Article Preview
Top1.Introduction
Cryptology, etymologically the science of secrecy, encompasses cryptography, the art of hidden writing, and cryptanalysis whose goal is to attack cryptographic methods (Phan & Pointcheval,2005), it has become a separate science that precisely integrates mathematics, computer science and other sciences. Figure 1 represents the cryptographic process that encompasses two main phases encryption and decryption.
Figure 1. Process of cryptography (Bhatia & Sumbaly, 2014)
Recently, a new line of research in cryptography has emerged. It exploits the structure of the DNA to realize the cryptographic systems It is the cryptography with the DNA.
The DNA
DNA, or deoxyribonucleic acid, is the hereditary material in humans and almost all other organisms. The information in DNA like in Figure 2 is stored in a code made of four chemical bases: adenine (A), guanine (G), cytosine (C), and thymine (T).
DNA cryptography (DNA cryptography) is a new research focus in bio-inspired cryptography. Due to its large storage capacity and massive parallelism in computing, DNA can be very useful in cryptography.
Top2.State Of The Art
Advanced algorithms and methods of security and confidentiality are proposed in different axes, Cloud Bioinformatics (Chang, 2014), smart IoT-based healthcare (Yang et al., 2019), cloud-of-things environments (Sohal et al., 2018) and quantum attack (Yang et al., 2017), whose goal is to ensure the objectives of security: integrity, confidentiality, availability, non-repudiation, and authentication.
Cryptography by DNA is one of these advanced methods. There are different techniques of cryptography DNA that has been developed. In 1994, Adleman (Adleman, 1994) laid the foundation of DNA informatics by providing solutions to combinatorial problems using molecular computation using some Standard Enzym (Rozenberg & Salomaa, 2006). This work was extended by Lipton (1995) by solving another NP-complete problem called “satisfaction” by using DNA molecules in a test tube to encode the graph for 2-bit numbers.
Lipton (1996) exploited the work of Adelman and Lipton to break one of the symmetric key algorithms used for cryptographic purposes known as DES (Data Encryption Standard). They performed biological operations on the DNA strands, they broke DES in just 4 months.
Based on the work of Adelman, in 1997 Ouyanag et al. (1997) showed the effectiveness of DNA by generating solutions of NP-complete problems. DNA cryptographic approach based on the “one-time-pad” molecular theory and performed the encryption / decryption of the 2D image is developed by Chen (2003).
Gibert et al. (2004) laid the foundation for the DNA cryptography basics using the molecular approach and the one-time-pad concept. They proposed an encryption and decryption method that relies on a DNA chip and one -time pad. It is therefore very difficult for the adversary to obtain the encrypted message, this approach is followed by a public key based cryptographic system (one way) by Tanaka et al. (2005).
Amin et al. (2006) proposed a symmetric key based cryptographic DNA approach, where key sequences are obtained from the genetic database.
In 2008, Verma et al. (2008) proposed a new paradigm for secure routing in ad hoc mobile networks (Manet) that uses the pseudo-DNA cryptography approach to secure networks. ad hoc. By transforming the message into a DNA format then it goes through an mRNA transcription phase that will be translated into proteins (translation) which is the result of encryption. This encrypted Text is sent through a secure channel to the recipient and a symmetric key with one-time pad is used at the endpoints (encryption and decryption).