HyDEn: A Hybrid Steganocryptographic Approach for Data Encryption Using Randomized Error-Correcting DNA Codes

This paper presents a novel hybrid DNA encryption (HyDEn) approach that uses randomized assignments of unique error-correcting DNA Hamming code words for single characters in the extended ASCII set. HyDEn relies on custom-built quaternary codes and a private key used in the randomized assignment of code words and the cyclic permutations applied on the encoded message. Along with its ability to detect and correct errors, HyDEn equals or outperforms existing cryptographic methods and represents a promising in silico DNA steganographic approach.

[1]  Ja-Ling Wu,et al.  Digital invisible ink and its applications in steganography , 2006, MM&Sec '06.

[2]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[3]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[4]  Neil J. A. Sloane,et al.  The theory of error-correcting codes (north-holland , 1977 .

[5]  Niema Aboluion,et al.  Linear and nonlinear constructions of DNA codes with Hamming distance d, constant GC-content and a reverse-complement constraint , 2012 .

[6]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[7]  Giuseppe Di Battista,et al.  26 Computer Networks , 2004 .

[8]  Anne Condon,et al.  Stochastic Local Search Algorithms for DNA Word Design , 2002, DNA.

[9]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[10]  Mohammad Reza Najaf Torkaman,et al.  INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USINGDNA STEGANOGRAPHY , 2012 .

[11]  Amit Marathe,et al.  On combinatorial DNA word design , 1999, DNA Based Computers.

[12]  Hiroaki Kojima,et al.  Design of True Random One-Time Pads in DNA XOR Cryptosystem , 2009, IWNC.

[13]  M. Friedman The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance , 1937 .

[14]  Richard C. T. Lee,et al.  Data hiding methods based upon DNA sequences , 2010, Inf. Sci..

[15]  Patric R. J. Östergård,et al.  Error-Correcting Codes over an Alphabet of Four Elements , 2001, Des. Codes Cryptogr..

[16]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..

[17]  Viviana I. Risca DNA-BASED STEGANOGRAPHY , 2001, Cryptologia.

[18]  Masanori Arita,et al.  Secret Signatures Inside Genomic DNA , 2004, Biotechnology progress.

[19]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[20]  Dominik Heider,et al.  DNA-based watermarks using the DNA-Crypt algorithm , 2007, BMC Bioinformatics.

[21]  Oliver D. King,et al.  Linear constructions for DNA codes , 2005, Theor. Comput. Sci..

[22]  Philip Zimmermann,et al.  PGP source code and internals , 1995 .

[23]  Holger H. Hoos,et al.  Hybrid Randomised Neighbourhoods Improve Stochastic Local Search for DNA Code Design , 2003, Canadian Conference on AI.

[24]  Oliver D. King,et al.  Bounds for DNA Codes with Constant GC-Content , 2003, Electron. J. Comb..

[25]  Koen De Bosschere,et al.  Steganography for Executables and Code Transformation Signatures , 2004, ICISC.

[26]  Pak Chung Wong,et al.  Organic data memory using the DNA approach , 2003, CACM.

[27]  John H. Reif,et al.  DNA-based Cryptography , 1999, Aspects of Molecular Computing.

[28]  Keshav P. Dahal,et al.  Review on the Advancements of DNA Cryptography , 2010, ArXiv.

[29]  A Leier,et al.  Cryptography with DNA binary strands. , 2000, Bio Systems.

[30]  Roberto Montemanni,et al.  Construction of Constant GC-Content DNA Codes via a Variable Neighbourhood Search Algorithm , 2008, J. Math. Model. Algorithms.

[31]  Eric Cole,et al.  Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .

[32]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[33]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[34]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[35]  K. Mullis,et al.  Primer-directed enzymatic amplification of DNA with a thermostable DNA polymerase. , 1988, Science.

[36]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.