Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

DNA self-assembling structure and symmetrical encryption system based on DNA self-assembling structure

A symmetric encryption and self-assembly technology, applied in the field of cryptography research and DNA encryption, it can solve the problems of lack of parallelism, failure of encryption method, interception of ciphertext, etc.

Active Publication Date: 2014-08-20
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Modern cryptography and quantum cryptography lack huge parallel capabilities, large-scale information search, and the encryption of a large amount of information is slow, and the ciphertext of these ciphers is easily intercepted by attackers and may be cracked
In addition to this traditional encryption methods rely on difficult mathematical problems which, once solved, render encryption methods useless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DNA self-assembling structure and symmetrical encryption system based on DNA self-assembling structure
  • DNA self-assembling structure and symmetrical encryption system based on DNA self-assembling structure
  • DNA self-assembling structure and symmetrical encryption system based on DNA self-assembling structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Example 1: The basic process of forming a DNA self-assembly structure is as follows figure 1 shown.

[0031] Based on the DNA self-assembly structure, a symmetric encryption system is constructed. The encryption key used by the sender is named Ka. The sender uses Ka to convert plaintext P into ciphertext C, and sends this ciphertext to a receiver, who has the decryption key Kb. After receiving the ciphertext C, the receiver uses Kb to obtain the plaintext P through the decryption process. This encryption algorithm uses a one-time pad XOR operation. The XOR operation is a logic gate that performs an XOR operation, that is, the output is true (1) when only one input is true (1), and if all inputs are true (1) or the input is false (0) The output is false (0).

[0032] In the present invention, "code" is selected as plaintext for encryption and decryption. According to the ASCII password, this plaintext can be converted into a binary string "01100011 01101111 0110010...

Embodiment 2

[0039]Example 2: The DNA self-assembly structure is formed by hybridization of several different oligonucleotide single strands, the specific method is as follows: First, through the complementary recognition region, the single strand AB and BHQ hybridize to form a new DNA strand, here During the process, equimolar concentrations of single-chain AB and BHQ were added to the system (final concentration 3.75 pmol / L, TAE / Mg2+ buffer), and the mixture was left at 37°C for 2 hours. Next, add Q chains to the mixture at an equimolar concentration, and place at 37°C for 2 hours. In the experiment, in order to carry out the strand displacement reaction of XOR operation, the input strand (final concentration 3.75pmol / L) was added to the mixture containing DNA self-assembly, and reacted at room temperature for more than 2 hours, then PAGE electrophoresis and fluorescence could be performed. Result detection. For each sample, use a fluorescence detector to record the fluorescence value o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a DNA self-assembling structure and a symmetrical encryption system based on the DNA self-assembling structure. The DNA self-assembling structure comprises a bubble structure and is formed by a DNA nano structure and a chain Q through base pairing. The DNA nano structure is formed by a DNA chain AB and a BHQ chain in a hybridization mode. The huge parallelism capacity and the large-scale information searching and single-molecular recognizing capacities of DNA are utilized, inherent advantages of finishing information converting, transmitting and detecting through different detecting methods utilized in the complex biology body are possessed, and then the encryption and decryption in the stream encryption method are achieved based on difficulty of the nano technology in the large scale information searching and the DNA self-assembling structure. According to the symmetrical encryption system, the AB chain specific recognition area and the chain converting technology are adopted, xor operation is achieved, one-time pad information encryption and decryption are achieved, and therefore passwords can be hard to crack, and information storing and conveying safety is improved. The DNA self-assembling structure and the symmetrical encryption system based on the DNA self-assembling structure can be widely applied various password fields.

Description

technical field [0001] The invention relates to the field of cryptography research, in particular to the field of DNA cryptography. Background technique [0002] Modern cryptography is based on various difficult mathematical problems such as non-polynomial time complete problems (NP-C). Quantum cryptography is a difficult physics problem based on the Heisenberg uncertainty principle. Modern cryptography and quantum cryptography lack huge parallel capabilities and large-scale information search, and the encryption of a large amount of information is slow, and the ciphertext of these ciphers is easily intercepted by attackers and may be cracked. Beyond that, traditional encryption methods rely on difficult mathematical problems that, once solved, render encryption methods useless. [0003] In recent years, DNA molecules have been widely used in computing, data storage, cryptography, etc. due to the advantages of huge parallelism and high-density information storage. DNA cry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 杨静张成宋智超
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products