A covert authentication and security solution for GMOs

BackgroundProliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary.ResultsHerein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible.ConclusionsThis algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.

[1]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[2]  A Leier,et al.  Cryptography with DNA binary strands. , 2000, Bio Systems.

[3]  Gilles Brassard,et al.  Advances in Cryptology — CRYPTO’ 89 Proceedings , 2001, Lecture Notes in Computer Science.

[4]  M. Tomita,et al.  Stabilizing synthetic data in the DNA of living organisms , 2008, Systems and Synthetic Biology.

[5]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[6]  J. Samuel,et al.  DNA Watermarking of Infectious Agents: Progress and Prospects , 2010, PLoS pathogens.

[7]  Nesir Rasool Mahmood,et al.  Public Key Steganography , 2014 .

[8]  Gerrit Bleumer,et al.  Undeniable Signatures , 2011, Encyclopedia of Cryptography and Security.

[9]  David Haughton,et al.  Gene tagging and the data hiding rate , 2012 .

[10]  Steven D. Galbraith,et al.  Invisibility and Anonymity of Undeniable and Confirmer Signatures , 2003, CT-RSA.

[11]  Masanori Arita,et al.  Secret Signatures Inside Genomic DNA , 2004, Biotechnology progress.

[12]  Mihir Bellare,et al.  The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.

[13]  Pak Chung Wong,et al.  Organic data memory using the DNA approach , 2003, CACM.

[14]  Michael Backes,et al.  Public-Key Steganography with Active Attacks , 2005, TCC.

[15]  David Chaum,et al.  Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.

[16]  Laila El Aimani,et al.  On Generic Constructions of Designated Confirmer Signatures , 2009, INDOCRYPT.

[17]  Nicholas Hopper,et al.  Public-Key Steganography , 2003, EUROCRYPT.

[18]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[19]  Christian Cachin,et al.  An information-theoretic model for steganography , 2004, Inf. Comput..

[20]  David Haughton,et al.  BioCode: Two biologically compatible Algorithms for embedding data in non-coding and coding regions of DNA , 2012, BMC Bioinformatics.

[21]  Giuseppe Ateniese Verifiable encryption of digital signatures and applications , 2004, TSEC.

[22]  Miodrag Potkonjak,et al.  Hiding Data in DNA , 2002, Information Hiding.

[23]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[24]  David Chaum,et al.  Designated Confirmer Signatures , 1994, EUROCRYPT.

[25]  Dominik Heider,et al.  DNA-based watermarks using the DNA-Crypt algorithm , 2007, BMC Bioinformatics.

[26]  Thomas H Segall-Shapiro,et al.  Creation of a Bacterial Cell Controlled by a Chemically Synthesized Genome , 2010, Science.

[27]  Jan Camenisch,et al.  Confirmer Signature Schemes Secure against Adaptive Adversaries , 2000, EUROCRYPT.

[28]  D. Heider,et al.  DNA watermarks: A proof of concept , 2008, BMC Molecular Biology.

[29]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.