1 / 6

Private and Public Key DNA Steganography

Private and Public Key DNA Steganography. C. Richter, A. Leier, W. Banzhaf, and H. Rauhe Cho, Dong-Yeon. Private Key Encryption. Steganography with Digital DNA Assembly of DNA binary strands Secret messages

derick
Télécharger la présentation

Private and Public Key DNA Steganography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Private and Public Key DNA Steganography C. Richter, A. Leier, W. Banzhaf, and H. Rauhe Cho, Dong-Yeon

  2. Private Key Encryption • Steganography with Digital DNA • Assembly of DNA binary strands • Secret messages • For encryption, the message strand that corresponds to the binary encoded plaintext was mixed with other DNA, so-called dummy strands, in equimolar amounts. • For decryption, unique PCR priming sites were attached to the message strand such that the PCR primers worked as secret key by amplifying the message strand selectively.

  3. Security • A and B exchange the generated key over a secure communication channel. It is expected that only A and B have the knowledge about the key. • A generates the message following the binary pattern and adds the key in ligation step. • A generates a certain number of dummies and puts the massage strand among them. • A sends the resulting solution to B, using an open communication channel. • B decrypts the message.

  4. Graphical Decryption • The key sequence could not be used as a distinctive feature for the readout process anymore. • Instead the pool of dummy strands used for encryption was used as decryption key.

  5. Readout of both the dummy pool (Y) and the encrypted pool (X) resulted in two different gel-images. • Using techniques of digital image processing, these gel-images were then subtracted graphically and yielded the original message strand’s binary sequence (A).

More Related