2014
DOI: 10.1007/s11434-014-0170-4
|View full text |Cite
|
Sign up to set email alerts
|

A molecular cryptography model based on structures of DNA self-assembly

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…There are 1.6×10 8 real DNA sequences found on the online database (NCBI database), that is, N 1 = 1.6×10 8 . In order to facilitate the probability comparison, we set the length of the reference strand in this paper is 1000 bp , the length of the primer is 5 bp , the number of circular DNA in the reference [ 13 ] is 1000, the length of the key strand in the reference [ 16 ] is 10 bp , namely n = n 3 = 1000, n 2 = 5, n 4 = 10. Therefore, the length of plaintext binary is the only unified variable.…”
Section: Discussion and Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…There are 1.6×10 8 real DNA sequences found on the online database (NCBI database), that is, N 1 = 1.6×10 8 . In order to facilitate the probability comparison, we set the length of the reference strand in this paper is 1000 bp , the length of the primer is 5 bp , the number of circular DNA in the reference [ 13 ] is 1000, the length of the key strand in the reference [ 16 ] is 10 bp , namely n = n 3 = 1000, n 2 = 5, n 4 = 10. Therefore, the length of plaintext binary is the only unified variable.…”
Section: Discussion and Analysismentioning
confidence: 99%
“…All of the proposed one-time-pad DNA cryptosystems can be divided into two types: one is only make DNA database as a codebook to build a one-time-pad DNA cryptosystem and the other is to construct a brand new DNA cryptosystem based on some biological difficult problems [ 11 ]. The logical operations of one-time-pad DNA cryptosystems include substitution method [ 12 ] and XOR operation method [ 12 , 13 ]. The one-time-pad cryptosystem based on the substitution method uses the DNA database as a codebook to construct a mapping table which possesses a unique characteristic of the inverse mapping.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…There are databases of anonymous DNA sequences, which can sometimes be deanonymized with only small amounts of information such as a surname [13], or by reconstructing physical features from the DNA [6]. In order to address these issues, there has been work on cryptographic schemes aimed at obscuring results related to DNA or the input/output [7,11,14,26].…”
Section: :2mentioning
confidence: 99%