0% found this document useful (0 votes)
915 views

Presentation DNA Cryptography

The document discusses using DNA computing to break cryptographic algorithms like the Data Encryption Standard (DES). It begins by introducing DNA computing as an alternative to silicon-based computing that offers massive parallelism. It then provides background on cryptography, describing encryption, decryption, and the DES algorithm. The document proposes using a molecular computer to break DES by generating all possible keys in parallel using DNA strands and removing incorrect solutions. This approach could recover a DES key much faster than a conventional computer.

Uploaded by

cool_duke88
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
915 views

Presentation DNA Cryptography

The document discusses using DNA computing to break cryptographic algorithms like the Data Encryption Standard (DES). It begins by introducing DNA computing as an alternative to silicon-based computing that offers massive parallelism. It then provides background on cryptography, describing encryption, decryption, and the DES algorithm. The document proposes using a molecular computer to break DES by generating all possible keys in parallel using DNA strands and removing incorrect solutions. This approach could recover a DES key much faster than a conventional computer.

Uploaded by

cool_duke88
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 29

DNA Computers Applications:

Cryptography

Constanza Lampasona

Innovative Computer Architectures and Concepts


Computer Architecture Department - University of Stuttgart
Motivation
• Silicon technologies have limits

• Research intends to deal with “silicon” disadvantages

• DNA computing -> inherent parallelism

• Cryptographic problem requires vast parallelism

Let’s solve the cryptographic problem using a molecular computer!!!


June 2002 DNA Computers Applications: Cr 2
yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 3


yptography
Introduction
 Encoding data “as in nature”

Input Recombination Output


algorithm

June 2002 DNA Computers Applications: Cr 4


yptography
Introduction
 Cryptography

Secret writing

Gjoejoh uif lfz Shift by one Finding the key

Data Encryptation Standard: approved cryptographic algorithm as

required by FIPS 140-1 (Federal Information Processing Standards)

June 2002 DNA Computers Applications: Cr 5


yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 6


yptography
Cryptography
From the Greek: crypto-, hidden + -graphy,
-graphy writing

“The art of writing with a secret key or in an enigmatic way”

Let’s look at history...

June 2002 DNA Computers Applications: Cr 7


yptography
Cryptography
 Encryption

Protecting information

Data Transformation Unreadable form

Ensure privacy

Keep the information hidden


June 2002 DNA Computers Applications: Cr 8
yptography
Cryptography
 Decryption

Reverse of Encryption

Encrypted data Transformation Intelligible form

June 2002 DNA Computers Applications: Cr 9


yptography
Cryptography

Encryption Decryption

Secret KEY

June 2002 DNA Computers Applications: Cr 10


yptography
Cryptography
Encrypted data (cipher-text): Khoor zruog

Secret KEY: shift by 3


a b c d e f g h i j k l m n o p q r s t u v w x y z

d e f g h i j k l m n o p q r s t u v w x y z a b c

Decrypted data (plain-text): Hello world

June 2002 DNA Computers Applications: Cr 11


yptography
Cryptography
 Data Encryption Standard (DES)
• Crytographic algorithm (National Bureau of Standards).

• Enciphering and Deciphering.


Deciphering

• 64-bit key.

• Data depends on key’s security.

• Unique key for encryting and decryting.

June 2002 DNA Computers Applications: Cr 12


yptography
Cryptography
 DES’ Data Encryption Algorithm
Enciphering

Initial Inverse initial


Input Computation Output
permutation permutation
IP IP -1

June 2002 DNA Computers Applications: Cr 13


yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1

IP
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7

June 2002 DNA Computers Applications: Cr 14


yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1

• Uses the permuted input block as input.

• Produces a pre-output block.

• 16 iterations.

June 2002 DNA Computers Applications: Cr 15


yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1

IP-1
40 8 48 16 56 24 64 32
39 7 47 15 55 23 63 31
Plain-text
38 6 46 14 54 22 Cipher-text
62 30
37 5 45 13 53 21 61 29
36 4 44 12
Key 52 20 60 28
35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26
33 1 41 9 49 17 57 25

June 2002 DNA Computers Applications: Cr 16


yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 17


yptography
DNA Computing
 DNA

DNA Genetic information “memory”


(Deoxyribonucleic acid)
Nucleotides strung into
polymer chains (DNA Strands)

Four classes of nucleotides:


Adenine, Guanine, Cytosine, Thymine (A,C,G,T)

June 2002 DNA Computers Applications: Cr 18


yptography
DNA Computing
• The Structure of DNA

The double helix structure discovered by Watson and Crick


June 2002 DNA Computers Applications: Cr 19
yptography
DNA Computing
DNA
DNA
Computer:
Computer:
• Based on Adleman’s work (1994) DNAStrands
Strands
DNA
• Solve huge problems by parallel search
++
• Much faster than a conventional computer Combinations
Combinations
• More hardware vs. more DNA
==

“Solution”
“Solution”

June 2002 DNA Computers Applications: Cr 20


yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 21


yptography
Breaking DES
• The Idea

 Finding a key given one pair (plain-text, cipher-text).

 Pre-processing + one day of work = recover the key.

 First example of a real problem solved using DNA.

June 2002 DNA Computers Applications: Cr 22


yptography
Breaking DES
• Massive parallel DNA computing approach:

• Generate all possible solutions in parallel

• Remove wrong solutions

June 2002 DNA Computers Applications: Cr 23


yptography
Breaking DES

 Representing binary strings

 Plan of DES attack


 Prepare the DNA solution
 Extract desired patterns
 Read the result

 Break DES!!!

June 2002 DNA Computers Applications: Cr 24


yptography
Breaking DES
• Summary of the experiment
 DES(M0,k) encoding plain-text with all possible 256 keys
 4 months
 Extract DES(M0,k)=E0, (plaintext, cipher-text)
 Read k
 1 day
DNAComputer:
DNA Computer:
DNAStrands
DNA Strands
++
Combinations
Combinations
==
“Solution”
“Solution”
June 2002 DNA Computers Applications: Cr 25
yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 26


yptography
Conclusions
 DNA computing with a concrete application,
Cryptography

 Very general attack on DES, using 64-bit key

 Cryptosystems with 64-bit key are insecure

 Future of molecular computers: Unclear

June 2002 DNA Computers Applications: Cr 27


yptography
Summary

 Cryptography

 DES

 DNA Computing >>> Parallelism

 Breaking DES

June 2002 DNA Computers Applications: Cr 28


yptography
http://www.ra.informatik.uni-stuttgart.de/~virazela/Seminar/Material/Presentation8/

June 2002 DNA Computers Applications: Cr 29


yptography

You might also like