1
|
Aqeel S, Khan SU, Khan AS, Alharbi M, Shah S, Affendi ME, Ahmad N. DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets. Sci Rep 2024; 14:13839. [PMID: 38879689 PMCID: PMC11180196 DOI: 10.1038/s41598-024-64419-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/21/2024] [Accepted: 06/09/2024] [Indexed: 06/19/2024] Open
Abstract
With the urge to secure and protect digital assets, there is a need to emphasize the immediacy of taking measures to ensure robust security due to the enhancement of cyber security. Different advanced methods, like encryption schemes, are vulnerable to putting constraints on attacks. To encode the digital data and utilize the unique properties of DNA, like stability and durability, synthetic DNA sequences are offered as a promising alternative by DNA encoding schemes. This study enlightens the exploration of DNA's potential for encoding in evolving cyber security. Based on the systematic literature review, this paper provides a discussion on the challenges, pros, and directions for future work. We analyzed the current trends and new innovations in methodology, security attacks, the implementation of tools, and different metrics to measure. Various tools, such as Mathematica, MATLAB, NIST test suite, and Coludsim, were employed to evaluate the performance of the proposed method and obtain results. By identifying the strengths and limitations of proposed methods, the study highlights research challenges and offers future scope for investigation.
Collapse
Affiliation(s)
- Sehrish Aqeel
- Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, 94300, Kota Samarahan, Malaysia
| | - Sajid Ullah Khan
- Department of Information Systems, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, AlKharj, Kingdom of Saudi Arabia.
- Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia.
| | - Adnan Shahid Khan
- Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, 94300, Kota Samarahan, Malaysia
| | - Meshal Alharbi
- Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia
| | - Sajid Shah
- EIAS Lab, CCIS, Prince Sultan University, Riyadh, Saudi Arabia
| | | | - Naveed Ahmad
- College of Computer Information Sciences, CCIS, Prince Sultan University, Riyadh, Saudi Arabia
| |
Collapse
|
2
|
Zan X, Chu L, Xie R, Su Y, Yao X, Xu P, Liu W. An image cryptography method by highly error-prone DNA storage channel. Front Bioeng Biotechnol 2023; 11:1173763. [PMID: 37152655 PMCID: PMC10154519 DOI: 10.3389/fbioe.2023.1173763] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/25/2023] [Accepted: 03/30/2023] [Indexed: 05/09/2023] Open
Abstract
Introduction: Rapid development in synthetic technologies has boosted DNA as a potential medium for large-scale data storage. Meanwhile, how to implement data security in the DNA storage system is still an unsolved problem. Methods: In this article, we propose an image encryption method based on the modulation-based storage architecture. The key idea is to take advantage of the unpredictable modulation signals to encrypt images in highly error-prone DNA storage channels. Results and Discussion: Numerical results have demonstrated that our image encryption method is feasible and effective with excellent security against various attacks (statistical, differential, noise, and data loss). When compared with other methods such as the hybridization reactions of DNA molecules, the proposed method is more reliable and feasible for large-scale applications.
Collapse
Affiliation(s)
- Xiangzhen Zan
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Ling Chu
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Ranze Xie
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Yanqing Su
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Xiangyu Yao
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
| | - Peng Xu
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
- School of Computer Science of Information Technology, Qiannan Normal University for Nationalities, Duyun, Guizhou, China
- Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application, Guangzhou, Guangdong, China
| | - Wenbin Liu
- Institute of Computational Science and Technology, Guangzhou University, Guangzhou, Guangdong, China
- Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application, Guangzhou, Guangdong, China
| |
Collapse
|
3
|
Gao S, Wu R, Wang X, Liu J, Li Q, Tang X. EFR-CSTP: Encryption for Face Recognition Based on the Chaos and Semi-tensor Product Theory. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.11.121] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/02/2022]
|
4
|
Liang Z, Qin Q, Zhou C. An image encryption algorithm based on Fibonacci Q-matrix and genetic algorithm. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07493-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
|
5
|
Wang Y, Mao T, Sun J, Liu P. Exponential Function Computation Based on DNA Strand Displacement Circuits. IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS 2022; 16:479-488. [PMID: 35727777 DOI: 10.1109/tbcas.2022.3184760] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/15/2023]
Abstract
Due to its high programmability and storage, DNA circuits have been widely used in biological computing. In this paper, the addition, subtraction, multiplication, division, n-order and 1/n-order gates are built through DNA strand displacement reactions. The chemical reaction networks of the exponential function are established by using the six DNA analog computation gates. The integrated DNA strand displacement circuits are built through the chemical reaction networks. The exponential function polynomials can be computed through the integrated DNA strand displacement circuits. Finally, through visual DSD software verification, this design can realise the computation of exponential function polynomials, which provides a reference for solving exponential function equations and neural network computations in the future.
Collapse
|
6
|
Zhu E, Luo X, Liu C, Chen C. An Operational DNA Strand Displacement Encryption Approach. NANOMATERIALS 2022; 12:nano12050877. [PMID: 35269365 PMCID: PMC8912636 DOI: 10.3390/nano12050877] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/14/2022] [Revised: 02/21/2022] [Accepted: 03/03/2022] [Indexed: 11/17/2022]
Abstract
DeoxyriboNucleic Acid (DNA) encryption is a new encryption method that appeared along with the research of DNA nanotechnology in recent years. Due to the complexity of biology in DNA nanotechnology, DNA encryption brings in an additional difficulty in deciphering and, thus, can enhance information security. As a new approach in DNA nanotechnology, DNA strand displacement has particular advantages such as being enzyme free and self-assembly. However, the existing research on DNA-strand-displacement-based encryption has mostly stayed at a theoretical or simulation stage. To this end, this paper proposes a new DNA-strand-displacement-based encryption framework. This encryption framework involves three main strategies. The first strategy was a tri-phase conversion from plaintext to DNA sequences according to a Huffman-coding-based transformation rule, which enhances the concealment of the information. The second strategy was the development of DNA strand displacement molecular modules, which produce the initial key for information encryption. The third strategy was a cyclic-shift-based operation to extend the initial key long enough, and thus increase the deciphering difficulty. The results of simulation and biological experiments demonstrated the feasibility of our scheme for encryption. The approach was further validated in terms of the key sensitivity, key space, and statistic characteristic. Our encryption framework provides a potential way to realize DNA-strand-displacement-based encryption via biological experiments and promotes the research on DNA-strand-displacement-based encryption.
Collapse
Affiliation(s)
- Enqiang Zhu
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou 510006, China; (E.Z.); (X.L.)
| | - Xianhang Luo
- Institute of Computing Science and Technology, Guangzhou University, Guangzhou 510006, China; (E.Z.); (X.L.)
| | - Chanjuan Liu
- School of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China
- Correspondence:
| | - Congzhou Chen
- School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China;
| |
Collapse
|
7
|
A Double-Layer Image Encryption Scheme Based on Chaotic Maps and DNA Strand Displacement. J CHEM-NY 2022. [DOI: 10.1155/2022/3906392] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022] Open
Abstract
The image encryption schemes combining chaotic maps, DNA coding, and DNA sequence operation can effectively protect the image. In this paper, a double-layer image encryption scheme is proposed by combining chaotic maps with DNA strand displacement (DSD). Chaotic maps are used to generate pseudorandom sequences and perform routine scrambling and diffusion operations on the plaintext image. We propose three DSD-based encryption rules according to the diversity of DNA strand displacement, and these three encryption rules are used to encrypt the image at the DNA sequence level. The plaintext image can be transformed into the cipher image, which is difficult to be recognized without the correct keys through the double-layer encryption at the level of chaotic maps and DNA. Simulation results and security analysis show that the proposed encryption scheme can effectively protect image information and resist conventional information attacks.
Collapse
|
8
|
Sun J, Mao T, Wang Y. Solution of Simultaneous Higher Order Equations Based on DNA Strand Displacement Circuit. IEEE Trans Nanobioscience 2021; 21:511-519. [PMID: 34784281 DOI: 10.1109/tnb.2021.3128393] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
Abstract
Currently, DNA strand displacement is often used to build neural networks or solve logical problems. While there are few studies on the use of DNA strand displacement to solve the higher order equations. In this paper, the catalysis, degradation, annihilation and adjusted reaction modules are built through DNA strand displacement. The chemical reaction networks of the corresponding higher order equations and simultaneous equations are established through these modules, and these chemical reaction networks can be used to build analog circuits to solve binary primary simultaneous equations and binary quadratic simultaneous equations. Finally, through Visual DSD software verification, this design can realize the solution of binary primary simultaneous equations and binary quadratic simultaneous equations, which provides a reference for DNA computation in the future.
Collapse
|