Q
Problem solve Get help with specific problems with your technologies, process and projects.

# How does DNA cryptography relate to company information security?

## What is DNA cryptography, and would it be an effective method for us in enterprise information security? IAM expert Randall Gamby discusses how DNA cryptography works and how to use it.

I've been hearing recently about something called DNA cryptography. What is it, and how does it relate to information...

security?

DNA cryptography may not be what you think it is: It's not the process of creating a bunch of Johnny Mnemonics with stored secrets in their heads. Instead, DNA cryptography is the use of DNA nucleotides (denoted by the letters C, G, A and T) to form encoded micro messages for transmitting secrets. It goes something like this:

• Create the encoding rule using DNA components. Nucleotides are used as quaternary code, and each letter of the alphabet is denoted by three nucleotides. For example, the letter A could be denoted by the nucleotide string AGC, the letter B by ACC, etc.

• Synthesize the secret-message DNA. The secret message is encoded into a DNA sequence according to the code above. For instance, AB would be encoded as AGCACC. After coding, a synthesized secret message DNA oligodeoxynucleotide is created containing an encoded message 69 nucleotides long (denoting 23 alpha characters), flanked by forward and reverse PCR primers, each 20 nucleotides long.

• Hide the message. The DNA message is physically made to look like human DNA by adding roughly 50 to 150 nucleotide pairs to it, making it average size. The secret-message DNA and concealing DNA are mixed and attached on a piece of paper using common adhesive to form colorless microdots. Then the paper containing microdots can be posted by general mail service.

• Read the message. The shared secrets containing the primers and encoding rules are sent to the sender and the receiver. After the receiver gets the paper with the DNA, he or she can easily find the microdots. Since the intended receiver should have gotten the primers and encoding rules through some other out-of-band method (telephone, email, fax, etc.), he or she can amplify the secret-message DNA microdots, sequence them and retrieve the message (plain-text) according to the encoding rule.

As you can imagine, this requires some sophisticated equipment to use DNA nucleotides as transmission packets, but you have to admit, you certainly wouldn't be looking for scrambled DNA on a paper. Secure? Yes. Does it have practical application for a company information security policy? No.

This was last published in July 2010

#### Join the conversation

Send me notifications when other members comment.
Interesting. I remember hearing about the technology back in the `80s based on technology being investigated by DARPA.... the early devlopers of the internet...
Cancel
Yeah, ThunderB1, a lot of what we're doing today seems to have stemmed from that early work. Personally this form of cryptography is a little creepy, and it's hard to see application to the enterprise.
Cancel

## SearchCloudSecurity

• ### Defining and evaluating SOC as a service

As cloud use increases, many enterprises outsource some security operations center functions. Evaluate if SOCaaS is the best ...

• ### Get to know the elements of Secure Access Service Edge

Cloud services use cases continue to expand, but implementation challenges remain. Discover Secure Access Service Edge, or SASE, ...

• ### Boost security with a multi-cloud workload placement process

IT must incorporate a multi-cloud workload placement process into its multi-cloud strategy in order to maintain or improve cloud ...

## SearchNetworking

• ### U-turn in network market forecast amid coronavirus pandemic

IDC predicts the global market for switches and wireless LAN products will fall in 2020, with revenues from switches below last ...

• ### 802.3cg standard extends single-pair Ethernet range and speed

IEEE 802.3cg is a single-pair Ethernet standard that aims to support speeds up to 10 Mbps, extend Ethernet range up to 1,000 ...

• ### 4 lasting effects of growing remote workforces on networks

In this roundup of network blogs, explore expert advice on increasing remote workers' efficiency, potential lasting effects of ...

## SearchCIO

• ### Successful digital ecosystems depend on cloud services

Business models are changing in the digital age, requiring companies to create sometimes unexpected partnerships, enabled by the ...

• ### Contract risk management: Focus on these 6 areas

Inspecting vendor contracts for risk is increasingly important as CIOs scramble to stay nimble in a volatile economy. ClearEdge ...

• ### How to write an RFP and statement of work for an IT services contract

Master how to write an RFP and statement of work to get the IT services you need using these best practices from consulting firm ...

## SearchEnterpriseDesktop

• ### 3 Mac remote management software options for enterprise use

IT pros may be forced to manage remote macOS desktops, so they should understand the options they have for remote desktop ...

• ### COVID-19 sparks software licensing issues with remote users

Organizations face a range of issues with the spread of COVID-19, including how to support a newly remote workforce. Learn how to...

• ### How zero-trust authentication and architecture have evolved

Zero-trust architecture has spread across the enterprise security software market, so IT pros should understand the latest ...

## SearchCloudComputing

• ### 7 Google Cloud database options to free up your IT team

Moving data to a cloud database is an effective way to optimize cost and performance for applications. Review seven of Google's ...

• ### Microsoft Azure capacity woes don't signal the worst

Microsoft Azure experienced capacity issues in Europe, with some users unable to spin up VMs. The company is taking 'proactive ...

• ### 4 hybrid cloud use cases that can help enterprises

A hybrid cloud can be more trouble than it's worth, but that doesn't mean your IT team shouldn't consider it. Learn about the ...

## ComputerWeekly.com

• ### How subpostmasters made legal history with biggest referral of potential miscarriages of justice

Subpostmasters seeking redress of prosecutions at the hands of an IT system force the biggest ever UK referral of cases of ...

• ### Coronavirus: Smartphone production to plummet 20%, over \$25bn lost in roaming revenue

Two studies reveal the huge hit on the mobile device and service industry that is likely to be caused by the Covid-19 outbreak

• ### IR35 reforms: Chancellor slammed for dig at self-employed tax habits during coronavirus briefing

Rishi Sunak under fire for making a veiled reference to self-employed people needing to pay their “fair share of tax” during the ...

Close