Abstract
Deoxyribonucleic acid (DNA), the oldest natural storage medium, offers a highly promising mode for information computing and storage with its high information density, low maintenance costs, and the ability to do parallel processing. DNA cryptography is an emerging discipline focused on achieving information security within this new paradigm. In this paper, we first present the foundational concepts of cryptography and biological technologies involved in DNA cryptography. We then comprehensively review 2 types of DNA cryptography: pseudo-DNA cryptography and natural DNA cryptography. After summarizing and discussing the security foundations of these cryptographic methods, we highlight the main challenges relating to measurability, standard protocols, robustness, and operability. Finally, we outline future directions for DNA cryptography, hoping to facilitate the evolution of this nascent field.
Topics

No keywords indexed for this article. Browse by subject →

References
102
[1]
DNA storage: research landscape and future prospects

Yiming Dong, Fajia Sun, Zhi Ping et al.

National Science Review 10.1093/nsr/nwaa007
[2]
Rydning DR-JG-J Reinsel J Gantz J. The digitization of the world from edge to core. Framingham Int Data Corp. 2018;16:1–28.
[3]
Williams ED, Ayres RU, Heller M. The 1.7 kilogram microchip: Energy and material use in the production of semiconductor devices. Environ Sci Technol. 2002;36(24):5504–5510. 10.1021/es025643o
[4]
Panda D, Molla KA, Baig MJ, Swain A, Behera D, Dash M. DNA as a digital information storage device: Hope or hype? 3 Biotech. 2018;8(5):1–9. 10.1007/s13205-018-1246-7
[5]
Wiener N. Interview: Machines smarter than men. US News World Rep. 1964;56:84–86.
[6]
Neiman M. On the molecular memory systems and the directed mutations. Radiotekhnika. 1965;1(1):3–12.
[7]
Feynman RP. There’s plenty of room at the bottom [data storage]. J Microelectromech Syst. 1992;1(1):60–66. 10.1109/84.128057
[8]
Molecular Computation of Solutions to Combinatorial Problems

Leonard M. Adleman

Science 10.1126/science.7973651
[10]
Molecular digital data storage using DNA

Luis Ceze, Jeff Nivala, Karin Strauss

Nature Reviews Genetics 10.1038/s41576-019-0125-3
[12]
Synthetic DNA applications in information technology

Linda C. Meiser, Bichlien H. Nguyen, Yuan-Jyue Chen et al.

Nature Communications 2022 10.1038/s41467-021-27846-9
[13]
Wang G, Lu S, Feng Y, Liu W, Ma R. Research on modeling of latent virus propagation behavior with increasing or decreasing network nodes. Acta Electron Sin. 2022;50(2):273–283.
[14]
Mahjabin T, Olteanu A, Xiao Y, Han W, Li T, Sun W. A survey on DNA-based cryptography and steganography. IEEE Access. 2023;11:116423–116451. 10.1109/access.2023.3324875
[15]
Stinson DR. Cryptography: Theory and practice. Boca Raton (FL): Chapman and Hall/CRC; 2005. 10.1201/9781420057133
[16]
Niu Y Zhao K Zhang X Cui G. Review on DNA cryptography. In: Bio-inspired Computing: Theories and Applications: 14th International Conference BIC-TA 2019 Zhengzhou China November 22–25 2019 Revised Selected Papers Part II. Singapore: Springer; 2020. p. 134–148. 10.1007/978-981-15-3415-7_11
[17]
Bhanot R, Hans R. A review and comparative analysis of various encryption algorithms. Int J Secur Appl. 2015;9(4):289–306.
[18]
Katzenbeisser S, Petitcolas F. Information hiding. Norwood (MA): Artech House; 2016.
[19]
Boneh D, Dunworth C, Lipton RJ. Breaking DES using a molecular computer. DNA Based Computers. 1995;27:37–66. 10.1090/dimacs/027/04
[20]
Faulhammer D, Cukras AR, Lipton RJ, Landweber LF. Molecular computation: RNA solutions to chess problems. Proc Natl Acad Sci USA. 2000;97(4):1385–1389. 10.1073/pnas.97.4.1385
[23]
Pelletier O Weimerskirch A. Algorithmic self-assembly of DNA tiles and its application to cryptanalysis. arXiv. 2001. https://doi.org/10.48550/arXiv.cs/0110009
[24]
Li K Zou S Xu J. Fast parallel molecular algorithms for DNA-based computation: Solving the elliptic curve discrete logarithm problem over GF (2n). Paper presented at: 2007 Frontiers in the Convergence of Bioscience and Information Technologies; 2007; Jeju City South Korea. 10.1109/fbit.2007.91
[25]
Cheng Z. Computation of multiplicative inversion and division in GF (2 n) by self-assembly of DNA tiles. J Comput Theor Nanosci. 2012;9(3):336–346. 10.1166/jctn.2012.2029
[26]
Darehmiraki M, Nehi HM. Molecular solution to the 0–1 knapsack problem based on DNA computing. Appl Math Comput. 2007;187(2):1033–1037.
[27]
Clelland CT, Risca V, Bancroft C. Hiding messages in DNA microdots. Nature. 1999;399(6736):533–534. 10.1038/21092
[29]
Wilson K, Hofmann A, Walker JM, Clokie S. Wilson and Walker’s principles and techniques of biochemistry and molecular biology. Cambridge (UK): Cambridge University Press; 2018.
[30]
DNA structure and function

Andrew Travers, Georgi Muskhelishvili

The FEBS Journal 2015 10.1111/febs.13307
[33]
Applications of CRISPR technologies in research and beyond

Rodolphe Barrangou, Jennifer A Doudna

Nature Biotechnology 10.1038/nbt.3659
[35]
Su Y, Lin W, Chu L, Zan X, Xu P, Zhang F, Liu B, Liu W. Nano scale instance-based learning using non-specific hybridization of DNA sequences. Commun Eng. 2023;2(1):87. 10.1038/s44172-023-00134-8
[36]
Mondal B, Mandal T. A light weight secure image encryption scheme based on chaos & DNA computing. J King Saud Univ Comput Info Sci. 2017;29(4):499–504.
[37]
Ning K. A pseudo DNA cryptography method. arXiv. 2009. https://doi.org/10.48550/arXiv.0903.2693
[38]
Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Math Comput Model. 2010;52(11-12):2028–2035. 10.1016/j.mcm.2010.06.005
[39]
Liu H, Wang X, Kadir A. Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput. 2012;12(5):1457–1466. 10.1016/j.asoc.2012.01.016
[40]
Zhang Q, Wei X. A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik. 2013;124(23):6276–6281. 10.1016/j.ijleo.2013.05.009
[41]
Enayatifar R, Abdullah AH, Isnin IF. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng. 2014;56:83–93. 10.1016/j.optlaseng.2013.12.003
[42]
Kalpana J, Murali P. An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Optik. 2015;126(24):5703–5709. 10.1016/j.ijleo.2015.09.091
[43]
A novel image encryption scheme based on DNA sequence operations and chaotic systems

Xiuli Chai, Zhihua Gan, Ke Yuan et al.

Neural Computing and Applications 2019 10.1007/s00521-017-2993-9
[44]
Zefreh EZ. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed Tools Appl. 2020;79(33-34):24993–25022. 10.1007/s11042-020-09111-1
[45]
Chidambaram N, Thenmozhi K, Raj P, Amirtharajan R. DNA-chaos governed cryptosystem for cloud-based medical image repository. Clust Comput. 2024;27:4127–4144. 10.1007/s10586-024-04391-w
[46]
Li Q, Chen L. An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding. Multimed Tools Appl. 2024;83(2):5351–5368. 10.1007/s11042-023-15550-3
[47]
Yu J, Peng K, Zhang L, Xie W. Image encryption algorithm based on DNA network and hyperchaotic system. Vis Comput. 2024;40:8001–8021. 10.1007/s00371-023-03219-9
[48]
Wu Y, Zhang L, Berretti S, Wan S. Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Trans Industr Inform. 2022;19(2):2089–2098. 10.1109/tii.2022.3194590
[49]
Liu H, Teng L, Zhang Y, Si R, Liu P. Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security. Expert Syst Appl. 2024;235: Article 121090. 10.1016/j.eswa.2023.121090
[50]
Alawida M. A novel DNA tree-based chaotic image encryption algorithm. J Inf Secur Appl. 2024;83: Article 103791.

Showing 50 of 102 references

Metrics
11
Citations
102
References
Details
Published
Jan 17, 2024
Vol/Issue
4
Funding
National Natural Science Foundation of China Award: 62072128
Natural Science Foundation of Guangdong Province of China Award: 2023A1515011401
Municipal School Joint Fund of Guangzhou Science and Technology Bureau Award: SL2022A03J00935
Open Project of Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Award: 2022B1212010011
Cite This Article
Ling Chu, Yanqing Su, Xiangyu Yao, et al. (2024). A Review of DNA Cryptography. Intelligent Computing, 4. https://doi.org/10.34133/icomputing.0106
Related

You May Also Like