Cryptography is the branch of science which deals with the encoding of information for the purpose of hiding messages. It plays a vital role in the infrastructure of communication security. The Pioneering work had been done by Ashish Gehani et al and Amin et al after Leonard Max Adleman had shown the capability of molecular computation in 1994. This paved the way for DNA Computing. DNA Cryptology combines cryptology and modern biotechnology.
Why DNA Cryptography?
- DNA Cryptography is one of the rapidly evolving technologies in the world.
- Adelman showed the world how it can be used to solve complex problems like directed Hamilton path problem and NP-complete problem (for example Travelling Salesman problem). Hence user can design and implement more complex Crypto algorithms.
- It brings forward new hope to break unbreakable algorithms. This is because DNA computing offers more speed, minimal storage and power requirements.
- DNA stores memory at a density of about 1 bit/nm3 where conventional storage media requires 1012 nm3/bit.
- No power is required for DNA computing while the computation is taking place.
- Surprisingly, one gram of DNA contains 1021 DNA bases which is equivalent to 108 TB of data. Hence can store all the data in the world in a few milligrams.
DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. Just like the RSA and DES algorithms, in DNA Cryptology user have DNA algorithms like “Public-key system using DNA as a one-way function for key distribution,” “DNASC cryptography system”, DNA Steganography Systems, Triple stage DNA Cryptography, Encryption algorithm inspired by DNA and Chaotic computing.
So, how do encode data in a DNA strand which is mainly made, up of 4 nitrogenous bases namely:
- Adenine (A)
- Thymine (T)
- Cytosine (C)
- Guanine (G)
The easiest way to encode is to represent these four units as four figures:
A(0) –00 T(1) –01 C(2)–10 G(3)–11
- By these encoding rules, there are 4!=24 possible encoding methods. Based on some principles as A and G make pairs while T and C make pairs.
- Of those 24 methods, only 8 match the DNA pairing rule but the best encoding scheme is 0123/CTAG.
So now converted our initial number into a sequence of A, T, G and C theoretically. This is then physically implemented using various DNA synthesizing techniques like Chemical Oligonucleotide Synthesis and Oligo Synthesis Platforms (this includes Column-Based Oligo Synthesis, Array-based Oligo Synthesis, Complex Strand and Gene Synthesis and Error Correction).
Let’s take an example of the classic XOR One Time Pad and see how its implemented using DNA Cryptography:
Example – Let M be the message and K be the key. The Ciphertext is obtained by finding M xor K = C. User can again obtain the Encoded message by doing: C xor K = M xor K xor K= M. Hence, get our original message. The steps involved in implementing it is:
- The message and the OTP key are converted to ASCII bits
- Zero Padding is added to the message and the key in order to make the size of their binary codes even
- The message and the key are XORed together
- The XOR output is represented in DNA bases format.This is our enciphered text.
The decryption process involves the following processes and hence it is also prone to eavesdropping:
- All the DNA bases are transformed into bits.
- These bits are then XORed with the OTP key bits to reproduce the original plain text.
- This text so obtained in binary format is then converted into a sequence of ASCII characters.
Similarly, user can implement other crypto algorithms like AES and even DES. Instead of storing data as a sequence of 0s and 1s, storing them as a sequence of nitrogenous bases. Storing information in the form a DNA enables us to store a lot of data in a small area.
GeeksforGeeks has prepared a complete interview preparation course with premium videos, theory, practice problems, TA support and many more features. Please refer Placement 100 for details
- Custom Building Cryptography Algorithms (Hybrid Cryptography)
- Classical Cryptography and Quantum Cryptography
- Development of Cryptography
- Quantum Cryptography
- Cryptography and its Types
- The CIA triad in Cryptography
- Cryptography Introduction
- RSA Algorithm in Cryptography
- Difference between Cryptography and Cryptology
- Vernam Cipher in Cryptography
- Avalanche Effect in Cryptography
- Bifid Cipher in Cryptography
- Image Steganography in Cryptography
- Caesar Cipher in Cryptography
- Birthday attack in Cryptography