Virtual genome-based cryptosystem (VGC)

A virtual gene and cryptographic system technology, applied in the field of information security, can solve problems such as fragile coding methods, transmission, and easy pollution of DNA operations

Inactive Publication Date: 2011-04-20
SOUTH CHINA BOTANICAL GARDEN CHINESE ACADEMY OF SCI
View PDF2 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Gehani et al. designed a DNA-based one-time pad cryptosystem scheme. Although the scheme is theoretically undecipherable, it also has obvious defects: the construction of such a one-time pad garbled DNA is not only costly, but also time-consuming and laborious for encryption and decryption. , and DNA manipulation is prone to contamination, making this solution practically unusable
[0004] In fact, the current DNA-based cryptographic systems directly "write" information into DNA molecules, making this encoding method very fragile, and biological operations must go through DNA synthesis, extraction, cloning, PCR amplification, DNA Complex processes such as sequencing and molecular hybridization require expensive experimental instruments, and are time-con

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual genome-based cryptosystem (VGC)
  • Virtual genome-based cryptosystem (VGC)
  • Virtual genome-based cryptosystem (VGC)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1 establishes the VGC cryptographic system, and sends and receives a letter " T " ( figure 1 )

[0028] (1) First, randomly generate a large number (tens of thousands, even millions of tens of millions) of several kb or even longer DNA sequences, and randomly number or name them (each random DNA sequence is numbered or named as a virtual gene) , each virtual gene adopts the FASTA format, and all these virtual genes form a "virtual genome" to generate a "virtual genome database" (Virtual Genome Database, VGDB).

[0029](2) Then, all the virtual genes in the "virtual genome database" are randomly assigned on a 2-dimensional array table to obtain a table of virtual gene distribution positions, which is the "virtual DNA Microarray Chip" (Virtual DNA Microarray Chip, VDMC ).

[0030] (3) Write the letter "T" on the "virtual gene chip" (VDMC), that is, select the "points" used to form the letter "T" on the VDMC.

[0031] (4) Find out that these points should cor...

Embodiment 2

[0035] Embodiment 2 digital signature

[0036] The VGC system has a special signature method for digital signatures. Since the VGC system uses image recognition information input and output, that is, "write" and restore information on the VDMC, the information transmitted by the VGC itself is very personalized. VGC digital signature can truly be a handwritten authentic signature. It is also possible to make some special marks on special positions of the VDMC, so that the ciphertext cannot be forged at all.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to information security technology, in particular to a virtual genome-based cryptosystem (VGC). The cryptosystem is provided with two matched keys, of which one is a virtual genome database (VGDB) consisting of random deoxyribonucleic acid (DNA) sequences and the other one is a position table that virtual genes of the VGDB are randomly distributed in a two-dimensional microarray, namely a virtual DNA microarray chip (VDMC). Any plaintext information can be freely written on the VDMC, namely points for forming the plaintext information are selected from the VDMC microarray. The selected points correspond to the virtual genes in the VGDB; small segments of DNA sequences are randomly selected from the virtual genes; and the uniqueness of the small segments of DNA sequences in the VGDB is determined by using a common tool of the bioinformatics, namely a basic local alignment search tool (BLAST), or other character string search algorithms such as a Knuth-Morris-Pratt (KMP) algorithm and the like. A cipher text is combined by the small segments of DNA sequences. The small segments of DNA sequences need only to perform BLAST on the VGDB during decryption, namely the points for forming the plaintext information can be discovered, and the plaintext information can be restored according to the VDMC. Any non-VGDB sequence can be randomly inserted into the cipher text and does not have any influence on the encryption. Thus, the VGC is an excellent information hiding system. In addition, the VGC key can be updated automatically so as to realize an indecipherable one-time-pad system. The cryptosystem is used for real-time quick secret information communication, digital signature and identity authentication.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a cryptographic system based on a virtual genome. Background technique [0002] Cryptography is the core of information security. Traditional cryptographic systems basically rely on mathematics, that is to say, they only have the security of mathematical calculations. At present, only the so-called one-time pad encryption system has theoretically unbreakable security. However, the one-time pad cryptosystem is practically difficult to apply because of key management and distribution problems. Now cryptographers are exploring new cryptographic systems, such as quantum cryptography and DNA cryptography. [0003] Due to DNA's ultra-large-scale parallelism, ultra-low energy consumption, and ultra-high-density storage capacity, DNA has been used in computing, data storage, and cryptography. DNA code is far from mature in theory and practice, and there are not many effective DNA ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00G06N3/12
Inventor 曾纪晴张明永
Owner SOUTH CHINA BOTANICAL GARDEN CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products