Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography

09/17/2019
by   Yixin Zhang, et al.
0

An ideal signature material and method, which can be used to prove the authenticity of a physical item and against forgery, should be immune to the fast developments in digital and engineering technologies. Herein, the design of signature material combining cryptographic hash function and DNA steganography is proposed. The encrypting materials are used to construct a series of time-stamped records (blockchain) associated with published hash values, while each DNA-encrypted block is associated with a set of DNA keys. The decrypted DNA information, as digital keys, can be validated through a hash function to compare with the published hash values. The blocks can also be cross-referenced among different related signatures. While both digital cryptography and DNA steganography can have large key size, automated brutal force search is far more labor intensive and expensive for DNA steganography with wet lab experiments, as compared to its digital counterpart. Moreover, the time-stamped blockchain structure permits the incorporation of new cryptographic functions and DNA steganographies over time, thus can evolve over time without losing the continuous history line.

READ FULL TEXT

page 3

page 5

page 9

research
04/13/2019

SPHINCS^+ digital signature scheme with GOST hash functions

Many commonly used public key cryptosystems will become insecure once a ...
research
07/18/2023

A New Hybrid Cryptosystem Involving DNA,Rabin, One Time Pad and Fiestel

Information security is a crucial need in the modern world. Data securit...
research
01/03/2023

One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys

Quantum digital signatures (QDS), generating correlated bit strings amon...
research
03/26/2021

Genomic Encryption of Biometric Information for Privacy-Preserving Forensics

DNA fingerprinting is a cornerstone for human identification in forensic...
research
12/24/2019

Smooth Operator – The Use of Smooth Integers in Fast Generation of RSA Keys

Primality generation is the cornerstone of several essential cryptograph...
research
04/12/2012

Detecting lateral genetic material transfer

The bioinformatical methods to detect lateral gene transfer events are m...
research
09/02/2020

Embedded Blockchains: A Synthesis of Blockchains, Spread Spectrum Watermarking, Perceptual Hashing Digital Signatures

In this paper we introduce a scheme for detecting manipulated audio and ...

Please sign up or login with your details

Forgot password? Click here to reset