Cryptography is a vital component of digital communication and digital data in general. The use of cryptography is necessary to support the veracity of data and to protect it from outside parties with malicious intent. Cryptography focuses on two main facets that are vital for this goal: data encryption and user authentication. Encryption protects the data by transforming it into an encrypted text that would not allow someone access without having or breaking the encryption method that was used to make it. User authentication is a multiple part process that allows for one to be able to identify oneself to prove they were the actual sender of a message.
As the processes used for encryption have developed throughout the years, cryptologists have mainly focused on employing the use of ciphers, a character-by-character transformation of data, for high security encryption. For ciphers to work, one requires to possess the encryption key for encryption and a corresponding decryption key for decryption. The work presented in this dissertation focuses on the derivation of these keys through multiple biochemical and chemical methodologies combined with multiple types of cryptographical cipher systems.
The requirements for a key through this process are that it needs to be reproducible, but also variable for subsequent keys. For general message encryption, both the encryption and decryption keys are the exact same, as a symmetrical-key cipher system, which requires the results of the experiments performed to be reproducible. Since both the sender and the receiver will be performing the same experiment, the reproducibility of the results is paramount. For these ciphers, a rule is that you do not want to use a key more than once for any subsequent message and to use novel keys for the highest level of security as it is easier to break the cipher if a key is used multiple times 1–3. To this end, it is important that the key derivation methodology is variable for subsequent experiments to produce novel keys each time by changing the chosen parameters.
Currently, the procedure used for the derivation of keys involves a random number generators (RNGs) or the message sender’s own parameters. However, there are many issues with random number generators with encryption and with their function in general 4–7. The research here presents a worthwhile alternative to these RNGs by utilizing biochemical and chemical methodologies as the source for cryptographic keys. In this research, one chemical method is presented in addition to three biochemical methods for various cryptographic ciphers. The biochemical methods involve bioaffinity-based assays with colorimetric responses to produce a signal. The chemical method relies on electrochemical methods to produce data. Three of the methods presented in this dissertation utilize symmetrical-key ciphers, which purely focus on data encryption. For these, a basic addition/subtraction-based cipher is used for the first, and all subsequent experimentation relies on the cipher used as the current standard for encryption today. The final method relies on the use of biomarkers in sweat to produce keys for asymmetrical-key cryptography, which can perform both data encryption and user authentication functions.
|Commitee:||Feldblyum, Jeremy, Royzen, Maksim , Sheng, Jia|
|School:||State University of New York at Albany|
|School Location:||United States -- New York|
|Source:||DAI-A 82/6(E), Dissertation Abstracts International|
|Subjects:||Biochemistry, Analytical chemistry, Translation studies, Information Technology, Technical Communication, Computer Engineering|
|Keywords:||Bioaffinity-based assay, Biometrics, Biosensor, Cipher, Cryptography, Encryption|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be