Cascaded encryption/decryption using digital polymer toward high-level information security

被引:5
|
作者
Shi, Qiunan [1 ,2 ]
Miao, Tengfei [1 ,3 ]
Lu, Jingqiu [1 ]
Hu, Lihua [4 ]
Huang, Xiaoman [1 ]
Wang, Zhao [1 ]
Piao, Minghao [5 ]
Huang, Zhihao [1 ]
Zhang, Zhengbiao [1 ,6 ]
机构
[1] Soochow Univ, Coll Chem Chem Engn & Mat Sci, Suzhou 215123, Peoples R China
[2] China Wafer Level CSP Co Ltd, Automot Chip Technol Res Inst, Suzhou 215026, Peoples R China
[3] Huaiyin Normal Univ, Sch Chem & Chem Engn, Jiangsu Key Lab Chem Low Dimens Mat, Huaian 223300, Peoples R China
[4] Soochow Univ, Anal & Testing Ctr, Suzhou 215123, Peoples R China
[5] Soochow Univ, Collaborat Innovat Ctr Novel Software Technol & In, Sch Comp Sci & Technol, Suzhou 215123, Peoples R China
[6] Soochow Univ, State Key Lab Radiat Med & Protect, Suzhou 215123, Peoples R China
关键词
PHOSPHORAMIDITE; DESIGN;
D O I
10.1016/j.giant.2023.100172
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Encoding information in digital polymers has become a promising approach for data storage in recent years. High-level information security is crucial for practical application, which is still challenging in digital polymers due to the lack of efficient techniques. Herein, we proposed a cascaded encr yption/decr yption approach that uses Morse-coded digital polymers to encipher sequence information as well as molecular weight distribution (MWD) information. The MWD information could be deconvoluted in size exclusion chromatography (1st decryption), whereas the 2nd decryption was performed in tandem mass spectrometry. The correct information could only be accessed after two successive decryption processes, thus providing high-level information security. Furthermore, this cascaded strategy was applied to a printing ink formulation for multidimensional anti-counterfeiting applications toward high-value artwork.
引用
下载
收藏
页数:7
相关论文
共 50 条
  • [21] HIGH-LEVEL SYNTHESIS OF DIGITAL CIRCUITS
    DEMICHELI, G
    IEEE DESIGN & TEST OF COMPUTERS, 1990, 7 (05): : 6 - 7
  • [22] MILSIM - A HIGH-LEVEL DIGITAL SIMULATOR
    VISSERS, KA
    MICROPROCESSING AND MICROPROGRAMMING, 1985, 16 (2-3): : 191 - 191
  • [23] FAST RETRIEVAL OF THE SYMBOL INFORMATION USING THE HIGH-LEVEL LANGUAGE
    GITER, DM
    GOVOROVSKII, SB
    KARTASHOV, AP
    NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 2-INFORMATSIONNYE PROTSESSY I SISTEMY, 1985, (04): : 10 - 11
  • [24] Overlapping speech detection using high-level information features
    Ma Y.
    Bao C.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 57 (01): : 79 - 83
  • [25] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629
  • [26] Security and Reliability Evaluation of Countermeasures implemented using High-Level Synthesis
    Koufopoulou, Amalia-Artemis
    Xevgeni, Kalliopi
    Papadimitriou, Athanasios
    Psarakis, Mihalis
    Hely, David
    2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022), 2022,
  • [27] SECURITY MECHANISMS IN HIGH-LEVEL NETWORK PROTOCOLS
    VOYDOCK, VL
    KENT, ST
    COMPUTING SURVEYS, 1983, 15 (02) : 135 - 171
  • [28] HIGH-LEVEL SECURITY ARCHITECTURES AND THE KERBEROS SYSTEM
    RUSSELL, D
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1990, 19 (3-5): : 201 - 214
  • [29] High-Level Information Fusion of Cyber-Security Expert Knowledge and Experimental Data
    Costa, Paulo C. G.
    Yu, Bo
    Atighetchi, Michael
    Myers, David
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 2322 - 2329
  • [30] On ontologies for high-level information fusion
    Nowak, C
    FUSION 2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE OF INFORMATION FUSION, VOLS 1 AND 2, 2003, : 657 - 664