forming secret information on VDMC, be exactly to have found out the virtual gene among the VGDB accordingly.
(5) then, from the virtual gene that each is found out, select a dna sequence dna small fragment randomly, utilize local blast program that VGDB is carried out similarity searching, confirm that this small fragment dna sequence dna of random choose is unique in VGDB.That is to say that this small fragment dna sequence dna is one to one with the virtual gene of being selected, in other virtual gene, do not have identical dna sequence dna to exist.
(6) dna sequence dna that all these random chooses are come out in no particular order sequentially random groups altogether (each small fragment dna sequence dna separates with comma or other interval mode such as space, branch or the like and comes) just become cipher-text information.
(7) after the receiving party receives ciphertext, to separate each the small fragment dna sequence dna that comes in modes such as commas VGDB will be carried out BLAST, find out corresponding virtual gene separately, on VDMC these virtual genetic markers are come out, secret information has just displayed naturally.
In order to strengthen security performance, can take following two kinds of methods:
(1) in ciphertext, inserts the random dna sequence of non-VGDB database at random.Can not obtain any result because the random dna sequence of the non-VGDB database in the ciphertext is analyzed through BLAST, so they can not influence decrypted result.The characteristic of this insertion redundant DNA sequence that can be random makes this cryptographic system have unlimited secret key space.
(2) secret key can self, and the VGC cryptographic system becomes the cryptographic system of one-time pad.Such as, the small fragment dna sequence dna of Xuan Zeing is in i position of certain virtual gene at random, m is capable, the n row and this virtual gene is on VDMC.So, after encrypting or deciphering, the small fragment sequence also is inserted into (i+j) individual position again from the i position deletion of virtual gene at random, and the virtual gene after the rearrangement is capable from the m on the VDMC, the deletion of n column position also is inserted on (m+a) row, (n+b) column position again.J, a, numerical value transmit leg and the recipient of b can freely arrange.Therefore, after each encryption and decryption process was finished, secret key was just upgraded once automatically.Like this, the VGC cryptographic system has just become the cryptographic system of one-time pad.
The present invention has following outstanding feature:
1, the secret key of this cryptographic system comprises VGDB and two secret keys of mating mutually of VDMC.VGDB is that a huge random dna sequence is virtual genome database, has huge secret key space; VDMC is virtual gene random distribution 2 dimension array tables among the VGDB.
2, the secret key completely random, ciphertext is completely random also.
3, the algorithm of this cryptographic system is very simple, adopts the similarity searching program BLAST of dna sequence dna.Also can adopt other string search algorithm, such as Knuth-Morris-Pratt (KMP) algorithm.
4, ciphertext can arbitrarily be inserted the random dna sequence of non-VGDB database.In addition,, and also can insert the redundant DNA sequence in the ciphertext at random, thereby same plaintext uses same secret key encryption, obtain diverse ciphertext because virtual gene can be by a plurality of small fragment dna sequence dna institutes " representative ".Expressly and do not have relation one to one between the ciphertext, thereby by expressly or ciphertext, even expressly with ciphertext to causing effective attack to this cryptographic system.
5, secret key can self, becomes the cryptographic system of one-time pad.Send share secret key with the recipient after, can upgrade by continuous secret key, obtain a brand-new secret key, the sharing problem first time that can perfect solution symmetric cryptosystem secret key.That is to say, share the first time of secret key and not necessarily will pass through back channel.
6, because information encryption process process VGMC " writing ", cleartext information can be write on VGMC in any form, comprises image format, cleartext information is encoded into other password form (Fig. 2), personal letter form or the like.Therefore this cryptographic system can easily realize the secondary coding of information.
7, this cryptographic system not only is suitable for top-secret confidential corespondence, also can be used for digital signature and authentication.By the 6th feature as can be known, this cryptographic system can realize real " handwritten " digital signature and authentication.Because the native system one-time pad, digital signature will can't be forged fully.
Description of drawings:
Fig. 1 is " based on virtual genomic cryptographic system " schematic diagram (VGC).With letters of encryption and decryption " T " is example.(1) the virtual genome database of forming by random dna sequence (VGDB); (2) being the virtual genetic chip (VDMC) that is complementary with VGDB, is the position table of the virtual gene random distribution in 2 dimension dot matrix among the VGDB; (3) on VDMC, " write " letter " T ", select the point of forming letter " T "; (4) find out each point corresponding virtual gene in VGDB in (3); (5) from the virtual gene that each is found out, select a dna sequence dna small fragment randomly, utilize local blast program that VGDB is carried out similarity searching, confirm that this small fragment dna sequence dna of random choose is unique in VGDB; (6) dna sequence dna that all these random chooses are come out in no particular order sequentially random groups altogether (each small fragment dna sequence dna separates with comma or other interval mode such as space, branch or the like and comes) just become cipher-text information.The process of deciphering is with separate each the small fragment dna sequence dna that comes in modes such as commas VGDB to be carried out BLAST, finds out corresponding virtual gene separately, on VDMC these virtual genetic markers is come out again, and the letter of encryption " T " has just displayed.
Fig. 2 explanation " based on virtual genomic cryptographic system " (VGC) transmits any information with secret.A, B and C represent that respectively VGC can transmit binary coding, Braille braille and Morse's code and transmit " SOS " information.VGC can transmit any enciphered message, that is to say, can transmit the ciphertext of conventional cipher system with VGC; D represents that VGC can transmit image information.
Embodiment
(1) at first, produce a large amount of (several more than thousand ten thousand at random, even millions of up to ten million) several kb even longer dna sequence dna, and random number or name (each random dna sequence numbering or virtual gene of called after), each virtual gene adopts the FASTA form, all these virtual genomic constitutions " virtual genome ", and generation " virtual genome database " (VirtualGenome Database, VGDB).
(2) then, all virtual gene Random assignments in " virtual genome database " are tieed up on the array table at one 2, obtain virtual gene distribution position table, this table be " virtual genetic chip " (Virtual DNA Microarray Chip, VDMC).
(3) (VDMC) go up written word mother " T " at " virtual genetic chip ", promptly on VDMC, select " point " that be used for forming letter " T ".
(4) find out the virtual gene of these Ying Yu " virtual genome database " in (VGDB), i.e. B2, C2, D2, C3 and C4.
(5) then, from the virtual gene that each is found out, select a dna sequence dna small fragment randomly: find out " CGACGTGCG " from the virtual gene of B2, find out " ACTCGGC " from the virtual gene of C2, find out " GCCGCGGGA " from the virtual gene of D2, find out " GGAGCCAT " from the virtual gene of C3, find out " CATGCCTCG " from the virtual gene of C4.Utilize local blast program that VGDB is carried out similarity searching, confirm that this small fragment dna sequence dna of random choose is unique in VGDB.That is to say that this small fragment dna sequence dna is one to one with the virtual gene of being selected, in other virtual gene, do not have identical dna sequence dna to exist.
(6) dna sequence dna that all these random chooses are come out in no particular order sequentially random groups altogether (each small fragment dna sequence dna comes with comma) just become cipher-text information: " CGACGTGCG, ACTCGGC, GCCGCGGGA, GGAGCCAT, CATGCCTCG "
(7) after the receiving party receives ciphertext, each small fragment dna sequence dna in the ciphertext " CGACGTGCG, ACTCGGC; GCCGCGGGA; GGAGCCAT, CATGCCTCG " is carried out BLAST to VGDB, find out corresponding virtual gene separately, B2, C2, D2, C3 and C4, on VDMC these virtual genetic markers are come out, letter " T " has just displayed naturally again.
The VGC system is used for digital signature and has special endorsement method.Because what the VGC system used is the information input and output of image recognition formula, also promptly on VDMC, " write " and restore information, therefore, the information itself that VGC transmits is exactly very personalized.The VGC digital signature can really be accomplished handwritten authentic work signature.Can also on the VDMC specific position, do some special marks, thereby make ciphertext can't forge fully.
Claims (12)
1. one kind based on virtual genomic cryptographic system (VGC), it is characterized in that carrying out with method as follows:
(1) produces a large amount of random dna sequences, and random number or name (each random dna sequence numbering or virtual gene of called after), each virtual gene adopts the FASTA form, all these virtual genomic constitutions " virtual genome ", generation " virtual genome database " (Virtual Genome Database, VGDB).
(2) with all the virtual gene Random assignments among the VGDB on one 2 dimension array table, obtain a virtual gene distribution position table, this table be " virtual genetic chip " (Virtual DNAMicroarray Chip, VDMC).
(3) information sender can " be write " any secret information that will transmit on VDMC, just selects " point " that is used to form secret information on the VDMC of huge dot matrix having.
(4) because each point on the VDMC corresponding to a virtual gene among the VGDB, is therefore selected the point of forming secret information on VDMC, be exactly the virtual gene of finding out among the VGDB accordingly.
(5) from the virtual gene that each is found out, select a dna sequence dna small fragment randomly, utilize local blast program that VGDB is carried out similarity searching, confirm that this small fragment dna sequence dna of random choose is unique in VGDB.That is to say that this small fragment dna sequence dna is one to one with the virtual gene of being selected, in other virtual gene, do not have identical dna sequence dna to exist.
(6) dna sequence dna that all these random chooses are come out in no particular order sequentially random groups altogether (each small fragment dna sequence dna separates with comma or other interval mode such as space, branch or the like and comes) just become cipher-text information.
(7) after the receiving party receives ciphertext, to separate each the small fragment dna sequence dna that comes in modes such as commas VGDB will be carried out the BLAST analysis, find out corresponding virtual gene separately, on VDMC these virtual genetic markers are come out, secret information has just displayed.
2. according to claim 1 based on virtual genomic cryptographic system (VGC), it is characterized in that its secret key is made of jointly virtual genome database (VGDB) and virtual genetic chip (VDMC).
3. VGC cryptographic system according to claim 1 is characterized in that each virtual gene all is the dna sequence dna that produces at random among the described VGDB.The numbering of virtual gene or name be at random or irregular.
4. VGC cryptographic system according to claim 1, it is characterized in that described VGDB can be exchanged into virtual Protein Data Bank (Virtual Protein Database, VPDB).
5. according to claim 1 based on virtual genomic cryptographic system, it is characterized in that described " virtual genetic chip " is one 2 dimension array table (VDMC), each point in the table is corresponding to a virtual gene among the VGDB.
6. VGC cryptographic system according to claim 1 is characterized in that described secret information refers to " writing " on the VDMC to select " point " that is used to form secret information on VDMC, just finds out and each point corresponding virtual gene.
7. VGC cryptographic system according to claim 1, it is characterized in that describedly from virtual gene, selecting a dna sequence dna small fragment randomly and referring to optional position in virtual gene DNA sequence and intercept a bit of dna sequence dna (for the purpose of simplifying, generally getting size about 5-10bp) randomly.
8. VGC cryptographic system according to claim 1 is characterized in that described BLAST algorithm refers to the similarity searching algorithm in the bioinformatics, can download and carry out the localization installation from the NCBI website, by illustrating VGDB is formatd processing.The BLAST algorithm has a variety of, VGDB is carried out BLAST adopt the BLASTn algorithm, and VPDB is then adopted the BLASTx algorithm.The purpose of BLAST is to confirm the uniqueness of small fragment dna sequence dna in this encryption method.
9. VGC cryptographic system according to claim 1 is characterized in that described BLAST algorithm also can replace with other string search algorithm such as Knuth-Morris-Pratt (KMP) algorithm.As use string search algorithms such as KMP, the then available arbitrary string sequence replacing of DNA random sequence.
10. VGC cryptographic system according to claim 1, it is characterized in that described ciphertext through claim 6 and 7 selected all small fragment dna sequence dnas in no particular order sequential combination form, between each small fragment dna sequence dna available comma, space, branch, carriage return etc. arbitrarily the character area different with four basic group letters of DNA separate.
11. VGC cryptographic system according to claim 1 is characterized in that can arbitrarily inserting non-VGDB sequence fragment in order to strengthen security performance in the ciphertext, analyzes or other string search algorithm such as KMP confirm that it is not present among the VGDB with BLAST.
12. VGC cryptographic system according to claim 1 is characterized in that its secret key can self.Such as, the small fragment dna sequence dna of Xuan Zeing is in i position of certain virtual gene at random, m is capable, the n row and this virtual gene is on VDMC.So, after encrypting or deciphering, the small fragment sequence also is inserted into (i+j) individual position again from the i position deletion of virtual gene at random, and the virtual gene after the rearrangement is capable from the m on the VDMC, the deletion of n column position also is inserted on (m+a) row, (n+b) column position again.J, a, numerical value transmit leg and the recipient of b can freely arrange.Therefore, after each encryption and decryption process was finished, secret key was just upgraded once automatically.Like this, the VGC cryptographic system has just become the cryptographic system of one-time pad.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910192218.0A CN102025482B (en) | 2009-09-10 | 2009-09-10 | Construction method of virtual genome-based cryptosystem (VGC) |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910192218.0A CN102025482B (en) | 2009-09-10 | 2009-09-10 | Construction method of virtual genome-based cryptosystem (VGC) |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102025482A true CN102025482A (en) | 2011-04-20 |
CN102025482B CN102025482B (en) | 2014-02-12 |
Family
ID=43866386
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910192218.0A Expired - Fee Related CN102025482B (en) | 2009-09-10 | 2009-09-10 | Construction method of virtual genome-based cryptosystem (VGC) |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102025482B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103114127A (en) * | 2011-11-16 | 2013-05-22 | 中国科学院华南植物园 | DNA chip based cipher system |
CN103117850A (en) * | 2011-11-16 | 2013-05-22 | 中国科学院华南植物园 | Cryptosystem based on random sequence database |
CN103200011A (en) * | 2013-04-26 | 2013-07-10 | 福建伊时代信息科技股份有限公司 | Password authentication method and device |
CN104243148A (en) * | 2013-06-24 | 2014-12-24 | 中科英华湖州工程技术研究中心有限公司 | Encryption method and encryption device |
CN104734848A (en) * | 2015-03-02 | 2015-06-24 | 郑州轻工业学院 | Recombinant DNA technology based information encrypting and hiding method and application |
US9350382B1 (en) | 2014-12-19 | 2016-05-24 | International Business Machines Corporation | Pad encoding and decoding |
US9425825B2 (en) | 2012-05-22 | 2016-08-23 | International Business Machines Corporation | Path encoding and decoding |
US9577670B2 (en) | 2014-12-19 | 2017-02-21 | International Business Machines Corporation | Path encoding and decoding |
US10027345B2 (en) | 2014-12-19 | 2018-07-17 | International Business Machines Corporation | Wall encoding and decoding |
CN114285563A (en) * | 2021-12-27 | 2022-04-05 | 中国电信股份有限公司 | Key generation method and device |
EP4101120A4 (en) * | 2020-02-05 | 2024-02-28 | Quantum Digital Solutions Corporation | Information theory genomics-enabled hyper-scalability |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9950261B2 (en) | 2016-04-29 | 2018-04-24 | International Business Machines Corporation | Secure data encoding for low-resource remote systems |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050053968A1 (en) * | 2003-03-31 | 2005-03-10 | Council Of Scientific And Industrial Research | Method for storing information in DNA |
CN1790983A (en) * | 2004-12-15 | 2006-06-21 | 卢明欣 | Method for realizing asymmetric cipher system using DNA chip |
-
2009
- 2009-09-10 CN CN200910192218.0A patent/CN102025482B/en not_active Expired - Fee Related
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117850A (en) * | 2011-11-16 | 2013-05-22 | 中国科学院华南植物园 | Cryptosystem based on random sequence database |
CN103114127A (en) * | 2011-11-16 | 2013-05-22 | 中国科学院华南植物园 | DNA chip based cipher system |
CN103117850B (en) * | 2011-11-16 | 2016-01-20 | 中国科学院华南植物园 | A kind of method for building up of the cryptographic system based on random sequence database |
US9425825B2 (en) | 2012-05-22 | 2016-08-23 | International Business Machines Corporation | Path encoding and decoding |
CN103200011A (en) * | 2013-04-26 | 2013-07-10 | 福建伊时代信息科技股份有限公司 | Password authentication method and device |
CN103200011B (en) * | 2013-04-26 | 2016-04-13 | 福建伊时代信息科技股份有限公司 | A kind of cipher authentication method and device |
CN104243148A (en) * | 2013-06-24 | 2014-12-24 | 中科英华湖州工程技术研究中心有限公司 | Encryption method and encryption device |
US9577670B2 (en) | 2014-12-19 | 2017-02-21 | International Business Machines Corporation | Path encoding and decoding |
US9350382B1 (en) | 2014-12-19 | 2016-05-24 | International Business Machines Corporation | Pad encoding and decoding |
US9473167B2 (en) | 2014-12-19 | 2016-10-18 | International Business Machines Corporation | Pad encoding and decoding |
US9647681B2 (en) | 2014-12-19 | 2017-05-09 | International Business Machines Corporation | Pad encoding and decoding |
US9667271B2 (en) | 2014-12-19 | 2017-05-30 | International Business Machines Corporation | Path encoding and decoding |
US9735804B2 (en) | 2014-12-19 | 2017-08-15 | International Business Machines Corporation | Path encoding and decoding |
US9876508B2 (en) | 2014-12-19 | 2018-01-23 | International Business Machines Corporation | Pad encoding and decoding |
US10027345B2 (en) | 2014-12-19 | 2018-07-17 | International Business Machines Corporation | Wall encoding and decoding |
US10396816B2 (en) | 2014-12-19 | 2019-08-27 | International Business Machines Corporation | Pad encoding and decoding |
CN104734848A (en) * | 2015-03-02 | 2015-06-24 | 郑州轻工业学院 | Recombinant DNA technology based information encrypting and hiding method and application |
EP4101120A4 (en) * | 2020-02-05 | 2024-02-28 | Quantum Digital Solutions Corporation | Information theory genomics-enabled hyper-scalability |
CN114285563A (en) * | 2021-12-27 | 2022-04-05 | 中国电信股份有限公司 | Key generation method and device |
CN114285563B (en) * | 2021-12-27 | 2024-05-10 | 中国电信股份有限公司 | Key generation method and device |
Also Published As
Publication number | Publication date |
---|---|
CN102025482B (en) | 2014-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102025482B (en) | Construction method of virtual genome-based cryptosystem (VGC) | |
Khalifa et al. | High-capacity DNA-based steganography | |
Marwan et al. | DNA-based cryptographic methods for data hiding in DNA media | |
US10225074B2 (en) | Encryption system and method based on biometric technology | |
Kumar et al. | Secret data writing using DNA sequences | |
CN106254074A (en) | A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption | |
CN105119717A (en) | DNA coding based encryption system and encryption method | |
Anwar et al. | Message transmission based on DNA cryptography | |
CN104917747A (en) | Concealed communication method | |
Sreeja et al. | DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology | |
Hamed et al. | DNA based steganography: survey and analysis for parameters optimization | |
Alruily et al. | Asymmetric DNA encryption and decryption technique for Arabic plaintext | |
US20170338943A1 (en) | Dna encryption technologies | |
Mondal et al. | Review on DNA cryptography | |
Khalifa et al. | Secure blind data hiding into pseudo DNA sequences using playfair ciphering and generic complementary substitution | |
Vinodhini et al. | A survey on DNA and image steganography | |
Marwan et al. | An Enhanced DNA-based Steganography Technique with a Higher Hiding Capacity. | |
JP6175453B2 (en) | Encryption and decryption method using nucleic acid | |
Beck et al. | Finding data in DNA: computer forensic investigations of living organisms | |
Singh et al. | A Review on DNA based Cryptography for Data hiding | |
Hirabayashi et al. | Analysis on secure and effective applications of a DNA-based cryptosystem | |
Ibrahim et al. | Enhancing the security of data hiding using double DNA sequences | |
Mahjabin et al. | A Survey on DNA-Based Cryptography and Steganography | |
Aich et al. | A symmetric key cryptosystem using DNA sequence with OTP key | |
Singh et al. | Information hiding techniques based on DNA inconsistency: An overview |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20140212 Termination date: 20160910 |
|
CF01 | Termination of patent right due to non-payment of annual fee |