Analysis on Secure and Effective Applications of a DNA-Based Cryptosystem

Unbreakable encryption is theoretically possible but perfect operation is difficult. It is expected that DNA-based cryptography provides new solutions to realize a perfect secrecy system. For example, the self-assembly process in DNA logical computation can generate physical random numbers for encryption keys. Furthermore DNA-based steganography offers a unique method to keep the key and the cipher in safe. In this paper we describe a theoretical background on perfect secrecy based on Shannon entropy and present an empirical analysis on effectiveness of a DNA-based cryptosystem using a DNA motif called "triple crossover tile." In DNA computation, troublesome procedures to read out the calculation results prevent the realization of practical applications. To solve this problem, we already presented the idea of a direct readout method called "tile sequencing" with atomic force microscopy image analysis. "Tile sequencing" makes it possible to extract random calculation results, which is difficult to read out by existing methods. Here we discuss the appropriate application of the DNA cryptosystem taking advantage of "tile sequencing." Although there are still problems to be solved, the separation storage of specific information, such as medical records, and personal data using personal identifiers encrypted by DNA cryptography will be one of promising applications.

[1]  Hiroaki Kojima,et al.  Design of True Random One-Time Pads in DNA XOR Cryptosystem , 2009, IWNC.

[2]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[3]  Hiroaki Kojima,et al.  Effective algorithm to encrypt information based on self-assembly of DNA tiles. , 2009, Nucleic acids symposium series.

[4]  J. Reif,et al.  Logical computation using algorithmic self-assembly of DNA triple-crossover molecules , 2000, Nature.

[5]  John H. Reif,et al.  DNA-based Cryptography , 1999, Aspects of Molecular Computing.

[6]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Christof M Niemeyer,et al.  Rational design of DNA nanoarchitectures. , 2006, Angewandte Chemie.

[9]  J. Reif,et al.  Construction, analysis, ligation, and self-assembly of DNA triple crossover complexes , 2000 .

[10]  Jin Xu,et al.  One-Time-Pads encryption in the tile assembly model , 2008, 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications.

[11]  Masami Hagiya,et al.  Implementation of tile sequencing for DNA logical computation toward next-generation information security , 2010, 2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA).

[12]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[13]  Masahito Yamamoto,et al.  Combining Randomness and a High-Capacity DNA Memory , 2007, DNA.