98%
921
2 minutes
20
DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of the keys are rendered weak as they are prone to intrusions. This paper proposes a Genetic Algorithm inspired method to strengthen weak keys obtained from Random DNA-based Key Generators instead of completely discarding them. Fitness functions and the application of genetic operators have been chosen and modified to suit DNA cryptography fundamentals in contrast to fitness functions for traditional cryptographic schemes. The crossover and mutation rates are reducing with each new population as more keys are passing fitness tests and need not be strengthened. Moreover, with the increasing size of the initial key population, the key space is getting highly exhaustive and less prone to Brute Force attacks. The paper demonstrates that out of an initial 25 × 25 population of DNA Keys, 14 keys are rendered weak. Complete results and calculations of how each weak key can be strengthened by generating 4 new populations are illustrated. The analysis of the proposed scheme for different initial populations shows that a maximum of 8 new populations has to be generated to strengthen all 500 weak keys of a 500 × 500 initial population.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9573340 | PMC |
http://dx.doi.org/10.3390/s22197332 | DOI Listing |
Sci Rep
June 2025
Department of Computer Science, Kebri Dehar University, 250, Kebri Dehar, Ethiopia.
Health services and telemedicine have proven to be an important area for information protection in research, especially with medical services and smart health care applications. In these systems, medical imaging protection are important not only for clinical diagnosis, but also to protect the very sensitive and confidential patient data. With progress in imaging technologies and biomedical processing algorithms, the amount of image data increases rapidly.
View Article and Find Full Text PDFSensors (Basel)
April 2025
Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Cairo 11651, Egypt.
As IoT devices proliferate in critical areas like healthcare or nuclear safety, it necessitates the provision of cryptographic solutions with security and computational efficiency. Very well-established encryption mechanisms such as AES, RC4, and XOR cannot strike a balance between speed, energy consumption, and robustness. Moreover, most DNA-based solutions are not cognizant of the hardware limitations of IoT platforms such as Arduino R3.
View Article and Find Full Text PDFACS Nano
November 2024
Institute of Chemical and Bioengineering, ETH Zurich, Vladimir-Prelog-Weg 1, Zurich 8093, Switzerland.
Counterfeit products are a problem known across many industries. Chemical products such as pharmaceuticals belong to the most targeted markets, with harmful consequences for consumer health and safety. However, many of the currently used anticounterfeit measures are associated with the packaging, with the readout method and level of security varying between different solutions.
View Article and Find Full Text PDFSensors (Basel)
September 2022
Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada.
DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by combining rigorous biological and mathematical concepts to encode original information in terms of a DNA sequence. Such schemes are crucially dependent on corresponding DNA-based cryptographic keys. However, owing to the redundancy or observable patterns, some of the keys are rendered weak as they are prone to intrusions.
View Article and Find Full Text PDFAnnu Int Conf IEEE Eng Med Biol Soc
July 2022
With the continued integration of technology in medicine, large amounts of patient data are often vulnerable to cyber-attacks. Medical data must be secured, however traditional cryptographic algorithms are inapplicable to medical images due to factors such as bulk data capacity, strong correlation among adjacent pixels, and high redundancy. To address the need for new medical image encryption algorithms, a novel approach based on the central dogma of molecular biology is proposed.
View Article and Find Full Text PDF