An optimized DNA based encryption scheme with enforced secure key distribution

被引:0
|
作者
Yunpeng Zhang
Xin Liu
Yongqiang Ma
Liang-Chieh Cheng
机构
[1] University of Houston,Department of Information and Logistics Technology
[2] University of Houston,Department of Computer Science
[3] Xi’an Jiaotong University,undefined
来源
Cluster Computing | 2017年 / 20卷
关键词
DNA cryptography; Symmetric encryption; Hamming code; Block cipher; Maximum length matching; Data security; DNA base sequence;
D O I
暂无
中图分类号
学科分类号
摘要
More and more sensitive information is transmitted and stored in computer networks. Security has become a critical issue. As traditional cryptographic systems are now vulnerable to attacks, DNA based cryptography has been identified as a promising technology because of the vast parallelism and extraordinary information density. While a body of research has proposed the DNA based encryption algorithm, no research has provided solutions to distribute complex and long secure keys. This paper introduces a Hamming code and a block cipher mechanism to ensure secure transmission of a secure key. The research overcomes the limitation on the length of the secure key represented by DNA strands. Therefore it proves that real biological DNA strands are useful for encryption computing. To evaluate our method, we apply the block cipher mechanism to optimize a DNA-based implementation of a conventional symmetric encryption algorithm, described as “yet another encryption algorithm”. Moreover, a maximum length matching algorithm is developed to provide immunity against frequency attacks.
引用
收藏
页码:3119 / 3130
页数:11
相关论文
共 50 条
  • [21] A CCA secure public key encryption scheme based on finite groups of Lie type
    Haibo Hong
    Jun Shao
    Licheng Wang
    Mande Xie
    Guiyi Wei
    Yixian Yang
    Song Han
    Jianhong Lin
    Science China Information Sciences, 2022, 65
  • [22] A SECURE BSS-BASED ENCRYPTION SCHEME USING AES KEY EXPANSION APPROACH
    Okhovat, Raziyeh Sadat
    Sadr, Ali
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 277 - +
  • [23] Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN
    Qiu, Weidong
    Zhou, Yaowei
    Zhu, Bo
    Zheng, Yanfei
    Wen, Mi
    Gong, Zheng
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 200 - +
  • [24] A CCA secure public key encryption scheme based on finite groups of Lie type
    Hong, Haibo
    Shao, Jun
    Wang, Licheng
    Xie, Mande
    Wei, Guiyi
    Yang, Yixian
    Han, Song
    Lin, Jianhong
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [25] A CCA secure public key encryption scheme based on finite groups of Lie type
    Haibo HONG
    Jun SHAO
    Licheng WANG
    Mande XIE
    Guiyi WEI
    Yixian YANG
    Song HAN
    Jianhong LIN
    ScienceChina(InformationSciences), 2022, 65 (01) : 268 - 270
  • [26] An encryption scheme based on DNA
    Lu, Ming-Xin
    Chen, Yuan
    Qin, Lei
    Xiao, Guo-Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2006, 33 (06): : 939 - 942
  • [27] Analysis of a key distribution scheme in secure multicasting
    Maze, Gerard
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (01) : 69 - 80
  • [28] Secure and efficient conference key distribution scheme
    Yuan, Ding
    Fan, Ping-Zhi
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2002, 37 (04):
  • [29] A distributed and computationally secure key distribution scheme
    Daza, V
    Herranz, J
    Padró, C
    Sáez, G
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 342 - 356
  • [30] A scalable key distribution scheme for secure multicast
    Li, BH
    Hou, YB
    Zhao, YL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2532 - 2536