scholarly journals DNA origami cryptography for secure communication

2019 ◽  
Vol 10 (1) ◽  
Author(s):  
Yinan Zhang ◽  
Fei Wang ◽  
Jie Chao ◽  
Mo Xie ◽  
Huajie Liu ◽  
...  

AbstractBiomolecular cryptography exploiting specific biomolecular interactions for data encryption represents a unique approach for information security. However, constructing protocols based on biomolecular reactions to guarantee confidentiality, integrity and availability (CIA) of information remains a challenge. Here we develop DNA origami cryptography (DOC) that exploits folding of a M13 viral scaffold into nanometer-scale self-assembled braille-like patterns for secure communication, which can create a key with a size of over 700 bits. The intrinsic nanoscale addressability of DNA origami additionally allows for protein binding-based steganography, which further protects message confidentiality in DOC. The integrity of a transmitted message can be ensured by establishing specific linkages between several DNA origamis carrying parts of the message. The versatility of DOC is further demonstrated by transmitting various data formats including text, musical notes and images, supporting its great potential for meeting the rapidly increasing CIA demands of next-generation cryptography.

Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


Author(s):  
Bachujayendra Kumar ◽  
Rajya Lakshmidevi K ◽  
M Verginraja Sarobin

Wireless sensor networks (WSNs) have been used widely in so many applications. It is the most efficient way to monitor the information. There areso many ways to deploy the sensors. Many problems are not identified and solved. The main challenge of WSN is energy efficiency and information security. WSN power consumption is reduced by genetic algorithm-based clustering algorithm. Information from cluster head to base station may have a lot of chances to get hacked. The most reliable way to manage energy consumption is clustering, and encryption will suit best for information security. In this paper, we explain clustering techniques and a new algorithm to encrypt the data in the network.


2010 ◽  
Vol 4 (12) ◽  
pp. 32-35
Author(s):  
Samir Kumar Bandyopadhyay ◽  
Somaditya Roy

2012 ◽  
Vol 6 (4) ◽  
pp. 71-93
Author(s):  
Ming Yang ◽  
Chih-Cheng Hung ◽  
Edward Jung

Secure communication has traditionally been ensured with data encryption, which has become easier to break than before due to the advancement of computing power. For this reason, information hiding techniques have emerged as an alternative to achieve secure communication. In this research, a novel information hiding methodology is proposed to deliver secure information with the transmission/broadcasting of digital video. Secure data will be embedded within the video frames through vector quantization. At the receiver end, the embedded information can be extracted without the presence of the original video contents. In this system, the major performance goals include visual transparency, high bitrate, and robustness to lossy compression. Based on the proposed methodology, the authors have developed a novel synchronization scheme, which ensures audio/video synchronization through speech-in-video techniques. Compared to existing algorithms, the main contributions of the proposed methodology are: (1) it achieves both high bitrate and robustness against lossy compression; (2) it has investigated impact of embedded information to the performance of video compression, which has not been addressed in previous research. The proposed algorithm is very useful in practical applications such as secure communication, captioning, speech-in-video, video-in-video, etc.


2003 ◽  
Vol 12 (2) ◽  
Author(s):  
R. L. Riddle ◽  
S. D. Kawaler

AbstractAs the WET moves to CCD systems, we move away from the uniformity of the standard WET photometer into an arena where each system can be radically different. There are many possible CCD photometry systems that can fulfil the requirements of a WET instrument, but each of these will have their own unique native data format. During XCov22, it became readily apparent that the WET requires a defined data format for all CCD data that arrives at HQ. This paper describes the proposed format for the next generation of WET data; the final version will be the default format for XQED, the new photometry package discussed elsewhere in these proceedings.


2016 ◽  
Vol 114 (1) ◽  
pp. 19-26 ◽  
Author(s):  
H. Vincent Poor ◽  
Rafael F. Schaefer

Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.


Nanoscale ◽  
2020 ◽  
Vol 12 (26) ◽  
pp. 13907-13911 ◽  
Author(s):  
Netzahualcóyotl Arroyo-Currás ◽  
Muaz Sadeia ◽  
Alexander K. Ng ◽  
Yekaterina Fyodorova ◽  
Natalie Williams ◽  
...  

Using DNA origami as the recognition element in an electrochemical biosensor enables the selective and direct detection of “mesoscale” virus-sized analytes.


Small ◽  
2010 ◽  
Vol 6 (23) ◽  
pp. 2664-2667 ◽  
Author(s):  
Akinori Kuzuya ◽  
Naohiro Koshi ◽  
Mayumi Kimura ◽  
Kentaro Numajiri ◽  
Takahiro Yamazaki ◽  
...  

Nano Letters ◽  
2011 ◽  
Vol 11 (11) ◽  
pp. 4585-4590 ◽  
Author(s):  
David Cooper ◽  
Francisco de la Peña ◽  
Armand Béché ◽  
Jean-Luc Rouvière ◽  
Germain Servanton ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document