Logo PTI
Polish Information Processing Society
Logo FedCSIS

Annals of Computer Science and Information Systems, Volume 18

Proceedings of the 2019 Federated Conference on Computer Science and Information Systems

Cryptographic keys management system based on DNA strands

,

DOI: http://dx.doi.org/10.15439/2019F313

Citation: Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 18, pages 231235 ()

Full text

Abstract. Security of cryptographic keys is one of the most important issue in a key management process. The question arises whether modern technology really allows for high level of physical protection and security of sensitive data and cryptographic keys. The article considers various contemporary types of threats asso- ciated with the storage of secret keys. We present an innovative way to store sensitive data, using DNA strands as a medium, which significantly reduces hazard connected with electronic devices based data storage and makes the key management process independent of third parties.

References

  1. L. M. Adleman, “Molecular computation of solutions to combinatorial problems.” Science, vol. 266, no. 5187, pp. 1021–1024, Nov 1994. http://dx.doi.org/10.1126/science.7973651. [Online]. Available: https://doi.org/10.1126/science.7973651
  2. A. Gehani, T. LaBean, and J. Reif, DNA-based Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 167–188. ISBN 978-3-540-24635-0. [Online]. Available: https://doi.org/10.1007/978-3-540-24635-0_12
  3. Y. Zhang, X. Liu, and M. Sun, “Dna based random key generation and management for otp encryption.” Biosystems, vol. 159, pp. 51–63, Sep 2017. http://dx.doi.org/10.1016/j.biosystems.2017.07.002. [Online]. Available: https://doi.org/10.1016/j.biosystems.2017.07.002
  4. R. Cano and M. Borucki, “Revival and identification of bacterial spores in 25- to 40-million-year-old dominican amber,” Science, vol. 268, no. 5213, pp. 1060–1064, 1995. http://dx.doi.org/10.1126/science.7538699 Cited By 348. [Online]. Available: https://doi.org/10.1126/science.7538699
  5. R. Vreeland, W. Rosenzweig, and D. Powers, “Isolation of a 250 million-year-old halotolerant bacterium from a primary salt crystal,” Nature, vol. 407, no. 6806, pp. 897–900, 2000. http://dx.doi.org/10.1038/35038060 Cited By 414. [Online]. Available: https://doi.org/10.1038%2f35038060
  6. R. N. Grass, R. Heckel, M. Puddu, D. Paunescu, and W. J. Stark, “Robust chemical preservation of digital information on dna in silica with error-correcting codes,” Angewandte Chemie International Edition, vol. 54, no. 8, pp. 2552–2555, 2015. http://dx.doi.org/10.1002/anie.201411378. [Online]. Available: https://doi.org/10.1002/anie.201411378
  7. J. P. Cox, “Long-term data storage in dna,” Trends in Biotechnology, vol. 19, no. 7, pp. 247 – 250, 2001. http://dx.doi.org/10.1016/S0167-7799(01)01671-7. [Online]. Available: https://doi.org/10.1016/S0167-7799(01)01671-7
  8. S. B. Shah and J. G. Elerath, “Reliability analysis of disk drive failure mechanisms,” Annual Reliability and Maintainability Symposium, 2005. Proceedings., pp. 226–231, 2005. http://dx.doi.org/10.1109/RAMS.2005.1408366. [Online]. Available: http://doi.org/10.1109/RAMS.2005.1408366
  9. K. Halvorsen and W. P. Wong, “Binary dna nanostructures for data encryption,” PLOS ONE, vol. 7, no. 9, pp. 1–4, 09 2012. http://dx.doi.org/10.1371/journal.pone.0044212. [Online]. Available: https://doi.org/10.1371/journal.pone.0044212
  10. K. Tanaka, A. Okamoto, and I. Saito, “Public-key system using dna as a one-way function for key distribution,” Biosystems, vol. 81, no. 1, pp. 25 – 29, 2005. http://dx.doi.org/10.1016/j.biosystems.2005.01.004. [Online]. Available: https://doi.org/10.1016/j.biosystems.2005.01.004
  11. A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, “Cryptography with dna binary strands.” Biosystems, vol. 57, no. 1, pp. 13–22, Jun 2000. http://dx.doi.org/10.1016/S0303-2647(00)00083-6. [Online]. Available: https://doi.org/10.1016/S0303-2647(00)00083-6
  12. H. Shiu, K. Ng, J. Fang, R. Lee, and C. Huang, “Data hiding methods based upon dna sequences,” Information Sciences, vol. 180, no. 11, pp. 2196 – 2208, 2010. http://dx.doi.org/10.1016/j.ins.2010.01.030. [Online]. Available: https://doi.org/10.1016/j.ins.2010.01.030
  13. J.-M. Oh, D.-H. Park, and J.-H. Choy, “Integrated bio-inorganic hybrid systems for nano-forensics,” Chem. Soc. Rev., vol. 40, pp. 583–595, 2011. http://dx.doi.org/10.1039/C0CS00051E. [Online]. Available: http://dx.doi.org/10.1039/C0CS00051E
  14. S. Cormier, J. Shearman, and M. Hogan, “Dna in your jeans? effect of abrasion and bleaching on dna tagged denim,” AATCC Review, vol. 18, pp. 44–48, 09 2018. http://dx.doi.org/10.14504/ar.18.5.4. [Online]. Available: https://doi.org/10.14504/ar.18.5.4
  15. K. Yang, M. Hicks, Q. Dong, T. Austin, and D. Sylvester, “A2: Analog malicious hardware,” in 2016 IEEE Symposium on Security and Privacy (SP), May 2016. http://dx.doi.org/10.1109/SP.2016.10. ISSN 2375-1207 pp. 18–37. [Online]. Available: https://doi.org/10.1109/SP.2016.10
  16. G. T. Becker, F. Regazzoni, C. Paar, and W. P. Burleson, “Stealthy dopant-level hardware trojans: extended version,” Journal of Cryptographic Engineering, vol. 4, no. 1, pp. 19–31, Apr 2014. http://dx.doi.org/10.1007/s13389-013-0068-0. [Online]. Available: https://doi.org/10.1007/s13389-013-0068-0
  17. R. Kumar, P. Jovanovic, W. Burleson, and I. Polian, “Parametric trojans for fault-injection attacks on cryptographic hardware,” in 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, Sep. 2014. http://dx.doi.org/10.1109/FDTC.2014.12 pp. 18–28. [Online]. Available: https://doi.org/10.1109/FDTC.2014.12
  18. J. Appelbaum, J. Horchert, O. Reissmann, M. Rosenbach, J. Schindler, and C. Stöcker. (2013, 12) Unit offers spy gadgets for every need. [Online]. Available: http://www.spiegel.de
  19. J. Robertson and M. Riley. (2018, 11) The big hack: How china used a tiny chip to infiltrate u.s. companies. [Online]. Available: https://www.bloomberg.com
  20. E. Savage, J. Gilbert, and W. Radasky, “The early-time (e1) high-altitude electromagnetic pulse (hemp) and its impact on the u.s. power grid,” Metatech Corporation, 358 S. Fairview Ave., Suite E Goleta, CA 93117, Tech. Rep., January 2010.