Anda di halaman 1dari 29

DNA Computers Applications:

Cryptography

Constanza Lampasona

Innovative Computer Architectures and Concepts


Computer Architecture Department - University of Stuttgart
Motivation
• Silicon technologies have limits

• Research intends to deal with “silicon” disadvantages

• DNA computing -> inherent parallelism

• Cryptographic problem requires vast parallelism

Let’s solve the cryptographic problem using a molecular computer!!!


June 2002 DNA Computers Applications: Cr 2
yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 3


yptography
Introduction
 Encoding data “as in nature”

Input Recombination Output


algorithm

June 2002 DNA Computers Applications: Cr 4


yptography
Introduction
 Cryptography

Secret writing

Gjoejoh uif lfz Shift by one Finding the key

Data Encryptation Standard: approved cryptographic algorithm as

required by FIPS 140-1 (Federal Information Processing Standards)

June 2002 DNA Computers Applications: Cr 5


yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 6


yptography
Cryptography
From the Greek: crypto-, hidden + -graphy,
-graphy writing

“The art of writing with a secret key or in an enigmatic way”

Let’s look at history...

June 2002 DNA Computers Applications: Cr 7


yptography
Cryptography
 Encryption

Protecting information

Data Transformation Unreadable form

Ensure privacy

Keep the information hidden


June 2002 DNA Computers Applications: Cr 8
yptography
Cryptography
 Decryption

Reverse of Encryption

Encrypted data Transformation Intelligible form

June 2002 DNA Computers Applications: Cr 9


yptography
Cryptography

Encryption Decryption

Secret KEY

June 2002 DNA Computers Applications: Cr 10


yptography
Cryptography
Encrypted data (cipher-text): Khoor zruog

Secret KEY: shift by 3


a b c d e f g h i j k l m n o p q r s t u v w x y z

d e f g h i j k l m n o p q r s t u v w x y z a b c

Decrypted data (plain-text): Hello world

June 2002 DNA Computers Applications: Cr 11


yptography
Cryptography
 Data Encryption Standard (DES)
• Crytographic algorithm (National Bureau of Standards).

• Enciphering and Deciphering.


Deciphering

• 64-bit key.

• Data depends on key’s security.

• Unique key for encryting and decryting.

June 2002 DNA Computers Applications: Cr 12


yptography
Cryptography
 DES’ Data Encryption Algorithm
Enciphering

Initial Inverse initial


Input Computation Output
permutation permutation
IP IP -1

June 2002 DNA Computers Applications: Cr 13


yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1

IP
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7

June 2002 DNA Computers Applications: Cr 14


yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1

• Uses the permuted input block as input.

• Produces a pre-output block.

• 16 iterations.

June 2002 DNA Computers Applications: Cr 15


yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1

IP-1
40 8 48 16 56 24 64 32
39 7 47 15 55 23 63 31
Plain-text
38 6 46 14 54 22 Cipher-text
62 30
37 5 45 13 53 21 61 29
36 4 44 12
Key 52 20 60 28
35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26
33 1 41 9 49 17 57 25

June 2002 DNA Computers Applications: Cr 16


yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 17


yptography
DNA Computing
 DNA

DNA Genetic information “memory”


(Deoxyribonucleic acid)
Nucleotides strung into
polymer chains (DNA Strands)

Four classes of nucleotides:


Adenine, Guanine, Cytosine, Thymine (A,C,G,T)

June 2002 DNA Computers Applications: Cr 18


yptography
DNA Computing
• The Structure of DNA

The double helix structure discovered by Watson and Crick


June 2002 DNA Computers Applications: Cr 19
yptography
DNA Computing
DNA
DNA
Computer:
Computer:
• Based on Adleman’s work (1994) DNAStrands
Strands
DNA
• Solve huge problems by parallel search
++
• Much faster than a conventional computer Combinations
Combinations
• More hardware vs. more DNA
==

“Solution”
“Solution”

June 2002 DNA Computers Applications: Cr 20


yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 21


yptography
Breaking DES
• The Idea

 Finding a key given one pair (plain-text, cipher-text).

 Pre-processing + one day of work = recover the key.

 First example of a real problem solved using DNA.

June 2002 DNA Computers Applications: Cr 22


yptography
Breaking DES
• Massive parallel DNA computing approach:

• Generate all possible solutions in parallel

• Remove wrong solutions

June 2002 DNA Computers Applications: Cr 23


yptography
Breaking DES

 Representing binary strings

 Plan of DES attack


 Prepare the DNA solution
 Extract desired patterns
 Read the result

 Break DES!!!

June 2002 DNA Computers Applications: Cr 24


yptography
Breaking DES
• Summary of the experiment
 DES(M0,k) encoding plain-text with all possible 256 keys
 4 months
 Extract DES(M0,k)=E0, (plaintext, cipher-text)
 Read k
 1 day
DNAComputer:
DNA Computer:
DNAStrands
DNA Strands
++
Combinations
Combinations
==
“Solution”
“Solution”
June 2002 DNA Computers Applications: Cr 25
yptography
Outline
1. Introduction

2. Cryptography

3. DNA Computing

4. Breaking DES using a molecular computer

5. Conclusions

June 2002 DNA Computers Applications: Cr 26


yptography
Conclusions
 DNA computing with a concrete application,
Cryptography

 Very general attack on DES, using 64-bit key

 Cryptosystems with 64-bit key are insecure

 Future of molecular computers: Unclear

June 2002 DNA Computers Applications: Cr 27


yptography
Summary

 Cryptography

 DES

 DNA Computing >>> Parallelism

 Breaking DES

June 2002 DNA Computers Applications: Cr 28


yptography
http://www.ra.informatik.uni-stuttgart.de/~virazela/Seminar/Material/Presentation8/

June 2002 DNA Computers Applications: Cr 29


yptography

Anda mungkin juga menyukai