Q
Problem solve Get help with specific problems with your technologies, process and projects.

# How does DNA cryptography relate to company information security?

## What is DNA cryptography, and would it be an effective method for us in enterprise information security? IAM expert Randall Gamby discusses how DNA cryptography works and how to use it.

I've been hearing recently about something called DNA cryptography. What is it, and how does it relate to information...

security?

DNA cryptography may not be what you think it is: It's not the process of creating a bunch of Johnny Mnemonics with stored secrets in their heads. Instead, DNA cryptography is the use of DNA nucleotides (denoted by the letters C, G, A and T) to form encoded micro messages for transmitting secrets. It goes something like this:

• Create the encoding rule using DNA components. Nucleotides are used as quaternary code, and each letter of the alphabet is denoted by three nucleotides. For example, the letter A could be denoted by the nucleotide string AGC, the letter B by ACC, etc.

• Synthesize the secret-message DNA. The secret message is encoded into a DNA sequence according to the code above. For instance, AB would be encoded as AGCACC. After coding, a synthesized secret message DNA oligodeoxynucleotide is created containing an encoded message 69 nucleotides long (denoting 23 alpha characters), flanked by forward and reverse PCR primers, each 20 nucleotides long.

• Hide the message. The DNA message is physically made to look like human DNA by adding roughly 50 to 150 nucleotide pairs to it, making it average size. The secret-message DNA and concealing DNA are mixed and attached on a piece of paper using common adhesive to form colorless microdots. Then the paper containing microdots can be posted by general mail service.

• Read the message. The shared secrets containing the primers and encoding rules are sent to the sender and the receiver. After the receiver gets the paper with the DNA, he or she can easily find the microdots. Since the intended receiver should have gotten the primers and encoding rules through some other out-of-band method (telephone, email, fax, etc.), he or she can amplify the secret-message DNA microdots, sequence them and retrieve the message (plain-text) according to the encoding rule.

As you can imagine, this requires some sophisticated equipment to use DNA nucleotides as transmission packets, but you have to admit, you certainly wouldn't be looking for scrambled DNA on a paper. Secure? Yes. Does it have practical application for a company information security policy? No.

This was last published in July 2010

#### Join the conversation

Send me notifications when other members comment.
Interesting. I remember hearing about the technology back in the `80s based on technology being investigated by DARPA.... the early devlopers of the internet...
Cancel
Yeah, ThunderB1, a lot of what we're doing today seems to have stemmed from that early work. Personally this form of cryptography is a little creepy, and it's hard to see application to the enterprise.
Cancel

## SearchCloudSecurity

• ### Benefits of cloud data discovery tools and services multiply

With multi-cloud and privacy regulations becoming the new normal, infosec teams need data discovery tools and services to keep up...

• ### Google Cloud security gets boost with Secret Manager

Google Cloud's new Secret Manager service augments its cloud security capabilities with an eye toward the needs of DevOps teams.

• ### Microsoft misconfiguration exposed 250M customer service records

Microsoft exposed 250 million customer support records on five Elasticsearch servers that had misconfigured Azure security rules,...

## SearchNetworking

The Arista-Big Switch deal adds significant software-defined networking technology to Arista's EOS operating system. Also, Arista...

• ### Watch for these 6 wireless networking trends in 2020

No doubt you've heard about 5G and Wi-Fi 6. But don't forget other wireless trends emerging in 2020, such as CBRS, dynamic ...

• ### Latest Cisco earnings show tech buyers remain skittish

The latest Cisco earnings report shows customers paused tech spending despite a stabler global economy, while the impact of the ...

## SearchCIO

• ### 8 ways CIOs can use technology in meetings

Meetings can be frustrating, as they often lead to scheduling and technical complications -- but today, enterprises are utilizing...

• ### CIO succession planning: The transition of power

Succession planning for CIOs is a must. Why do organizations still fail to do an effective job with this task today?

• ### Why cloud migration failures happen and how to prevent them

Companies are moving more applications than ever to the cloud, but many of these initiatives fail. Learn how to avoid making your...

## SearchEnterpriseDesktop

• ### BlackBerry enters digital workspace market

BlackBerry's digital workspace offering is meant to strike a balance between connectivity, productivity and security, especially ...

• ### How to perform a Windows Subsystem for Linux install

Want to run Linux on a Windows desktop? Take these steps to perform a Windows Subsystem for Linux install, which includes ...

• ### What IT needs to know about Chrome extension security issues

Google Chrome extensions can improve user experience, but they could access a lot of user data. Admins should take control over ...

## SearchCloudComputing

Google Cloud has added more features to its single-tenant cloud deployment option, such as live migration for Windows BYOL ...

• ### Use these CloudWatch features to improve AWS app monitoring

Amazon CloudWatch ServiceLens, Synthetics and Contributor Insights give users more ways to monitor their AWS applications. Find ...

• ### Oracle-Microsoft partnership to connect clouds expands to EU

Oracle and Microsoft have added to their cloud interconnect strategy with the addition of a high-speed, private connection ...

## ComputerWeekly.com

• ### Huawei rejects racketeering and theft claims from US Department of Justice

Ongoing spat between US and China intensifies after US Department of Justice accuses Huawei of racketeering and intellectual ...

• ### CSPs trail business customers in 5G ambition

Survey claims to show lack of determination driving disconnect between communications service providers and business customers, ...

• ### Smart use of data takes Dutch railways further

De Nederlandse Spoorwegen (Dutch Railways), ensures, among other things, that 1.2 million train passengers arrive at their ...

Close