PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cryptographic keys management system based on DNA strands

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
Federated Conference on Computer Science and Information Systems (14 ; 01-04.09.2019 ; Leipzig, Germany)
Języki publikacji
EN
Abstrakty
EN
Security of cryptographic keys is one of the most important issue in a key management process. The question arises whether modern technology really allows for high level of physical protection and security of sensitive data and cryptographic keys. The article considers various contemporary types of threats associated with the storage of secret keys. We present an innovative way to store sensitive data, using DNA strands as a medium, which significantly reduces hazard connected with electronic devices based data storage and makes the key management process independent of third parties.
Rocznik
Tom
Strony
231--235
Opis fizyczny
Bibliogr. 20 poz., rys.
Twórcy
  • Maria Curie-Sklodowska University, Plac Marii Curie-Skłodowskiej 5, 20-031 Lublin, Poland
  • Maria Curie-Sklodowska University, Plac Marii Curie-Skłodowskiej 5, 20-031 Lublin, Poland
Bibliografia
  • 1. L. M. Adleman, “Molecular computation of solutions to combinatorial problems.” Science, vol. 266, no. 5187, pp. 1021–1024, Nov 1994. http://dx.doi.org/10.1126/science.7973651. [Online]. Available: https://doi.org/10.1126/science.7973651
  • 2. A. Gehani, T. LaBean, and J. Reif, DNA-based Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 167–188. ISBN 978-3-540-24635-0. [Online]. Available: https://doi.org/10.1007/978-3-540-24635-0_12
  • 3. Y. Zhang, X. Liu, and M. Sun, “Dna based random key generation and management for otp encryption.” Biosystems, vol. 159, pp. 51–63, Sep 2017. http://dx.doi.org/10.1016/j.biosystems.2017.07.002. [Online]. Available: https://doi.org/10.1016/j.biosystems.2017.07.002
  • 4. R. Cano and M. Borucki, “Revival and identification of bacterial spores in 25- to 40-million-year-old dominican amber,” Science, vol. 268, no. 5213, pp. 1060–1064, 1995. http://dx.doi.org/10.1126/science.7538699 Cited By 348. [Online]. Available: https://doi.org/10.1126/science.7538699
  • 5. R. Vreeland, W. Rosenzweig, and D. Powers, “Isolation of a 250 million-year-old halotolerant bacterium from a primary salt crystal,” Nature, vol. 407, no. 6806, pp. 897–900, 2000. http://dx.doi.org/10.1038/35038060 Cited By 414. [Online]. Available: https://doi.org/10.1038%2f35038060
  • 6. R. N. Grass, R. Heckel, M. Puddu, D. Paunescu, and W. J. Stark, “Robust chemical preservation of digital information on dna in silica with error-correcting codes,” Angewandte Chemie International Edition, vol. 54, no. 8, pp. 2552–2555, 2015. http://dx.doi.org/10.1002/anie.201411378. [Online]. Available: https://doi.org/10.1002/anie.201411378
  • 7. J. P. Cox, “Long-term data storage in dna,” Trends in Biotechnology, vol. 19, no. 7, pp. 247 – 250, 2001. http://dx.doi.org/10.1016/S0167-7799(01)01671-7. [Online]. Available: https://doi.org/10.1016/S0167-7799(01)01671-7
  • 8. S. B. Shah and J. G. Elerath, “Reliability analysis of disk drive failure mechanisms,” Annual Reliability and Maintainability Symposium, 2005. Proceedings., pp. 226–231, 2005. http://dx.doi.org/10.1109/RAMS.2005.1408366. [Online]. Available: http://doi.org/10.1109/RAMS.2005.1408366
  • 9. K. Halvorsen and W. P. Wong, “Binary dna nanostructures for data encryption,” PLOS ONE, vol. 7, no. 9, pp. 1–4, 09 2012. http://dx.doi.org/10.1371/journal.pone.0044212. [Online]. Available: https://doi.org/10.1371/journal.pone.0044212
  • 10. K. Tanaka, A. Okamoto, and I. Saito, “Public-key system using dna as a one-way function for key distribution,” Biosystems, vol. 81, no. 1, pp. 25 – 29, 2005. http://dx.doi.org/10.1016/j.biosystems.2005.01.004. [Online]. Available: https://doi.org/10.1016/j.biosystems.2005.01.004
  • 11. A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, “Cryptography with dna binary strands.” Biosystems, vol. 57, no. 1, pp. 13–22, Jun 2000. http://dx.doi.org/10.1016/S0303-2647(00)00083-6. [Online]. Available: https://doi.org/10.1016/S0303-2647(00)00083-6
  • 12. H. Shiu, K. Ng, J. Fang, R. Lee, and C. Huang, “Data hiding methods based upon dna sequences,” Information Sciences, vol. 180, no. 11, pp. 2196 – 2208, 2010. http://dx.doi.org/10.1016/j.ins.2010.01.030. [Online]. Available: https://doi.org/10.1016/j.ins.2010.01.030
  • 13. J.-M. Oh, D.-H. Park, and J.-H. Choy, “Integrated bio-inorganic hybrid systems for nano-forensics,” Chem. Soc. Rev., vol. 40, pp. 583–595, 2011. http://dx.doi.org/10.1039/C0CS00051E. [Online]. Available: http://dx.doi.org/10.1039/C0CS00051E
  • 14. S. Cormier, J. Shearman, and M. Hogan, “Dna in your jeans? effect of abrasion and bleaching on dna tagged denim,” AATCC Review, vol. 18, pp. 44–48, 09 2018. http://dx.doi.org/10.14504/ar.18.5.4. [Online]. Available: https://doi.org/10.14504/ar.18.5.4
  • 15. K. Yang, M. Hicks, Q. Dong, T. Austin, and D. Sylvester, “A2: Analog malicious hardware,” in 2016 IEEE Symposium on Security and Privacy (SP), May 2016. http://dx.doi.org/10.1109/SP.2016.10. ISSN 2375-1207 pp. 18–37. [Online]. Available: https://doi.org/10.1109/SP.2016.10
  • 16. G. T. Becker, F. Regazzoni, C. Paar, and W. P. Burleson, “Stealthy dopant-level hardware trojans: extended version,” Journal of Cryptographic Engineering, vol. 4, no. 1, pp. 19–31, Apr 2014. http://dx.doi.org/10.1007/s13389-013-0068-0. [Online]. Available: https://doi.org/10.1007/s13389-013-0068-0
  • 17. R. Kumar, P. Jovanovic, W. Burleson, and I. Polian, “Parametric trojans for fault-injection attacks on cryptographic hardware,” in 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, Sep. 2014. http://dx.doi.org/10.1109/FDTC.2014.12 pp. 18–28. [Online]. Available: https://doi.org/10.1109/FDTC.2014.12
  • 18. J. Appelbaum, J. Horchert, O. Reissmann, M. Rosenbach, J. Schindler, and C. Stöcker. (2013, 12) Unit offers spy gadgets for every need. [Online]. Available: http://www.spiegel.de
  • 19. J. Robertson and M. Riley. (2018, 11) The big hack: How china used a tiny chip to infiltrate u.s. companies. [Online]. Available: https://www.bloomberg.com
  • 20. E. Savage, J. Gilbert, and W. Radasky, “The early-time (e1) high-altitude electromagnetic pulse (hemp) and its impact on the u.s. power grid,” Metatech Corporation, 358 S. Fairview Ave., Suite E Goleta, CA 93117, Tech. Rep., January 2010.
Uwagi
1. Track 2: Computer Science & Systems
2. Technical Session: 6th International Conference on Cryptography and Security Systems
3. Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-59d199fa-b789-484b-95be-30854b41effb
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.