A DNA-INSPIRED ENCRYPTION METHODOLOGY FOR SECURE, MOBILE AD-HOC NETWORKS (MANET)

Harry C. Shaw, Sayed Hussein

Abstract

Molecular biology models such as DNA evolution can provide a basis for proprietary architectures that achieve high degrees of diffusion and confusion and resistance to cryptanalysis. Proprietary encryption products can serve both large and small applications and can exist at both application and network level. This paper briefly outlines the basis of the proprietary encryption mechanism which uses the principles of DNA replication and steganography (hidden word cryptography) to produce confidential data.The foundation of the approach includes: organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution process. Such an encryption model provides “Security by Obscurity”.

References

  1. A Gehani, TH LaBean, JH Reif, 1999, DNA-Based Cryptography, 5th DIMACS Workshop on DNA Based Computers
  2. Bourbakis, N.G., 1997, Image Data CompressionEncryption Using G-Scan Patterns, Computational Cybernetics and Simulation., 1997 IEEE International Conference on
  3. A Leier, C Richter, W Banzhaf, H Rauhe, 2000, Cryptography with DNA binary strands, BioSystems 57, Elsevier
  4. Catherine Taylor Clelland, Viviana Risca, Carter Bancroft, 1999, Hiding Messages in DNA microdots, Nature, Macmillan
  5. Dominik Heider and Angelika Barnekow, 2007, DNAbased watermarks using the DNA-Crypt algorithm, BMC Bioinformatics 2007, BioMed Central
  6. Shannon, Claude, 1949, Communication Theory of Secrecy Systems, Bell System Technical Journal
  7. Santiago F Elena, Purificación Carrasco, José-Antonio Daròs, Rafael Sanjuán. 2006, Mechanisms of genetic robustness in RNA viruses. EMBO Report
  8. Nachman MW, Crowell SL., 2000, Estimate of the mutation rate per nucleotide in humans. Genetics, Genetics Society of America
Download


Paper Citation


in Harvard Style

C. Shaw H. and Hussein S. (2008). A DNA-INSPIRED ENCRYPTION METHODOLOGY FOR SECURE, MOBILE AD-HOC NETWORKS (MANET) . In Proceedings of the First International Conference on Bio-inspired Systems and Signal Processing - Volume 2: BIOSIGNALS, (BIOSTEC 2008) ISBN 978-989-8111-18-0, pages 472-477. DOI: 10.5220/0001068204720477


in Bibtex Style

@conference{biosignals08,
author={Harry C. Shaw and Sayed Hussein},
title={A DNA-INSPIRED ENCRYPTION METHODOLOGY FOR SECURE, MOBILE AD-HOC NETWORKS (MANET)},
booktitle={Proceedings of the First International Conference on Bio-inspired Systems and Signal Processing - Volume 2: BIOSIGNALS, (BIOSTEC 2008)},
year={2008},
pages={472-477},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001068204720477},
isbn={978-989-8111-18-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the First International Conference on Bio-inspired Systems and Signal Processing - Volume 2: BIOSIGNALS, (BIOSTEC 2008)
TI - A DNA-INSPIRED ENCRYPTION METHODOLOGY FOR SECURE, MOBILE AD-HOC NETWORKS (MANET)
SN - 978-989-8111-18-0
AU - C. Shaw H.
AU - Hussein S.
PY - 2008
SP - 472
EP - 477
DO - 10.5220/0001068204720477