Fitzpatrick Institute for Photonics Fitzpatrick Institute for Photonics
Pratt School of Engineering
Duke University

 HOME > pratt > FIP    Search Help Login 

Publications [#237005] of John H. Reif

search www.cs.duke.edu.

Journal articles or Book chapters PUBLISHED

  1. Gehani, A; Labean, T; Reif, J, DNA-based cryptography, in Aspects of Molecular Computing - Essays dedicated to Tom Head on the occasion of his 70th birthday, LNCS 2950 Festschrift, Springer, edited by N. Jonoska, Gh. Paun and G. Rozenberg, Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, vol. 2950 (Winter, 2004), pp. 167-188, Springer Verlag, ISSN 0302-9743 [pdf]
    (last updated on 2026/01/15)

    Abstract:
    Recent research has considered DNA as a medium for ultra-scale computation and for ultra-compact information storage. One potential key application is DNA-based, molecular cryptography systems. We present some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable. Practical applications of cryptographic systems based on one-time-pads are limited in conventional electronic media by the size of the one-time-pad; however DNA provides a much more compact storage medium, and an extremely small amount of DNA suffices even for huge one-time-pads. We detail procedures for two DNA one-time-pad encryption schemes: (i) a substitution method using libraries of distinct pads, each of which defines a specific, randomly generated, pair-wise mapping; and (ii) an XOR scheme utilizing molecular computation and indexed, random key strings. These methods can be applied either for the encryption of natural DNA or for artificial DNA encoding binary data. In the latter case, we also present a novel use of chip-based DNA micro-array technology for 2D data input and output. Finally, we examine a class of DNA steganography systems, which secretly tag the input DNA and then hide it within collections of other DNA. We consider potential limitations of these steganographic techniques, proving that in theory the message hidden with such a method can be recovered by an adversary. We also discuss various modified DNA steganography methods which appear to have improved security. © Springer-Verlag 2004.


Duke University * Pratt * Reload * Login
x