sEncrypt: An Encryption Algorithm Inspired from Biological Processes

We present a new conceptual methodology for realizing encryption involving trap-door functions built from biological processes. Many standard encryption methods such as RSA security, for example, utilize functions that are easy to compute in one direction but the reverse is a computationally hard problem without a key. In biology, a trap-door like functions can be created from natural phenomena such as the process of creating protein sequences. A fragment of DNA can be transformed to protein easily however given a protein sequence, it is very hard to convert the protein information back to DNA. In essence, protein creation is a lossy function and if we keep certain side-information secret, then a trap-door like function can be constructed from this mechanism that is ideal for encryption. We propose sEncrypt (sequence Encrypt), a model inspired by the central dogma of biology to encode, encrypt, decrypt and decode plain text using publicly-available sequence data from bioinformatics research. We evaluate the entropy of the cipher text to show randomness of characters and show by autocorrelation tests that the encrypted text of our method contains no repetition which could form potential weaknesses. These tests and results show that the sEncrypt framework constitutes a good encryption framework for use in information exchange.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  I. Longden,et al.  EMBOSS: the European Molecular Biology Open Software Suite. , 2000, Trends in genetics : TIG.

[4]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[5]  Subhash C. Kak,et al.  Online data storage using implicit security , 2009, Inf. Sci..

[6]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[7]  Justin Zobel,et al.  Iterative Dictionary Construction for Compression of Large DNA Data Sets , 2012, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[8]  Abhishek Parakh,et al.  An Efficient Quasigroup Block Cipher , 2012, Wireless Personal Communications.

[10]  Abhishek Parakh,et al.  A probabilistic quantum key transfer protocol , 2013, Secur. Commun. Networks.

[11]  Joachim O. Rädler,et al.  Structure of DNA-Cationic Liposome Complexes: DNA Intercalation in Multilamellar Membranes in Distinct Interhelical Packing Regimes , 1997, Science.

[12]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[13]  Abhishek Parakh,et al.  Efficient Quasigroup Block Cipher for Sensor Networks , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[14]  A Leier,et al.  Cryptography with DNA binary strands. , 2000, Bio Systems.

[15]  T. Richmond,et al.  The structure of DNA in the nucleosome core , 2003, Nature.

[16]  M. Adimoolam,et al.  Bi-serial DNA Encryption Algorithm(BDEA) , 2011, ArXiv.

[17]  Leonid A. Levin,et al.  The Tale of One-Way Functions , 2000, Probl. Inf. Transm..

[18]  Danilo Gligoroski Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations , 2005, IACR Cryptol. ePrint Arch..

[19]  Bruce Schneier,et al.  The Twofish encryption algorithm: a 128-bit block cipher , 1999 .

[20]  Dominik Heider,et al.  DNA-based watermarks using the DNA-Crypt algorithm , 2007, BMC Bioinformatics.

[21]  Zhen Ji,et al.  Self-configuration single particle optimizer for DNA sequence compression , 2013, Soft Comput..

[22]  M. Capobianchi,et al.  Possible compartmentalization of hepatitis C viral replication in the genital tract of HIV-1-coinfected women. , 2006, The Journal of infectious diseases.

[23]  Toshimichi Ikemura,et al.  Codon usage tabulated from the international DNA sequence databases , 1997, Nucleic Acids Res..

[24]  Andrew S. Tanenbaum,et al.  Computer Networks , 1981 .

[25]  G. Hong,et al.  Nucleic Acids Research , 2015, Nucleic Acids Research.

[26]  John H. Reif,et al.  DNA-based Cryptography , 1999, Aspects of Molecular Computing.

[27]  Henry B. Mann,et al.  The Construction of Orthogonal Latin Squares , 1942 .

[28]  Sara P. Garcia,et al.  GReEn: a tool for efficient compression of genome resequencing data , 2011, Nucleic acids research.

[29]  Debabrata Datta,et al.  An Improved Symmetric Key Cryptography with DNA Based Strong Cipher , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[30]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[31]  Eli Biham,et al.  Serpent and Smartcards , 1998, CARDIS.

[32]  T. Steitz,et al.  Structure of DNA polymerase I Klenow fragment bound to duplex DNA , 1993, Science.

[33]  Peter B. McGarvey,et al.  Infrastructure for the life sciences: design and implementation of the UniProt website , 2009, BMC Bioinformatics.

[34]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..