DNA Computers Applications:
Cryptography
Constanza Lampasona
Innovative Computer Architectures and Concepts
Computer Architecture Department - University of Stuttgart
Motivation
• Silicon technologies have limits
• Research intends to deal with “silicon” disadvantages
• DNA computing -> inherent parallelism
• Cryptographic problem requires vast parallelism
Let’s solve the cryptographic problem using a molecular computer!!!
June 2002 DNA Computers Applications: Cr 2
yptography
Outline
1. Introduction
2. Cryptography
3. DNA Computing
4. Breaking DES using a molecular computer
5. Conclusions
June 2002 DNA Computers Applications: Cr 3
yptography
Introduction
Encoding data “as in nature”
Input Recombination Output
algorithm
June 2002 DNA Computers Applications: Cr 4
yptography
Introduction
Cryptography
Secret writing
Gjoejoh uif lfz Shift by one Finding the key
Data Encryptation Standard: approved cryptographic algorithm as
required by FIPS 140-1 (Federal Information Processing Standards)
June 2002 DNA Computers Applications: Cr 5
yptography
Outline
1. Introduction
2. Cryptography
3. DNA Computing
4. Breaking DES using a molecular computer
5. Conclusions
June 2002 DNA Computers Applications: Cr 6
yptography
Cryptography
From the Greek: crypto-, hidden + -graphy,
-graphy writing
“The art of writing with a secret key or in an enigmatic way”
Let’s look at history...
June 2002 DNA Computers Applications: Cr 7
yptography
Cryptography
Encryption
Protecting information
Data Transformation Unreadable form
Ensure privacy
Keep the information hidden
June 2002 DNA Computers Applications: Cr 8
yptography
Cryptography
Decryption
Reverse of Encryption
Encrypted data Transformation Intelligible form
June 2002 DNA Computers Applications: Cr 9
yptography
Cryptography
Encryption Decryption
Secret KEY
June 2002 DNA Computers Applications: Cr 10
yptography
Cryptography
Encrypted data (cipher-text): Khoor zruog
Secret KEY: shift by 3
a b c d e f g h i j k l m n o p q r s t u v w x y z
d e f g h i j k l m n o p q r s t u v w x y z a b c
Decrypted data (plain-text): Hello world
June 2002 DNA Computers Applications: Cr 11
yptography
Cryptography
Data Encryption Standard (DES)
• Crytographic algorithm (National Bureau of Standards).
• Enciphering and Deciphering.
Deciphering
• 64-bit key.
• Data depends on key’s security.
• Unique key for encryting and decryting.
June 2002 DNA Computers Applications: Cr 12
yptography
Cryptography
DES’ Data Encryption Algorithm
Enciphering
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1
June 2002 DNA Computers Applications: Cr 13
yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1
IP
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7
June 2002 DNA Computers Applications: Cr 14
yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1
• Uses the permuted input block as input.
• Produces a pre-output block.
• 16 iterations.
June 2002 DNA Computers Applications: Cr 15
yptography
Cryptography
Initial Inverse initial
Input Computation Output
permutation permutation
IP IP -1
IP-1
40 8 48 16 56 24 64 32
39 7 47 15 55 23 63 31
Plain-text
38 6 46 14 54 22 Cipher-text
62 30
37 5 45 13 53 21 61 29
36 4 44 12
Key 52 20 60 28
35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26
33 1 41 9 49 17 57 25
June 2002 DNA Computers Applications: Cr 16
yptography
Outline
1. Introduction
2. Cryptography
3. DNA Computing
4. Breaking DES using a molecular computer
5. Conclusions
June 2002 DNA Computers Applications: Cr 17
yptography
DNA Computing
DNA
DNA Genetic information “memory”
(Deoxyribonucleic acid)
Nucleotides strung into
polymer chains (DNA Strands)
Four classes of nucleotides:
Adenine, Guanine, Cytosine, Thymine (A,C,G,T)
June 2002 DNA Computers Applications: Cr 18
yptography
DNA Computing
• The Structure of DNA
The double helix structure discovered by Watson and Crick
June 2002 DNA Computers Applications: Cr 19
yptography
DNA Computing
DNA
DNA
Computer:
Computer:
• Based on Adleman’s work (1994) DNAStrands
Strands
DNA
• Solve huge problems by parallel search
++
• Much faster than a conventional computer Combinations
Combinations
• More hardware vs. more DNA
==
“Solution”
“Solution”
June 2002 DNA Computers Applications: Cr 20
yptography
Outline
1. Introduction
2. Cryptography
3. DNA Computing
4. Breaking DES using a molecular computer
5. Conclusions
June 2002 DNA Computers Applications: Cr 21
yptography
Breaking DES
• The Idea
Finding a key given one pair (plain-text, cipher-text).
Pre-processing + one day of work = recover the key.
First example of a real problem solved using DNA.
June 2002 DNA Computers Applications: Cr 22
yptography
Breaking DES
• Massive parallel DNA computing approach:
• Generate all possible solutions in parallel
• Remove wrong solutions
June 2002 DNA Computers Applications: Cr 23
yptography
Breaking DES
Representing binary strings
Plan of DES attack
Prepare the DNA solution
Extract desired patterns
Read the result
Break DES!!!
June 2002 DNA Computers Applications: Cr 24
yptography
Breaking DES
• Summary of the experiment
DES(M0,k) encoding plain-text with all possible 256 keys
4 months
Extract DES(M0,k)=E0, (plaintext, cipher-text)
Read k
1 day
DNAComputer:
DNA Computer:
DNAStrands
DNA Strands
++
Combinations
Combinations
==
“Solution”
“Solution”
June 2002 DNA Computers Applications: Cr 25
yptography
Outline
1. Introduction
2. Cryptography
3. DNA Computing
4. Breaking DES using a molecular computer
5. Conclusions
June 2002 DNA Computers Applications: Cr 26
yptography
Conclusions
DNA computing with a concrete application,
Cryptography
Very general attack on DES, using 64-bit key
Cryptosystems with 64-bit key are insecure
Future of molecular computers: Unclear
June 2002 DNA Computers Applications: Cr 27
yptography
Summary
Cryptography
DES
DNA Computing >>> Parallelism
Breaking DES
June 2002 DNA Computers Applications: Cr 28
yptography
http://www.ra.informatik.uni-stuttgart.de/~virazela/Seminar/Material/Presentation8/
June 2002 DNA Computers Applications: Cr 29
yptography