2017
DOI: 10.3390/cryptography1030021
|View full text |Cite
|
Sign up to set email alerts
|

A Cryptographic System Based upon the Principles of Gene Expression

Abstract: Processes of gene expression such as regulation of transcription by the general transcription complex can be used to create hard cryptographic protocols which should not be breakable by common cipherattack methodologies. The eukaryotic processes of gene expression permit expansion of DNA cryptography into complex networks of transcriptional and translational coding interactions. I describe a method of coding messages into genes and their regulatory sequences, transcription products, regulatory protein complexe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…Kadhim et al [ 38 ] and Al-Wattar et al [ 39 ] proposed efficient S-Boxes using DNA computing, analyzed the security of the proposed ciphers using different criteria, and showed that the ciphers passed the test criteria. Many other researchers have used DNA computing to design and propose block ciphers, such as [ 40 , 41 , 42 , 43 ].…”
Section: Introductionmentioning
confidence: 99%
“…Kadhim et al [ 38 ] and Al-Wattar et al [ 39 ] proposed efficient S-Boxes using DNA computing, analyzed the security of the proposed ciphers using different criteria, and showed that the ciphers passed the test criteria. Many other researchers have used DNA computing to design and propose block ciphers, such as [ 40 , 41 , 42 , 43 ].…”
Section: Introductionmentioning
confidence: 99%
“…This approach augments the strength of the resultant S-box using the permutation process. Authors using methods suggested in [20][21][22][23][24][25] used DNA computing to construct robust S-boxes and cryptographically strong ciphers. Analysis of these S-boxes and ciphers demonstrated their strength with respect to cryptographic criteria and against different attacks.…”
Section: Introductionmentioning
confidence: 99%
“…DNA computing is another prevalent field being used for the design of robust S-boxes to protect data. Researchers [22][23][24][25][26][27] have employed DNA computing for the design of sturdy S-Boxes to assist the encryption process and resultant S-boxes have proved attack-resilient. Several investigators have exploited other knowledge domains to produce substitution boxes like elliptic curve [28,29], graph theory [30,31], cellular automata [32], wavelet domain [33], optimization techniques [17,[34][35][36], Hilbert curve [37], backtracking [38], feedback systems [39], firefly algorithm [40], chaotic permutation [41], Galois Field [42], etc.…”
Section: Introductionmentioning
confidence: 99%