• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于生物亲和相互作用的对称密钥加密

Symmetric-Key Encryption Based on Bioaffinity Interactions.

作者信息

McGoldrick Leif K, Weiss Elizabeth A, Halámek Jan

机构信息

Department of Chemistry , University at Albany, State University of New York , 1400 Washington Avenue , Albany , New York 12222 , United States.

出版信息

ACS Synth Biol. 2019 Jul 19;8(7):1655-1662. doi: 10.1021/acssynbio.9b00164. Epub 2019 Jul 9.

DOI:10.1021/acssynbio.9b00164
PMID:31287664
Abstract

The research presented here shows a bridge between biochemistry and cryptography. Enzyme-based assays were used in a new methodology linked to ciphers and cipher systems. Three separate enzyme assays, alkaline phosphatase (ALP) (E.C. 3.1.3.1), lysozyme (E.C. 3.2.1.17), and horseradish peroxidase (HRP) (E.C. 1.11.1.7), were used to create a cipher key in order to encrypt a message. By choosing certain parameters for one's experiment that are performed in the same way as a person receiving the message, correct encryption and decryption keys would be produced, resulting in a correct encryption and decryption of a message. It is imperative that both parties perform the same experiment under the same conditions in order to correctly interpret the message. Bioaffinity-based assays, in particular enzymatic assays, provide a specific, yet flexible mechanism to use for the encryption of messages. Because of the nature of this process there are a multitude of sets of parameters that may be chosen, each of which would result in a different key being produced, heightening the security and the robustness of the method. This paper shows that by using this concept of forming encryption keys using a bioaffinity-based approach, one is able to properly encrypt and decrypt a message, which could be viable for other biochemically based techniques.

摘要

此处展示的研究成果搭建了一座生物化学与密码学之间的桥梁。基于酶的分析方法被应用于一种与密码和密码系统相关的新方法中。三种独立的酶分析方法,即碱性磷酸酶(ALP)(酶学委员会编号3.1.3.1)、溶菌酶(酶学委员会编号3.2.1.17)和辣根过氧化物酶(HRP)(酶学委员会编号1.11.1.7),被用于生成一个密码密钥以加密一条信息。通过为某人的实验选择某些参数,这些参数的设置方式与接收信息的人相同,就能生成正确的加密和解密密钥,从而实现对信息的正确加密和解密。双方必须在相同条件下进行相同的实验,以便正确解读信息。基于生物亲和力的分析方法,尤其是酶分析方法,为信息加密提供了一种特定且灵活的机制。由于这个过程的性质,可以选择众多组参数,每组参数都会产生不同的密钥,从而提高了该方法的安全性和稳健性。本文表明,通过使用这种基于生物亲和力的方法来形成加密密钥的概念,能够对信息进行正确的加密和解密,这对于其他基于生物化学的技术可能是可行的。

相似文献

1
Symmetric-Key Encryption Based on Bioaffinity Interactions.基于生物亲和相互作用的对称密钥加密
ACS Synth Biol. 2019 Jul 19;8(7):1655-1662. doi: 10.1021/acssynbio.9b00164. Epub 2019 Jul 9.
2
BRISK: Dynamic Encryption Based Cipher for Long Term Security.BRISK:基于动态加密的长期安全密码。
Sensors (Basel). 2021 Aug 26;21(17):5744. doi: 10.3390/s21175744.
3
Analytical Study of Hybrid Techniques for Image Encryption and Decryption.图像加密与解密混合技术的分析研究
Sensors (Basel). 2020 Sep 10;20(18):5162. doi: 10.3390/s20185162.
4
A Novel Cipher-Based Data Encryption with Galois Field Theory.基于伽罗华域理论的新型密码数据加密。
Sensors (Basel). 2023 Mar 20;23(6):3287. doi: 10.3390/s23063287.
5
A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.基于符合型 Chebyshev 混沌映射的面向以人为中心的物联网环境的 PKC 的可证明安全 IBE 转换模型。
Sensors (Basel). 2021 Oct 30;21(21):7227. doi: 10.3390/s21217227.
6
Optical stream-cipher-like system for image encryption based on Michelson interferometer.基于迈克尔逊干涉仪的类光流密码图像加密系统。
Opt Express. 2011 Jan 31;19(3):2634-42. doi: 10.1364/OE.19.002634.
7
An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).一种具有个性化消息的基于身份的广播加密方案(BEPM)。
PLoS One. 2015 Dec 2;10(12):e0143975. doi: 10.1371/journal.pone.0143975. eCollection 2015.
8
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding.一种基于SHA-256和DNA编码的多医学图像加密方法。
Entropy (Basel). 2023 Jun 3;25(6):898. doi: 10.3390/e25060898.
9
One-time-pad cipher algorithm based on confusion mapping and DNA storage technology.基于混淆映射和 DNA 存储技术的一次一密密码算法。
PLoS One. 2021 Jan 20;16(1):e0245506. doi: 10.1371/journal.pone.0245506. eCollection 2021.
10
DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.DNA 密码术与基于 NW 算法的遗传算法和深度学习的密钥生成。
J Med Syst. 2017 Dec 5;42(1):17. doi: 10.1007/s10916-017-0851-z.

引用本文的文献

1
Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements.利用源自免疫亲和相互作用的加密密钥作为潜在安全增强的基础。
ACS Omega. 2025 Feb 3;10(6):6119-6123. doi: 10.1021/acsomega.4c10568. eCollection 2025 Feb 18.
2
Encrypting messages with artificial bacterial receptors.利用人工细菌受体加密信息。
Beilstein J Org Chem. 2020 Nov 12;16:2749-2756. doi: 10.3762/bjoc.16.225. eCollection 2020.
3
Recent Advances in Noninvasive Biosensors for Forensics, Biometrics, and Cybersecurity.
近年来非侵入式生物传感器在法庭科学、生物识别和网络安全领域的新进展。
Sensors (Basel). 2020 Oct 22;20(21):5974. doi: 10.3390/s20215974.