2019
DOI: 10.1021/acssynbio.9b00164
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric-Key Encryption Based on Bioaffinity Interactions

Abstract: The research presented here shows a bridge between biochemistry and cryptography. Enzyme-based assays were used in a new methodology linked to ciphers and cipher systems. Three separate enzyme assays, alkaline phosphatase (ALP) (E.C. 3.1.3.1), lysozyme (E.C. 3.2.1.17), and horseradish peroxidase (HRP) (E.C. 1.11.1.7), were used to create a cipher key in order to encrypt a message. By choosing certain parameters for one’s experiment that are performed in the same way as a person receiving the message, correct e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 44 publications
0
12
0
Order By: Relevance
“…As late as World War II, fruit juices, urine, and vinegarinks that darken upon heating-were still used to transmit messages clandestinely. Modern invisible ink schemes invoke fluorescent chemicals, [3][4][5][6] metal-organic frameworks, [7] nanoparticles, [8,9] DNA, [10,11] proteins, [12,13] and even living organisms, [14] but in the cat-and-mouse world of steganography, there will always be a need for new inks that reveal hidden messages in response to an appropriate stimulus.…”
Section: Doi: 101002/adma202100803mentioning
confidence: 99%
See 1 more Smart Citation
“…As late as World War II, fruit juices, urine, and vinegarinks that darken upon heating-were still used to transmit messages clandestinely. Modern invisible ink schemes invoke fluorescent chemicals, [3][4][5][6] metal-organic frameworks, [7] nanoparticles, [8,9] DNA, [10,11] proteins, [12,13] and even living organisms, [14] but in the cat-and-mouse world of steganography, there will always be a need for new inks that reveal hidden messages in response to an appropriate stimulus.…”
Section: Doi: 101002/adma202100803mentioning
confidence: 99%
“…As late as World War II, fruit juices, urine, and vinegarinks that darken upon heating-were still used to transmit messages clandestinely. Modern invisible ink schemes invoke fluorescent chemicals, [3][4][5][6] metal-organic frameworks, [7] nanoparticles, [8,9] DNA, [10,11] proteins, [12,13] and even living organisms, [14] but in the cat-and-mouse world of steganography, there will always be a need for new inks that reveal hidden messages in response to an appropriate stimulus.Here we report new approaches to concealing information that rely upon creating microscale patterns composed of different polymer brushes, where at least one has an optically detectable response to external stimuli. In the first, thermoresponsive poly(N-isopropylacrylamide) (pNIPAM) brushes are patterned alongside nonresponsive poly(N,N-dimethylacrylamide) (pDMA) polymers of the same height (Figure 1A).…”
mentioning
confidence: 99%
“…Lastly, the use of biosensors for cybersecurity is a growing trend. The use of sensors for authentication of an individual and a novel methodology related to cryptography were recently developed [ 150 , 151 ]. The first paper represents a review with the aim of introducing a multi-assay wearable biosensor that would provide continuous tracking of a person’s sweat metabolites for authentication purposes.…”
Section: Researchmentioning
confidence: 99%
“…By monitoring these assays, one can produce output data that would be beneficial in the authentication of a person with many cybersecurity applications. The second paper illustrates the use of three enzyme assays in order to encrypt a short message using a basic cipher [ 151 ]. The three enzymatic assays used involved HRP, lysozyme, and ALP.…”
Section: Researchmentioning
confidence: 99%
“…In such studies [4][5][6], the emission patterns generated by the probes are used to encode or conceal data [7,8]. One potential advantage of using molecule-based security devices [7][8][9][10][11][12][13][14][15][16][17][18][19] over conventional electronic security systems is that the former cannot be subjected to electronic surveillance [4][5][6]. The small scale, versatility, and unusual operating principles are additional properties that significantly complicate finding and breaking into molecular security systems.…”
Section: Introductionmentioning
confidence: 99%