Complexity Analysis
Complexity Analysis
Abstract - DNA cryptography is a new and promising field in benefits from the huge randomness that DNA medium is
information security. It combines the classical solutions in offering; it uses publicly available genome databases in order
cryptography with the strength of the genetic material. In this to provide the OTP symmetric key. A variety of possible genes
work is evaluated an encryption algorithm that uses the genomic and chromosomes from different organisms are good materials
databases, where are stored the DNA sequences in digital form. for creation of random, non-repeating and for only one use
Genomic databases represent a feasible solution to the One-Time- pads.
Pad (OTP) symmetric key generation problem. Complexity of the
algorithm was evaluated by the theoretical analysis and practical Security level of the algorithm was analyzed using the
measurements of its execution time. Different techniques have following techniques: statistical measurements, some basic
been used to evaluate the security level of the algorithm such as cryptanalytic attacks, and analysis of the key space. Statistical
key space, cryptanalysis, and statistical measurements. measurements like histogram, correlation coefficient, and
entropy gives the knowledge about patterns in the analyzed
Keywords - DNA cryptography; one-time-pad; genomic information. The presence of patterns in the ciphertext gives
databases; symmetric encryption; security; complexity the opportunity for the attackers to define a rule by which they
can retrieve the information without using the key. Statistical
I. INTRODUCTION techniques are useful in case of a ciphertext-only attack, where
One of the newest directions in cryptography is the use of an attacker has the access to the ciphertext, but not to the key
genetics and biomolecular computation. Genetic material such or related plaintext. The major cryptanalytic attacks [6] can be
as DNA can be used as a vast storage space. This idea is classified in decreasing order of difficulty or increasing order
inspired from the fact that DNA is a natural carrier of of available information as follows: ciphertext-only attack,
information which is encoded by a 4-letter alphabet: A, C, G, known plaintext attack, chosen-plaintext or chosen-ciphertext
and T. This alphabet can be easily transposed into the binary attack, adaptive chosen-plaintext or chosen-ciphertext attack,
alphabet (A – 00, C – 01, G – 10, T - 11). Therefore DNA can related key attack. Kerckhoff's principle stipulates that the
be used as a storage media for any kind of information. The security of a cryptosystem need to lie only in the key. Thus the
property of hybridization between complementary DNA key space should be large enough making the brute force attack
nucleotides bases (A-T, C-G) is exploited in the biomolecular infeasible.
computing field as a central process of computations. It is a Computational complexity estimates the amount of
natural process that appears between complementary DNA resources required for solving a certain problem. In this work
strands of nucleotides and that’s why it is named a self- was performed a theoretical complexity analysis of the
assembling process. DNA computing started with Adleman’s algorithm. Obtained estimations where confirmed by the
research [1], while some basic directions of DNA cryptography measurements of the runtime from the implemented algorithm.
are described in [2]. The common notation for the complexity function is O(n),
Genomes sequencing and their appearance in the form of where n is the input parameter. Normally the execution time of
electronic databases was a big step for the growth in the an algorithm grows with the input size and this function can be:
genomic research domain [3]. The benefits of the digital logarithmic - O(log n), linear - O(n), quadratic - O(n2), cubic -
genomic databases can be extended also to the information O(n3), or exponential - O(2n). Logarithmic growth rate of the
security domain. For example, these databases can be used for runtime is the most optimal and the exponential time is
the practical application of the OTP encryption scheme. The preferably to avoid. On the other hand if the time needed for
OTP properties correspond to the characteristics of the breaking a cipher is exponential, then it is considered a secure
unbreakable encryption system defined by Claude Shannon as method of encryption [7].
follows: the key must be truly random, at least as large as the In section II is presented the principle of the algorithm,
plaintext, never reused in whole or part, and kept secret [4]. section III is about its time complexity with the theoretical and
In this work are analyzed security level and performances practical analysis results. The security level of the algorithm is
of a DNA-based encryption algorithm, presented in [5]. This discussed in section IV. Final conclusions and bibliography are
algorithm does not use the DNA biological medium, and still ending the paper.