Private and Public Key DNA Steganography C. Richter, A. Leier, W. Banzhaf, and H. Rauhe Cho, Dong-Yeon.

Slides:



Advertisements
Similar presentations
Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
Advertisements

Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
DNA Computing BY DIVYA TADESERA. Contents  Introduction  History and its origin  Relevancy of DNA computing in 1. Hamilton path problem(NP problem)
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Encryption, continued Public Key encryption and Digital Signatures.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Cryptography and Coding Theory
Binary Arithmetic for DNA Computers R. Barua and J. Misra Preliminary Proceedings of the Eighth International Meeting on DNA Based Computers, pp ,
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
How Secure Works Stephen Smith | November 27, 2013.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Biogenetic Engineering
Unit 3 Section 6.4: Internet Security
Key words: Cryptography | Binary | Cipher
J. Miranda University of Ottawa 21 November 2003
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Security Design.
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
B. R. Chandavarkar CSE Dept., NITK Surathkal
Security.
PCR Polymerase Chain Reaction
Group theory exercise.
Encryption
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
PCR uses polymerases to copy DNA segments.
DIGITAL SIGNATURE CERTIFICATE SERVICE PROVIDER IN NOIDA DIGITAL CERTIFICATE.
Public Key Cryptography
Biogenetic Engineering
Quantum Cryptography Alok.T.J EC 11.
The RSA public-key cryptosystem cse712 e-commerce
PART VII Security.
Security.
Practical Aspects of Modern Cryptography
Chapter 1 Number System RGGP, Narwana.
PCR uses polymerases to copy DNA segments.
Chapter 4 Cryptography / Encryption
PCR uses polymerases to copy DNA segments.
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Cryptography Reference: Network Security
Introduction to Elliptic Curve Cryptography
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Chapter 3 - Public-Key Cryptography & Authentication
PCR uses polymerases to copy DNA segments.
Public – Private Key Cryptography
Electronic Payment Security Technologies
Purpose: how do computers keep our information secret?
PCR uses polymerases to copy DNA segments.
PCR uses polymerases to copy DNA segments.
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Introduction to Cryptography
Encryption & Steganography: Amazing Things To Do with Bits
Key Exchange, Man-in-the-Middle Attack
PCR uses polymerases to copy DNA segments.
Presentation transcript:

Private and Public Key DNA Steganography C. Richter, A. Leier, W. Banzhaf, and H. Rauhe Cho, Dong-Yeon

Private Key Encryption Steganography with Digital DNA  Assembly of DNA binary strands  Secret messages  For encryption, the message strand that corresponds to the binary encoded plaintext was mixed with other DNA, so- called dummy strands, in equimolar amounts.  For decryption, unique PCR priming sites were attached to the message strand such that the PCR primers worked as secret key by amplifying the message strand selectively.

 Security  A and B exchange the generated key over a secure communication channel. It is expected that only A and B have the knowledge about the key.  A generates the message following the binary pattern and adds the key in ligation step.  A generates a certain number of dummies and puts the massage strand among them.  A sends the resulting solution to B, using an open communication channel.  B decrypts the message.

Graphical Decryption  The key sequence could not be used as a distinctive feature for the readout process anymore.  Instead the pool of dummy strands used for encryption was used as decryption key.

 Readout of both the dummy pool (Y) and the encrypted pool (X) resulted in two different gel-images.  Using techniques of digital image processing, these gel-images were then subtracted graphically and yielded the original message strand’s binary sequence (A).