Analytical Study on DNA-based Modern Cryptographic Techniques

Notice

This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Year : 2025 | Volume : 03 | Issue : 02 | Page : –
    By

    Nupur Singh,

  • Amit Singhal,

Abstract

Today, as the amount of information being stored and shared continues to grow rapidly, ensuring the security of that information has become more important than ever.

To ensure information security, a variety of techniques are employed, including traditional cryptographic methods such as substitution and transposition techniques, hashing functions, and encryption algorithms like DES, RSA, AES, IDEA, and ECC. DNA cryptography is also new emerging technique for providing security to data and information.

The DNA cryptography uses Bio-molecular computational abilities of De-oxy-ribo-Nucleic Acid. There are large amount of DNA researches have been performed to secure data and information form attack. This paper highlights a comparison of different existing cryptographic techniques through a comprehensive review.

Keywords: DNA structure, DNA cryptography, DNA techniques, comparison, utilization.

[This article belongs to International Journal of Bioinformatics and Computational Biology ]

How to cite this article:
Nupur Singh, Amit Singhal. Analytical Study on DNA-based Modern Cryptographic Techniques. International Journal of Bioinformatics and Computational Biology. 2025; 03(02):-.
How to cite this URL:
Nupur Singh, Amit Singhal. Analytical Study on DNA-based Modern Cryptographic Techniques. International Journal of Bioinformatics and Computational Biology. 2025; 03(02):-. Available from: https://journals.stmjournals.com/ijbcb/article=2025/view=208953


References

[1] Adleman LM. Molecular computation of solutions to combinatorial problems. science. 1994 Nov 11;266(5187):1021-4.
[2] Cui GZ, Liu Y, Zhang X. New direction of data storage: DNA molecular storage technology. Computer Engineering and Applications. 2006;42(26):29-32.
[3] Chen J. A DNA-based, biomolecular cryptography design. In2003 IEEE International Symposium on Circuits and Systems (ISCAS) 2003 May 25 (Vol. 3, pp. III-III). IEEE.
[4] Cui G, Qin L, Wang Y, Zhang X. An encryption scheme using DNA technology. In2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications 2008 Sep 28 (pp. 37-42). IEEE.
[5] Lu M, Lai X, Xiao G, Qin L. Symmetric-key cryptosystem with DNA technology. Science in China Series F: Information Sciences. 2007 Jun;50:324-33.
[6] L. H. N. C. for Biomedical Communications, Handbook on GeneticCells and DNA. USA: National Library of Medicine, National Institute of Health, Department of Health and Human Services., 2020.
[7] Tanaka K, Okamoto A, Saito I. Public-key system using DNA as a one-way function for key distribution. Biosystems. 2005 Jul 1;81(1):25-9.
[8] J. Fuscoe, W. Branham, C. Melvin, V. Desai, C. Moland, T. Han, L. Shi,W. Tong, A. Scully, and R. Delongchamp, “Technical issues involvedin obtaining reliable data from microarray experiments,” RegulatoryResearch Perspective, National Center for Toxicological Research, USA, vol. 6, no. 1, pp. 1–22, 2016.
[9] A. Gehani, T. LaBean, and J. Reif, DNA based cryptography. Germany:Aspects of Moleculer Computing, Springer-Verlag., 2014.
[10] M. Amosa, G. Paun and G. Rozenbergd. “Topics in the theory of DNA computing,” Theoretical cience, vol. 287, pp. 3–38, 2002.
[11] G. Z. Xiao, “New field of cryptography: DNA cryptography,” Chinese Science Bulletin, vol. 51, pp. 1139–1144, 2016.
[12] LU MingXin, “Symmetric KeyCryptosystem With Dna Technology” Science China pp 324-223,June 2017.
[13] J Chen “A DNA-based, Bimolecular Cryptography Design”ISCAS’03.Proceedings2023
[14] LAI XueJia, LU MingXin “Asymmetric encryption and signature method with DNA technology” Vol. 53 No. 3: 506–514 March 2010.
[15] Ning Kang, A pseudo DNA cryptography Method, http://arxiv.org/abs/0903.2693 ,2009.
[16] Monica Borda, “DNA secret writing Techniques” IEEE conferences 2010.
[17] Ashish Gehani, Thomas H. LaBean and John H. Reif “DNA-based Cryptography” 5th Annual DIMACS Meeting on DNA Based Computers(DNA 5), MIT, Cambridge, MA, June 1999.
[18] V. M. M. Shyam, N. Kiran, “A novel encryption scheme based on dna computing,” in 14th IEEE International Conference, Tia, India, Dec.-2007.
[19] A. Gehani, T. LaBean, and J. Reif, DNA based cryptography. Germany:Aspects of Moleculer Computing, Springer-Verlag., 2004.
[20] Kuldeep Singh ,Komalpreet Kaur “Image Encryption using Chaotic Maps and DNA Addition” Operation and Noise Effects on it, International Journal of Computer Applications (0975 – 8887)Volume 23– No.6, June 2011
[21] M Gabig, G Wegrzyn, “An introduction to DNA chips: principles, technology, applications and analysis.”, Department of Biotechnology, Royal Institute of Technology, Stockholm, Sweden. Acta biochimica Polonica (impact factor: 1.49). 02/2001; 48(3):615-22. Source: PubMed
[22] V.I.Ricsa, “DNA based steganography”, cryptologia, tylor & francics, vol 25 no. 1 pp 37-49,2001.
[23] Atul Kahate Cryptography and Network Security – Third Edition (McGraw-Hill)
[24] William Stallings, “Cryptography and Network Security”, Third Edition, Prentice Hall International -2003.
[25] Elliott. C. “Quantum Cryptography” in Security and privacy, IEEE volume 2 issue 4
[26] Y. Zhang, D. Zhou, L. HE, Y.H. Karanafil, B. FU, “A new DNA Cryptogram Scheme based on PCR technology” in JATIT volume 45, 15-Nov-2012
[27] Aradhna Soni, Anuja Kumar Acharaya,”A Novel Image Encryption Approach using an Index based Chaos and Encoding and its Performance analysis”, in IJCA volume 47, June-2012.
[28] Justin Zhan, Luis Cabrera, Gasim Osman, Ronak Shah, “Using Private Matching for Securely Querying Genomic Sequences” in IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2011
[29] Jena D, “A novel visual Cryptographic Scheme”, in IEEE conference, ICACC, 2009, Singapore
[30] Danilo Gligoroski and Simona Samardjiska,” The Multivariate Probabilistic Encryption Scheme MQQ-ENC”, http://eprint.iacr.org/2012/328.pdf
[31] Christof Paar, “Crypto Engineering: Some History and Some Case Studies”, nvited Talk. CHES 2009. EPFL Lausanne, September 6-9, 2009
[32] J. D. Watson, F. H. C. Crick, “A structure for de oxy ribose nucleic acid”, Nature, vol. 25, pp. 737-738, 1953


Regular Issue Subscription Review Article
Volume 03
Issue 02
Received 20/11/2024
Accepted 21/04/2025
Published 28/04/2025
Publication Time 159 Days


My IP

PlumX Metrics