Xiao 2006
Xiao 2006
Chinese Science Bulletin 2006 Vol. 51 No. 12 1413—1420 invented and this might lead to a new revolution in in-
DOI: 10.1007/s11434-006-2012-5 formation science. On such background, DNA cryp-
tography is developed with the research of DNA com-
New field of cryptography: puting (also called biological computing or molecular
computing). The traditional cryptography made great
DNA cryptography progress in the 20th century with the development of
electronic technology and is widely used currently.
XIAO Guozhen1, LU Mingxin1, QIN Lei2 Quantum cryptography was invented in 1970s and has
& LAI Xuejia3 made some progress in recent decades, but there is still
some distance from being used in practice. DNA cryp-
1. National Key Lab of ISN, Xidian University, Xi’an 710071, China;
2. Queen’s University, Cancer Research Institute, 10 Stuart St. Kingston,
tography drawn attention after DNA computing was
ON K7L3N6, Canada; first proposed by Adleman in 1994, and now it has be-
3. Department of Computer Science & Engineer, Shanghai JiaoTong come the frontier of cryptography. DNA cryptography,
University, Shanghai 200030, China traditional cryptography and quantum cryptography are
Correspondence should be addressed to Lu Mingxin (email: seulmx@
126.com ) developed under the same aim-information security, but
Received December 19, 2005; accepted January 16, 2006 with quite different ways, and all the three kinds of
cryptography might constitute the major fields of future
Abstract DNA cryptography is a new born cryp-
cryptography. In this paper, the biological background,
tographic field emerged with the research of DNA
research progress and prospects of DNA cryptography
computing, in which DNA is used as information car-
are reviewed and discussed to highlight its future stud-
rier and the modern biological technology is used as
ies.
implementation tool. The vast parallelism and
extraordinary information density inherent in DNA
1 Biological background
molecules are explored for cryptographic purposes
such as encryption, authentication, signature, and so 1.1 DNA
on. In this paper, we briefly introduce the biological
DNA is the abbreviation for deoxyribonucleic acid
background of DNA cryptography and the principle of
which is the germ plasm of all life styles. DNA is a
DNA computing, summarize the progress of DNA
cryptographic research and several key problems, kind of biological macromolecule and is made of nu-
discuss the trend of DNA cryptography, and compare cleotides. Each nucleotide contains a single base and
the status, security and application fields of DNA there are four kinds of bases, which are adenine (A) and
cryptography with those of traditional cryptography thymine (T) or cytosine (C) and guanine (G), corre-
and quantum cryptography. It is pointed out that all sponding to four kinds of nucleotides. A single-stranded
the three kinds of cryptography have their own ad- DNA is constructed with orientation: one end is called
vantages and disadvantages and complement each 5′, and the other end is called 3′. Usually DNA exists as
other in future practical application. The current main double-stranded molecules in nature. The two comple-
difficulties of DNA cryptography are the absence of mentary DNA strands are held together to form a dou-
effective secure theory and simple realizable method. ble-helix structure by hydrogen bonds between the
The main goal of the research of DNA cryptography is complementary bases of A and T (or C and G). The
exploring characteristics of DNA molecule and reac- double-helix structure was discovered by Watson and
tion, establishing corresponding theories, discovering
Crick; thus the complementary structure is called Wat-
possible development directions, searching for sim-
son-Crick complementarity[1]. Their discovery is one of
ple methods of realizing DNA cryptography, and lay-
ing the basis for future development. the greatest scientific discoveries of the 20th century
and reduced genetics to chemistry and laid the founda-
Keywords: cryptography, DNA cryptography, DNA computing.
tions for the next half century of biology[2].
The vast parallelism, exceptional energy efficiency 1.2 PCR and DNA chip
and extraordinary information density inherent in DNA
molecules are being explored for computing, data stor- Within decades, great progress has been made in
age and cryptography. In such research area, novel gene biotechnology. With invention and maturation of
computers, data storage and cryptography might be these technologies, such as DNA synthesis, PCR, elec-
methods, while the efficiency of DNA hybridization is led by Adleman solved a 3-SAT problem with more
improved greatly with DNA chip technology. These than 1 million possibilities on a simple DNA computer
two important technologies will be briefly introduced in after an exhaustive searching[13]. In 2005,it is declared
this paper.
that a team led by Ehud Keinan invented a biomolecu-
Polymerase Chain Reaction (PCR) was invented in
lar computer that used little more than DNA and en-
1983. It is one of the most important invention in mod- zymes could perform a billion operations simultane-
ern biology[3]. Since the DNA molecule is tiny in vol-
ously[14]. Adleman reviewed DNA computing as fol-
ume, it is difficult to manipulate a small quantity of
lows: “For thousands of years, humans have tried to
given DNA directly, while it will be quite easy to ma-
enhance their inherent computational abilities using
nipulate a great mount of DNA after amplification.
manufactured devices. Mechanical devices such as the
PCR is a fast DNA amplification technology based on
abacus, the adding machine, and the tabulating machine
Watson-Crick complementarity. Two complementary
were important advances. But it was only with the ad-
oligonucleotide primers are annealed to double-
vent of electronic devices and, in particular, the elec-
stranded target DNA strands, and the necessary target
tronic computer some 60 years ago that a qualitative
DNA can be amplified after a serial of polymerase re-
action from 5′ to 3′ with the aid of polymerase enzyme. threshold seems to have been passed and problems of
The PCR is a very sensitive method, and in theory a considerable difficulty could be solved. It appears that a
single target DNA molecule can be amplified to 106 molecular device has now been used to pass this quali-
after 20 cycles. Thus one can effectively amplify a lot tative threshold for a second time.”[13] Scientists have
of DNA strands within a very short time [3]. also made progress in the theory of DNA computing
DNA chip is also known as DNA microarray or gene and explored several feasible computing models, such
chip or oligonucleotide chip or biological chip, which is as the model used by Adleman in 1994[8]. Here it is
fabricated with in situ synthesized oligo nucleic acids called Hamiltonian path model, and the model based on
or spotted cDNA probes according to published meth- DNA chip[14,15] and the sticker model proposed by
ods of Fodor and Brown[4 7]. Tens of thousands, even
- Adleman[16]. Below, the widely used Hamiltonian path
millions of DNA probes are arranged in a square area model and sticker model are briefly introduced.
less than 1 square inch on glass or silicon matrix. And 2.1 Hamiltonian Path Model
as their counterparts, numerous labelled probes are
used to anneal with probes on the chip to get various In 1994, Adleman used DNA computing to solve an
hybridization spectrums revealing genetic information. instance of the directed Hamiltonian path problem[8].
Thus the hybridization efficiency can be raised thou- The computing model proposed by Adleman is also
sands of times and even more. used by Lipton to solve SAT problems[17]. The Hamil-
tonian path problem is to find a path that begins at vin,
2 DNA computing ends at vout and enters every other vertex exactly once
The development of DNA cryptography benefits on a directed graph. For each vertex i in the graph, a
from the progress of DNA computing (also called mo- random 20-mer oligonulecotide (short DNA strand) Oi
lecular computing or biological computing). On the one was generated. Here, mer is the long measure of oli-
hand, cryptography always has some relationship with gonulecotide. The following O2, O3 and O4 denote
the corresponding computing model more or less. On vertices 2, 3, and 4, respectively. All the following oli-
the other hand, some biological technologies used in gonucleotides are written from 5′ to 3′.
DNA computation are also used in DNA cryptography.
O2 = TATCGGATCGGTATATCCGA,
For these reasons, DNA computing is briefly intro-
duced here. O3 = GCTATTCGAGCTTAAAGCTA,
In fact, it is not correct that only the encoding rule is logical experiments have to be done in encryption step
considered key in Fig. 4. The true key should be prim- and decryption step, such as synthesizing message
ers and encoding rule. DNA strands, conducting PCR amplification and se-
quencing. Such experiments can only be done in a well
3.2 Main problems
equipped lab using current technology. For these rea-
The progress in the world shows that the research of sons, DNA cryptosystems are not convenient in prac-
present DNA cryptography is mainly confronted with tice and cannot compete with traditional cryptosystems.
the following problems: Luckily, modern biology has made much headway in
(i) Lack of the related theoretical basis. In 1949, recent twenty years. Many expensive experiments in
Shannon proposed the basic model and development the past have become routine experiments. With the
direction for modern privacy communication in his fa- further development of biology and new design of
mous paper “Communication theory of secrecy sys- DNA cryptosystem, the problems of “difficult and
tems”[23]. In the 1970s, it is proposed that the complex- expensive to realize” can be solved.
ity theory should be used as a powerful tool for design-
ing encryption algorithms, which also makes the emer- 4 Comparisons among DNA cryptography, tradi-
gence of public-key cryptosystem possible[24]. In the tional cryptography and quantum cryptography
following decades, new cryptosystems such as RSA,
EIGamal, DES and AES are invented[25 28]. Thus, the
- 4.1 Development
traditional cryptography is perfected more and more. In Traditional cryptography can be traced back to Cae-
contrast, for DNA cryptography there is no mature cor- sar cipher 2000 years ago or even earlier. Related the-
responding theory. It is still an open problem as to what ory is almost sound. All the practical ciphers can be
are the model and security basis of DNA cryptography, seen as traditional ones. Quantum cryptography came
say nothing of the implementations. For lack of related into being in the 1970s, and the theory basis has been
theory it is difficult to design good DNA cryptographic prepared while implementation is difficult. By and
schemes. large, they have not been plunged into practical use.
(ii) Difficult to realize and expensive to apply. For DNA cryptography has only nearly ten years history,
the existing DNA cryptography schemes, many bio- the theory basis is under research and the application