### Review of DNA Cryptology

#### Abstract

DNA Cryptography is an emerging field of cryptography. It derives its base from DNA Computing. In this DNA has used as computational element along with molecular techniques to make use of it. This paper provides an overall work done in DNA cryptography and proposes the classification of DNA cryptography and explains each of its approach briefly. By reviewing all the possible and leading technology of current research, this paper shows the direction that has to be addressed further in the field of DNA Cryptography.

#### Keywords

#### Full Text:

PDF#### References

L. Adleman, “Molecular computation of solutions to combinatorial problems,” Science, JSTOR, vol. 266, 1994, pp. 1021–1025.

G. Cui, Y. Liu, and X. Zhang, “New direction of data storage: DNA molecular storage technology,” Computer Engineering and Application vol. 42, no. 26, 2006, pp. 29–32.

J. Chen, “A DNA-based, bio molecular cryptography design,” in IEEE International Symposium on Circuits and Systems (ISCAS), 2003, pp. 822–825.

R. Barish, P. Rothemund, and E. Winfree, “Two computational primitives for algorithmic self-assembly: copying and counting,” Nano Letters, vol. 5, no. 12, pp. 2586–2592, 2005.

P. Rothemund, N. Papadakis, and E. Winfree, “Algorithmic self-assembly of DNA sierpinski triangles,” PLoS Biology, vol. 2, no. 12, pp. 2041– 2053, 2004.

G. Cui, L. Qin, Y. Wang, and X. Zhang, “An encryption scheme using DNA technology,” in IEEE 3rd International conference on Bio- Inspired Computing: Theories and Applications (BICTA08), Adelaid, SA, Australia, 2008, pp. 37–42.

D. Boneh, C. Dunworth, and R. Lipton, “Breaking DES using a molecular computer,” in Proceedings of DIMACS workshop on DNA computing, 1995, pp. 37–65.

Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo: Fast Parallel Molecular Algorithms for DNA-based Computation: Factoring Integers. BIBE 2004: 125-133.

D. Beaver, “Factoring: The DNA solution,” in 4th International Conferences on the Theory and Applications of Cryptology. Wollongong, Australia: Springer-Verlag, Nov. 1994, pp. 419- 423.

Y. Brun, “Arithmetic computation in the tile assembly model: Addition and multiplication,” Theoretical Computer Science, Science Direct, Elsevier, vol. 378, no. 1,2007, pp. 17–31.

O. Pelletier and A. Weimerskirch, “Algorithmic self-assembly of DNA tiles and its application to cryptanalysis,” in Proceedings of the Genetic and Evolutionary Computation Conference 2002 (GECCO02), New York, USA, 2002, pp. 139–146.

X. C. Zhang, “Breaking the NTRU public key cryptosystem using self-assembly of DNA tiling’s,” Chinese Journal of Computers, vol. 12,2008 pp. 2129–2137.

T. Kazuo, O. Akimitsu, and S. Isao, “Public-key system using DNA as a one-way function for key distribution,” BioSystems, Elsevier Science, vol. 81, no. 1, 2005, pp. 25–29.

N. Galbreath, Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. New York, USA: John Wiley and Sons, Inc., 2002.

A. Menezes, P. Oorschot, and S. Vanstone, Handbook of applied cryptography. CRC Press, 1996.

A. Gehani, T. LaBean, and J. Reif, DNA based cryptography. Germany: Aspects of Molecular Computing, Springer-Verlag., 2004.

L. MingXin, L. XueJia, X. GuoZhen, and Q. Lei, “Symmetric-key cryptosystem with DNA technology,” Science in China Series F: Information Sciences, Springer Verlag, Germany, vol. 50, no. 3,2007, pp. 324–333.

X. Guozhen, L. Mingxin, Q. Lei, and L. Xuejia, “New field of cryptography: DNA cryptography,” Chinese Science Bulletin, Springer Verlag, Germany, vol. 51, no. 12,2006, pp. 1413–1420.

Lai XueJia, Lu MingXin, Qin Lei, Han JunSong, and Fang XiWen, “Asymmetric encryption and signature method with DNA technology,” Research Paper, Science China, Information Sciences, Vol. 53, No. 3,2010, pp. 506-514.

Kazuo T, Akimitsu O, Isao S, “Public-key system using DNA as a one-way function for key distribution,” Biosystems-81, 2005, pp. 25-29.

Miki Hirabayashi, Hiroaki Kojima, Kazuhiro Oiwa, and Akio Nishikawa, “Implementation of Tile Sequencing for DNA Logical Computation toward Next Generation Information Security”, 2010, pp.1296-1307.

Lu MingXin, Lai XueJia, Xiao GuoZhen, and Qin Lei, “Symmetric-key cryptosystem with DNA technology,” Science in China Series F: Information Sciences, vol. 3, 2007, pp. 324-333.

G. Cui, L. Cuiling, L. Haobin, and L. Xiaoguang, “DNA computing and its application to information security field,” in IEEE Fifth International Conference on Natural Computation, Tianjian, China, Aug. 2009.

Zhihua Chen, Xiutang Geng, Jin Xu, “Efficient DNA Sticker Algorithms for DES,” IEEE BIC-TA, pp.15-22, 2008.

Xiutang Geng, Linqiang Pan, and Jin Xu, “A DNA sticker algorithm for bit substitution in a block cipher,” Parallel Distributed Computing-68,2008, pp. 1201-1206.

Zhou, Changjun; Wei, Xiaopeng; Zhang, Qiang; Liu, Rui,” DNA Sequence Splicing with Chaotic Maps for Image Encryption”, Journal of Computational and Theoretical Nano science, Volume 7, Number 10, October 2010 , pp. 1904-1910.

O. Pelletier, and A. Weimerskirch, “Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis”, GECC, N.Y. USA, 2002, pp. 139-146.

O. Tornea, and M.E. Borda, “DNA Cryptographic Algorithms”. International conference on advancements of medicine and health care through technology IFMBE Proceedings, 2009, Volume 26, 223-226.

Kang Ning, “A Pseudo DNA Cryptography Method”. Cornell University Library, arvix.org, 2009.

Y. Brun, Arithmetic computation in the tile assembly model: Addition and multiplication, Theoretical Computer Science, (2006), 378, pp. 17-31.

Y. Brun, Nondeterministic polynomial time factoring in the tile assembly model, Theoretical Computer Science, (2007), 395, pp. 3-23.

Y. Brun, Solving NP-complete problems in the tile assembly model, Theoretical Computer Science, (2007), 395, pp. 31-44.

X.C. Zhang, Y.F. Wang, and Z.H. Chen, Arithmetic Computation Using Self-Assembly of DNA Tiles: Subtraction and Division, Progress in Natural Science, (2009), pp. 377-388.

X.T. Geng, Research on Molecular Algorithms in Block Cipher and Graph Theory, A Dissertation for the Degree of Doctor, Huazhong University of Science & Technology, (2008).

### Refbacks

- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.