Cargando…

A covert authentication and security solution for GMOs

BACKGROUND: Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In...

Descripción completa

Detalles Bibliográficos
Autores principales: Mueller, Siguna, Jafari, Farhad, Roth, Don
Formato: Online Artículo Texto
Lenguaje:English
Publicado: BioMed Central 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5031278/
https://www.ncbi.nlm.nih.gov/pubmed/27653779
http://dx.doi.org/10.1186/s12859-016-1256-6
_version_ 1782454778033340416
author Mueller, Siguna
Jafari, Farhad
Roth, Don
author_facet Mueller, Siguna
Jafari, Farhad
Roth, Don
author_sort Mueller, Siguna
collection PubMed
description BACKGROUND: Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. RESULTS: Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. CONCLUSIONS: This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.
format Online
Article
Text
id pubmed-5031278
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher BioMed Central
record_format MEDLINE/PubMed
spelling pubmed-50312782016-09-29 A covert authentication and security solution for GMOs Mueller, Siguna Jafari, Farhad Roth, Don BMC Bioinformatics Research Article BACKGROUND: Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. RESULTS: Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. CONCLUSIONS: This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information. BioMed Central 2016-09-21 /pmc/articles/PMC5031278/ /pubmed/27653779 http://dx.doi.org/10.1186/s12859-016-1256-6 Text en © The Author(s) 2016 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver(http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
spellingShingle Research Article
Mueller, Siguna
Jafari, Farhad
Roth, Don
A covert authentication and security solution for GMOs
title A covert authentication and security solution for GMOs
title_full A covert authentication and security solution for GMOs
title_fullStr A covert authentication and security solution for GMOs
title_full_unstemmed A covert authentication and security solution for GMOs
title_short A covert authentication and security solution for GMOs
title_sort covert authentication and security solution for gmos
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5031278/
https://www.ncbi.nlm.nih.gov/pubmed/27653779
http://dx.doi.org/10.1186/s12859-016-1256-6
work_keys_str_mv AT muellersiguna acovertauthenticationandsecuritysolutionforgmos
AT jafarifarhad acovertauthenticationandsecuritysolutionforgmos
AT rothdon acovertauthenticationandsecuritysolutionforgmos
AT muellersiguna covertauthenticationandsecuritysolutionforgmos
AT jafarifarhad covertauthenticationandsecuritysolutionforgmos
AT rothdon covertauthenticationandsecuritysolutionforgmos