DNA-like linguistic secret sharing for strategic information systems

Abstract The development of DNA cryptography has contributed to the ability of solving many computationally difficult problems by offering the capability of executing calculations in parallel. This capability is used particularly in solving NP-complete problems or implementing cryptography and steganography solutions. Biological computation models based on bonds between nitrogen bases in nucleic acid chains that make up DNA structures can also be used to develop new solutions for smart information management. This study discusses new secret splitting techniques based on mathematical linguistic methods and designed for intelligently managing secret data within hierarchical structures. These techniques make use of information coding models found in the coding of DNA sequences.

[1]  Marek R. Ogiela,et al.  Linguistic Approach to Cryptographic Data Sharing , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Marek R. Ogiela,et al.  The use of mathematical linguistic methods in creating secret sharing threshold algorithms , 2010, Comput. Math. Appl..

[4]  Marek R. Ogiela,et al.  Security of Linguistic Threshold Schemes in Multimedia Systems , 2009, KES IIMSS.

[5]  Marek R. Ogiela,et al.  Shadow Generation Protocol in Linguistic Threshold Schemes , 2009, FGIT-SecTech.

[6]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[7]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[8]  Marek R. Ogiela,et al.  The automatic understanding approach to systems analysis and design , 2008, Int. J. Inf. Manag..

[9]  Erik Winfree,et al.  On applying molecular computation to the data encryption standard , 1999, DNA Based Computers.

[10]  L M Adleman,et al.  Molecular computation of solutions to combinatorial problems. , 1994, Science.

[11]  John H. Reif,et al.  DNA-based Cryptography , 1999, Aspects of Molecular Computing.

[12]  Guozhen Xiao,et al.  New field of cryptography: DNA cryptography , 2006 .

[13]  Jennifer Seberry,et al.  Cryptography - an introduction to computer security , 1991, Advances in computer science series.

[14]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.