Cascaded encryption/decryption using digital polymer toward high-level information security

被引:5
|
作者
Shi, Qiunan [1 ,2 ]
Miao, Tengfei [1 ,3 ]
Lu, Jingqiu [1 ]
Hu, Lihua [4 ]
Huang, Xiaoman [1 ]
Wang, Zhao [1 ]
Piao, Minghao [5 ]
Huang, Zhihao [1 ]
Zhang, Zhengbiao [1 ,6 ]
机构
[1] Soochow Univ, Coll Chem Chem Engn & Mat Sci, Suzhou 215123, Peoples R China
[2] China Wafer Level CSP Co Ltd, Automot Chip Technol Res Inst, Suzhou 215026, Peoples R China
[3] Huaiyin Normal Univ, Sch Chem & Chem Engn, Jiangsu Key Lab Chem Low Dimens Mat, Huaian 223300, Peoples R China
[4] Soochow Univ, Anal & Testing Ctr, Suzhou 215123, Peoples R China
[5] Soochow Univ, Collaborat Innovat Ctr Novel Software Technol & In, Sch Comp Sci & Technol, Suzhou 215123, Peoples R China
[6] Soochow Univ, State Key Lab Radiat Med & Protect, Suzhou 215123, Peoples R China
关键词
PHOSPHORAMIDITE; DESIGN;
D O I
10.1016/j.giant.2023.100172
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Encoding information in digital polymers has become a promising approach for data storage in recent years. High-level information security is crucial for practical application, which is still challenging in digital polymers due to the lack of efficient techniques. Herein, we proposed a cascaded encr yption/decr yption approach that uses Morse-coded digital polymers to encipher sequence information as well as molecular weight distribution (MWD) information. The MWD information could be deconvoluted in size exclusion chromatography (1st decryption), whereas the 2nd decryption was performed in tandem mass spectrometry. The correct information could only be accessed after two successive decryption processes, thus providing high-level information security. Furthermore, this cascaded strategy was applied to a printing ink formulation for multidimensional anti-counterfeiting applications toward high-value artwork.
引用
下载
收藏
页数:7
相关论文
共 50 条
  • [1] Encryption and Decryption of Mobile Security Using AES and GOST Algorithms
    Ilyas, Muhammad
    Naqash, Talha
    Shah, Sajjad Hussain
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 769 - 772
  • [2] Dynamically Reconfigurable Encryption and Decryption System Design for the Internet of Things Information Security
    Wang, Zhu
    Yao, Yan
    Tong, Xiaojun
    Luo, Qinghua
    Chen, Xiangyu
    SENSORS, 2019, 19 (01)
  • [3] Toward a high-level reasoning module for enterprise information systems
    Jones, James D.
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 687 - 694
  • [4] Data Security using Authenticated Encryption and Decryption Algorithm for Android Phones
    Vichare, Abhishek
    Jose, Tania
    Tiwari, Jagruti
    Yadav, Uma
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 789 - 794
  • [5] TOWARD A HIGH-LEVEL LANGUAGE
    不详
    ELECTRONICS, 1978, 51 (17): : 24 - 24
  • [6] Proposed Model to Implement High-Level Information Security in Internet of Things
    Castilho, Sergio Duque
    Godoy, Eduardo P.
    Castilho, Tayane W. L.
    Salmen, Fadir
    2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2017, : 165 - 170
  • [7] A bionic intelligent hydrogel with multi-level information encryption and decryption capabilities
    Zhu, Chenhao
    Zhang, Lun
    Zou, Ao
    Wang, Weiwen
    Zhang, Jihai
    Zhang, Aimin
    CHEMICAL ENGINEERING JOURNAL, 2023, 475
  • [8] Low Latency for File Encryption and Decryption Using BRA Algorithm in Network Security
    Maitri, Punam V.
    Waghole, Dattatray S.
    Deshpande, Vivek S.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [9] Using high-level visual information for color constancy
    van de Weijer, Joost
    Schmid, Cordelia
    Verbeek, Jakob
    2007 IEEE 11TH INTERNATIONAL CONFERENCE ON COMPUTER VISION, VOLS 1-6, 2007, : 2197 - 2204
  • [10] HIGH-LEVEL SYNTHESIS USING GIVEN DATAPATH INFORMATION
    MIYAZAKI, T
    IKEDA, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (10) : 1617 - 1625