DNA-based Cryptography for Internet of Things Security: Concepts, Methods, Applications, and Emerging Trends
DOI:
https://doi.org/10.12928/biste.v7i2.12942Keywords:
DNA-based Cryptography, DNA-based Cryptographic Methods, DNA-based Security, Internet of Things (IoT), IoT Device SecurityAbstract
DNA-based cryptography is an emerging field that combines molecular biology and computational security to develop novel encryption, secure data storage, and steganographic techniques. It offers a promising alternative to traditional cryptographic systems, addressing challenges like storage efficiency, robustness, and resistance to computational attacks. In the era of the Internet of Things (IoT), where massive networks of interconnected devices continuously generate and exchange sensitive data, ensuring secure communication and storage has become a critical challenge. DNA-based cryptography presents a unique opportunity to enhance IoT security by offering ultra-secure encryption methods that exploit DNA’s vast information density and inherent randomness. These encryption methods leverage the complexity of DNA encoding - such as nucleotide substitution, DNA strand pairing, and biological operations like splicing and amplification - to create security layers that are difficult to decipher using conventional computational techniques. Recent advancements in DNA synthesis, sequencing, and encoding methodologies have facilitated the development of encryption schemes tailored for IoT applications, enabling lightweight, high-capacity security solutions that outperform traditional cryptographic methods. Beyond IoT, DNA-based cryptography also holds potential in areas such as secure biomedical data storage, digital rights management, and archival of sensitive governmental or historical information, demonstrating its broader applicability across diverse domains. Future research should optimize DNA encoding, improve storage technologies, and harness artificial intelligence for real-time threat detection, automated encryption, and adaptive security in IoT systems. This review analyzes DNA-based cryptographic methods, including natural and pseudo-DNA encryption, DNA-based steganography, and hybrid models, while uniquely exploring their IoT applications, emerging trends, practical implementations, key advantages, challenges, and future research directions.
References
R. J. Murali, B. S. S. S K., and S. S. O. N. N. Raj, "An extensive examination of cyber attacks and cyber security, encompassing recent advancements and emerging trends," 2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), pp. 1-5, 2024, https://doi.org/10.1109/ICONSTEM60960.2024.10568588.
Y. Li and Q. Liu, "A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments," Energy Reports, vol. 7, pp. 8176–8186, 2021, https://doi.org/10.1016/j.egyr.2021.08.126.
Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions," Electronics, vol. 12, no. 6, p. 1333, 2023, https://doi.org/10.3390/electronics12061333.
I. Agrafiotis, J. R. C. Nurse, M. Goldsmith, S. Creese, and D. Upton, "A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate," Journal of Cybersecurity, vol. 4, no. 1, p. tyy006, 2018, https://doi.org/10.1093/cybsec/tyy006.
A. Brezavšček and A. Baggia, "Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review," Systems, vol. 13, no. 1, p. 52, 2025, https://doi.org/10.3390/systems13010052.
S. Walton, P. R. Wheeler, Y. I. Zhang, and X. R. Zhao, "An integrative review and analysis of cybersecurity research: current state and future directions," Journal of Information Systems, vol. 35, no. 1, pp. 155–186, 2021, https://doi.org/10.2308/ISYS-19-033.
S. M. Alhidaifi, M. R. Asghar, and I. S. Ansar, "A survey on cyber resilience: key strategies, research challenges, and future directions," ACM Computing Surveys, vol. 56, no. 8, pp. 1-48, 2024, https://doi.org/10.1145/3649218.
J. Kaur and K. R. Ramkumar, "The recent trends in cyber security: a review," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 8, pp. 5766-5781, 2022, https://doi.org/10.1016/j.jksuci.2021.01.018.
S. Y. Diaba, M. Shafie-khah, and M. Elmusrati, "Cyber-physical attack and the future energy systems: a review," Energy Reports, vol. 12, pp. 2914-2932, 2024, https://doi.org/10.1016/j.egyr.2024.08.060.
Ş. Ţălu, "Strategic measures in improving cybersecurity management in micro and small enterprises," In: Advances in Economics, Business and Management Research (AEBMR), vol. 156, pp. 522-528, 2020, https://doi.org/10.2991/aebmr.k.201205.087.
M. Ţălu, "A Review of vulnerability discovery in WebAssembly binaries: insights from static, dynamic, and hybrid analysis," Acta Technica Corviniensis – Bulletin of Engineering, Hunedoara, Romania, Tome XVII, Fascicule 4, pp. 13-22, 2024, https://www.proquest.com/scholarly-journals/review-vulnerability-discovery-webassembly/docview/3160113809/se-2.
M. Kim, H. Jang and Y. Shin, "Avengers, Assemble! Survey of WebAssembly Security Solutions," 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), Barcelona, Spain, 2022, pp. 543-553, 2022, https://doi.org/10.1109/CLOUD55607.2022.00077.
M. Ţălu, "A comparative study of WebAssembly runtimes: performance metrics, integration challenges, application domains, and security features," Archives of Advanced Engineering Science, 2025, https://doi.org/10.47852/bonviewAAES52024965.
J. Cao, D. Ding, J. Liu, E. Tian, S. Hu, X. Xie, "Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks," Inf. Sci., vol. 548, pp. 69–84, 2021, https://doi.org/10.1016/j.ins.2020.09.046.
I. H. Sarker, "CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks," Internet Things, vol. 14, p. 100393, 2021, https://doi.org/10.1016/j.iot.2021.100393.
S. G. Bhol, J. R. Mohanty, and P. K. Pattnaik, "Taxonomy of cybersecurity metrics to measure strength of cybersecurity," Mater. Today Proc., vol. 80, no. 3, pp. 2274–2279, 2023, https://doi.org/10.1016/j.matpr.2021.06.228.
R. S. Goswami, K. C. Swarnendu, and T. B. Chandan, "A study to examine the superiority of CSAVK, AVK over conventional encryption with a single key," Int. J. Sec. Appl., vol. 10, no. 2, pp. 279–286, 2016, http://dx.doi.org/10.14257/ijsia.2016.10.2.25.
Ș. Țălu and V.A. Plotnikov, "Mobile module for ensuring the security of the identification and accumulation of data of visitors to an educational institution," Digital Models and Solutions, vol. 3, no. 1, pp. 1-10, 2022, https://doi.org/10.29141/2782-4934-2022-1-3-8.
O. H. A. Kamel, A. T. N. El-Din Raslan, T. Aly, and M. Gheith, "Quantum Computing's Impact on Data Encryption: Methodologies, Implementation, and Future Directions: Exploring the BB84 Protocol and Comparative Analysis with Classical Cryptographic Techniques," 2024 Intelligent Methods, Systems, and Applications (IMSA), pp. 213-217, 2024, https://doi.org/10.1109/IMSA61967.2024.10652653.
P. Jojan, K. K. Soni, and A. Rasool, "Classical and Quantum based Differential Cryptanalysis Methods," 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1-7, 2021, https://doi.org/10.1109/ICCCNT51525.2021.9579513.
Durr-E-Shahwar, M. Imran, A. B. Altamimi, W. Khan, S. Hussain, and M. Alsaffar, "Quantum cryptography for future networks security: a systematic review," IEEE Access, vol. 12, pp. 180048-180078, 2024, https://doi.org/10.1109/ACCESS.2024.3504815.
A. Ambainis, A. Rosmanis, and D. Unruh, "Quantum attacks on classical proof systems: The hardness of quantum rewinding," IEEE, pp. 474–483, 2014, https://doi.org/10.1109/FOCS.2014.57.
V. Vasani, K. Prateek, R. Amin, S. Maity, and A. D. Dwivedi, "Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions," Journal of Industrial Information Integration, vol. 39, p. 100594, 2024, https://doi.org/10.1016/j.jii.2024.100594.
A. Jenefa, F. T. Josh, A. Taurshia, K. R. Kumar, S. Kowsega, and E. Naveen, "PQC Secure: Strategies for Defending Against Quantum Threats," 2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS), pp. 1799-1804, 2023, https://doi.org/10.1109/ICACRS58579.2023.10404525.
A. D. Nazarov, D. M. Nazarov, and Ş. Ţălu, "Information Security of the Internet of Things," Proceedings of the International Scientific and Practical Conference on Computer and Information Security - INFSEC, SCITEPRESS – Science and Technology Publications, Lda, vol. 1, pp. 136-139, 2021, https://doi.org/10.5220/0010619900003170.
M. Ţălu, "Security and privacy in the IIoT: threats, possible security countermeasures, and future challenges," Computing & AI Connect, vol. 2, article ID: 2025.0011, pp. 1–12, 2025, https://doi.org/10.69709/CAIC.2025.139199.
M. Ţălu, "Exploring IoT Applications for Transforming University Education: Smart Classrooms, Student Engagement, and Innovations in Teacher and Student-focused Technologies: Integration of the smart management system in a university using the IoT," Buletin Ilmiah Sarjana Teknik Elektro, vol. 7, no. 1, pp. 09–29, 2025, https://doi.org/10.12928/biste.v7i1.12361.
R. Dallaev, T. Pisarenko, Ş. Ţălu, D. Sobola, J. Majzner, N. Papež, "Current applications and challenges of the Internet of Things," New Trends In Computer Sciences, vol. 1, no. 1, pp. 51-61, 2023, https://doi.org/10.3846/ntcs.2023.17891.
S. P. Kumar, V. P. Yanambaka, and A. Abdelgawad, "Internet of Things: security and solutions survey," Sensors, vol. 22, no. 19, article 7433, 2022. https://doi.org/10.3390/s22197433.
H. Tran-Dang, N. Krommenacker, P. Charpentier, D.S. Kim, "Toward the Internet of Things for physical internet: perspectives and challenges," IEEE Internet Things J., vol. 7, pp. 4711–4736, 2020, https://doi.org/10.1109/JIOT.2020.2971736.
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, "Internet of Things: a survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015, https://doi.org/10.1109/COMST.2015.2444095.
N. Mishra and S. Pandya, "Internet of Things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review," IEEE Access, vol. 9, pp. 59353–59377, 2021, https://doi.org/10.1109/ACCESS.2021.3073408.
A. Khobzaoui, K. Benyahia, and S. Boukli-Hacene, "DNA-Based Cryptographic Method for the Internet of Things," International Journal of Organizational and Collective Intelligence, vol. 12, no. 1, pp. 1-12, 2022. https://doi.org/10.4018/IJOCI.2022010101.
M. M. Elamir, M. S. Mabrouk, and S. Y. Marzouk, "Secure framework for IoT technology based on RSA and DNA cryptography," Egypt J Med Hum Genet, vol. 23, p. 116, 2022. https://doi.org/10.1186/s43042-022-00326-5.
B. Al-Shargabi and M. A. F. Al-Husainy, "A New DNA Based Encryption Algorithm for Internet of Things," in Innovative Systems for Intelligent Health Informatics IRICT 2020, Lecture Notes on Data Engineering and Communications Technologies, vol. 72, 2021, https://doi.org/10.1007/978-3-030-70713-2_71.
M. Bansal, S. Gupta, and S. Mathur, "Comparison of ECC and RSA Algorithm with DNA Encoding for IoT Security," 2021 6th International Conference on Inventive Computation Technologies (ICICT), pp. 1340-1343, 2021, https://doi.org/10.1109/ICICT50816.2021.9358591.
B. Al-Shargabi and A. D. Assi, "An Improved DNA based Encryption Algorithm for Internet of Things Devices," 2022 International Conference on Engineering & MIS (ICEMIS), pp. 1-5, 2022, https://doi.org/10.1109/ICEMIS56295.2022.9914290.
S. Ali and F. Anwer, "An IoT-Enabled Cloud Computing Model for Authentication and Data Confidentiality using Lightweight Cryptography," Arab J Sci Eng, 2025, https://doi.org/10.1007/s13369-025-09983-1.
S. Namasudra, "A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure," Computers and Electrical Engineering, vol. 104, Part A, p. 108426, 2022, https://doi.org/10.1016/j.compeleceng.2022.108426.
R. Ettiyan and V. Geetha, "A hybrid logistic DNA-based encryption system for securing the Internet of Things patient monitoring systems," Healthcare Analytics, vol. 3, p. 100149, 2023, https://doi.org/10.1016/j.health.2023.100149.
S. Ali and F. Anwer, "DNA-Based Elliptic Curve Cryptography for Data Security in IoT," in Advanced Network Technologies and Intelligent Computing, ANTIC 2023, vol. 2090, 2024, https://doi.org/10.1007/978-3-031-64076-6_25.
S. Rubinstein-Salzedo. Cryptography. Springer Cham. 2018. https://doi.org/10.1007/978-3-319-94818-8.
C. Bauer, Secret History: The Story of Cryptology. 1st ed., CRC Press Taylor & Francis. 2021. https://doi.org/10.1201/9781315162539.
K. Gjøsteen. Practical Mathematical Cryptography. 1st ed., CRC Press Taylor & Francis. 2023. https://doi.org/10.1201/9781003149422-1.
A. Khobzaoui, K. Benyahia, B. Mansouri, and S. B. Hacene, "DNA-based cryptographic method for the Internet of Things," International Journal of Organizational and Collective Intelligence, vol. 12, no. 1, pp. 1-12, 2022. https://doi.org/10.4018/IJOCI.2022010101.
M. Borda and O. Tornea, "DNA secret writing techniques," 2010 8th International Conference on Communications, pp. 451-456, 2010, https://doi.org/10.1109/ICCOMM.2010.5509086.
S. Aqeel, S. U. Khan, A. S. Khan, M. Alharbi, S. Shah, M. E. Affendi, and N. Ahmad, "DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets," Scientific Reports, vol. 14, p. 13839, 2024, https://doi.org/10.1038/s41598-024-64419-4.
M. Mondal and K. S. Ray, "Review on DNA cryptography," International Journal of Bioinformatics and Intelligent Computing, vol. 2, no. 1, pp. 44-72, 2023, https://doi.org/10.61797/ijbic.v2i1.198.
T. Mahjabin, A. Olteanu, Y. Xiao, W. Han, T. Li, and W. Sun, "A survey on DNA-based cryptography and steganography," IEEE Access, vol. 11, pp. 116423-116451, 2023, https://doi.org/10.1109/ACCESS.2023.3324875.
D. Chakraborty, B. Bhowmik, S. Bhowmik, and P. Debbarma, "A robust hybrid cryptosystem based on DNA steganography," 2023 8th International Conference on Communication and Electronics Systems (ICCES), pp. 545-550, 2023, https://doi.org/10.1109/ICCES57224.2023.10192760.
W. A. Bhat, “Bridging data-capacity gap in big data storage,” Future Generation Computer Systems, vol. 87, pp. 538-548, 2018, https://doi.org/10.1016/j.future.2017.12.066.
Y. Dong, F. Sun, Z. Ping, Q. Ouyang, and L. Qian, "DNA storage: research landscape and future prospects," National Science Review, vol. 7, pp. 1092–1107, 2020, https://doi.org/10.1093/nsr/nwaa007.
L. M. Adleman, "Molecular computation of solutions to combinatorial problems," Science, vol. 266, no. 5187, pp. 1021-1024, 1994, https://doi.org/10.1126/science.7973651.
C. T. Clelland, V. Risca, and C. Bancroft, "Hiding messages in DNA microdots," Nature, vol. 399, no. 6736, pp. 533–534, 1999, https://doi.org/10.1038/21092.
M. Sabry, M. Hashem, T. Nazmy, and M. E. Khalifa, "Design of DNA-based Advanced Encryption Standard (AES)," 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 390-397, 2015, https://doi.org/10.1109/IntelCIS.2015.7397250.
S. Namasudra, G. C. Deka. Advances of DNA Computing in Cryptography (1st ed.). Chapman and Hall/CRC. 2018. https://doi.org/10.1201/9781351011419.
S. Singh and Y. Sharma, "A Review on DNA based Cryptography for Data Hiding," 2019 International Conference on Intelligent Sustainable Systems (ICISS), pp. 282-285, 2019, https://doi.org/10.1109/ISS1.2019.8908026.
M. A. Iliyasu, O. A. Abisoye, S. A. Bashir, and J. A. Ojeniyi, "A Review of DNA Cryptographic Approaches," 2020 IEEE 2nd International Conference on Cyberspace (CYBER NIGERIA), pp. 66-72, 2021, https://doi.org/10.1109/CYBERNIGERIA51635.2021.9428855.
Y. Niu, K. Zhao, X. Zhang, and G. Cui, "Review on DNA Cryptography," in Bio-inspired Computing: Theories and Applications, BIC-TA 2019, vol. 1160, 2020, https://doi.org/10.1007/978-981-15-3415-7_11.
A. Gahlaut, A. Bharti, Y. Dogra, and P. Singh, “DNA based cryptography,” In International Conference on Information, Communication and Computing Technology, pp. 205-215, 2017, https://doi.org/10.1007/978-981-10-6544-6_20.
O. A. Al-Harbi, W. E. Alahmadi, and A. O. Aljahdali, "Security Analysis of DNA-Based Steganography Techniques," SN Applied Sciences, vol. 2, p. 172, 2020, https://doi.org/10.1007/s42452-019-1930-1.
M. A. Farahat, A. Abdo, and S. K. Kassim, "A Systematic Literature Review of DNA-Based Steganography Techniques: Research Trends, Data Sets, Methods, and Frameworks," In Digital Transformation Technology, Lecture Notes in Networks and Systems, vol. 224, Springer, Singapore, 2022, https://doi.org/10.1007/978-981-16-2275-5_31.
P. Vijayakumar, V. Vijayalakshmi, and R. Rajashree, "Increased level of security using DNA steganography," International Journal of Advanced Intelligence Paradigms, vol. 10, pp. 74–82, 2018, https://doi.org/10.1504/IJAIP.2018.089490.
J. Gao and T. Xie, "DNA computing in cryptography," Advances in Computers, vol. 129, pp. 83-128, 2023, https://doi.org/10.1016/bs.adcom.2022.08.002.
S. Marwan, A. Shawish, and K. Nagaty, "DNA-based cryptographic methods for data hiding in DNA media," Biosystems, vol. 150, pp. 110-118, 2016, https://doi.org/10.1016/j.biosystems.2016.08.013.
G. Bhoi, R. Bhavsar, P. Prajapati, and P. Shah, "A Review of Recent Trends on DNA-Based Cryptography," 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp. 815-822, 2020, https://doi.org/10.1109/ICISS49785.2020.9316013.
L. Chu, Y. Su, X. Yao, P. Xu, and W. Liu, "A Review of DNA Cryptography," Intelligent Computing, vol. 4, p. 0106, 2025, https://doi.org/0000-0001-9091-3177.
P. Parmar, J. Gadhiya, S. Vats, D. K. Verma, K. Vaghela, "A Review of DNA Cryptography: From a Data Protection Perspective," 2023 16th International Conference on Security of Information and Networks (SIN), pp. 1-7, 2023, https://doi.org/10.1109/SIN60469.2023.10475078.
A. S. Nadhan and I. J. Jacob, "A secure lightweight cryptographic algorithm for the Internet of Things (IoT) based on Deoxyribonucleic Acid (DNA) sequences," Engineering Proceedings, vol. 59, no. 1, p. 31, 2023, https://doi.org/10.3390/engproc2023059031.
S. Fowler, R. Roush, J. Wise, Concepts of Biology, 2024. https://books.google.co.id/books?hl=id&lr=&id=H34gEQAAQBAJ.
J. D. Watson and F. H. Crick, "Molecular structure of nucleic acids: a structure for Deoxyribose Nucleic Acid," Nature, vol. 171, pp. 737–738, 1953, https://doi.org/10.1038/171737a0.
Y. Erlich and D. Zielinski, "DNA fountain enables a robust and efficient storage architecture," Science, vol. 355, no. 6328, pp. 950-954, 2017, https://doi.org/10.1126/science.aaj2038.
M. Amos, G. Păun, G. Rozenberg, and A. Salomaa, "Topics in the theory of DNA computing," Theoretical Computer Science, vol. 287, no. 1, pp. 3–38, 2002, https://doi.org/10.1016/S0304-3975(02)00134-2.
S. Palluk et al., "De novo DNA synthesis using polymerase-nucleotide conjugates," Nature Biotechnology, vol. 36, no. 7, pp. 645-650, 2018, https://doi.org/10.1038/nbt.4173.
R. Westermeier. Electrophoresis in Practice: A Guide to Methods and Applications of DNA and Protein Separations, 5th ed., Wiley, 2016. https://doi.org/10.1002/9783527695188.
C. Calude, G. Paun, Computing with cells and atoms: an introduction to quantum, DNA and membrane computing. CRC Press. 2000. https://books.google.co.id/books?hl=id&lr=&id=QoEuMMeVM9YC.
G. Paun, G. Rozenberg, and A. Salomaa. DNA Computing: New Computing Paradigms. Germany: Springer. 1998. https://doi.org/10.1007/978-3-662-03563-4.
L. Kari, S. Seki, and P. Sosík. DNA Computing - Foundations and Implications. in Handbook of Natural Computing. 2012. https://doi.org/10.1007/978-3-540-92910-9_33.
A. Williamson and H. S. Leiros, "Structural intermediates of a DNA-ligase complex illuminate the role of the catalytic metal ion and mechanism of phosphodiester bond formation," Nucleic Acids Research, vol. 47, no. 14, pp. 7147-7162, 2019, https://doi.org/10.1093/nar/gkz596.
F. Crick, "Central dogma of Molecular Biology," Nature, vol. 227, pp. 561–563, 1970, https://doi.org/10.1038/227561a0.
P. M. Selzer, R. J. Marhöfer, and O. Koch. The Biological Foundations of Bioinformatics, in Applied Bioinformatics. 2018. https://doi.org/10.1007/978-3-319-68301-0_1.
R. Bumgarner, "Overview of DNA microarrays: types, applications, and their future," Current Protocols in Molecular Biology, vol. 22, no. 22.1, 2013, https://doi.org/10.1002/0471142727.mb2201s101.
R. Rosselló-Móra, M. Urdiain, and A. López-López, "DNA–DNA Hybridization," in Methods in Microbiology, Academic Press, vol. 38, pp. 325-347, 2011, https://doi.org/10.1016/B978-0-12-387730-7.00015-2.
S. M. H. T. Yazdi, H. M. Kiah, E. Garcia-Ruiz, J. Ma, H. Zhao, and O. Milenkovic, "DNA-based storage: trends and methods," IEEE Transactions on Molecular, Biological, and Multi-Scale Communications, vol. 1, no. 3, pp. 230-248, 2015, https://doi.org/10.1109/TMBMC.2016.2537305.
Q. Liu, K. Yang, J. Xie and Y. Sun, "DNA-Based Molecular Computing, Storage, and Communications," in IEEE Internet of Things Journal, vol. 9, no. 2, pp. 897-915, 15 Jan.15, 2022, https://doi.org/10.1109/JIOT.2021.3083663.
H. Wang, "Proving theorems by pattern recognition I," Communications of the Association for Computing Machinery, vol. 3, no. 4, pp. 220–234, 1960, https://doi.org/10.1145/367177.367224.
F. Beggas and A. Lounici, "Generation of random sequences using DNA cryptography for OTP encryption," Biosystems, vol. 234, article 105064, 2023, https://doi.org/10.1016/j.biosystems.2023.105064.
A. Hazra, C. Lenka, A. Jha, and M. Younus, "A novel two-layer encryption algorithm using one-time pad and DNA cryptography," in Innovations in Computer Science and Engineering, Lecture Notes in Networks and Systems, vol. 103, 2020, https://doi.org/10.1007/978-981-15-2043-3_35.
A. Gehani, T. LaBean, and J. Reif, "DNA-based cryptography," in Aspects of Molecular Computing, pp. 167–188, 2003, https://doi.org/10.1007/978-3-540-24635-0_12.
J. Chen, "A DNA-based, biomolecular cryptography design," in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), vol. 3, p. 822, 2003, https://doi.org/10.1109/ISCAS.2003.1205146.
Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," in Proc. 3rd Int. Conf. Bio-Inspired Comput., Theories Appl., pp. 23–30, 2008, https://doi.org/10.1109/BICTA.2008.4656699.
E. Winfree, T. Eng, and G. Rozenberg, "String tile models for DNA computing by self-assembly," in Proc. Int. Workshop DNA-Based Comput., pp. 63–88, 2000, https://doi.org/10.1007/3-540-44992-2_6.
M. Hirabayashi, H. Kojima, and K. Oiwa, "Design of true random one-time pads in DNA XOR cryptosystem," Natural Computing, pp. 174–183, 2010, https://doi.org/10.1007/978-4-431-53868-4_20.
M. Hirabayashi, H. Kojima, and K. Oiwa, "Effective algorithm to encrypt information based on self-assembly of DNA tiles," Proc. Nucleic Acids Symp. Ser., vol. 53, pp. 79–80, 2009, https://doi.org/10.1093/nass/nrp040.
Z. Cheng, Y. Huang, and J. Xu, "Algorithm for elliptic curve Diffie–Hellman key exchange based on DNA tile self-assembly," in Proc. 3rd Int. Conf. Bio-Inspired Comput., Theories Appl., pp. 31–36, 2008, https://doi.org/10.1109/BICTA.2008.4656700.
G. Cui, L. Qin, Y. Wang, and X. Zhang, "An encryption scheme using DNA technology," in Proc. 3rd Int. Conf. Bio-Inspired Comput., Theories Appl., pp. 37–42, 2008, https://doi.org/10.1109/BICTA.2008.4656701.
K. Tanaka, A. Okamoto, and I. Saito, "Public-key system using DNA as a one-way function for key distribution," Biosystems, vol. 81, no. 1, pp. 25–29, 2005, https://doi.org/10.1016/j.biosystems.2005.01.004.
S. Namasudra, S. Sharma, G. C. Deka, and P. Lorenz, "DNA computing and table-based data accessing in the cloud environment," J. Netw. Comput. Appl., vol. 172, p. 102835, 2020, https://doi.org/10.1016/j.jnca.2020.102835.
L. Chu, Y. Su, X. Yao, P. Xu, and W. Liu, "A review of DNA cryptography," Intelligent Computing, vol. 4, p. 0106, 2025, https://orcid.org/0000-0001-9091-3177.
S.T. Dougherty, A. Korban, S. Sahinkaya, and D. Ustun, "Construction of DNA codes from composite matrices and a bio-inspired optimization algorithm," IEEE Trans. Inf. Theory, vol. 69, no. 3, pp. 1588–1603, 2023, https://doi.org/10.1109/TIT.2022.3217518.
K. Ning, "A pseudo DNA cryptography method," arXiv preprint arXiv:0903.2693, 2009. https://doi.org/10.48550/arXiv.0903.2693.
Q. Zhang, L. Guo, and X. Wei, "Image encryption using DNA addition combining with chaotic maps," Mathematical and Computer Modelling, vol. 52, no. 11–12, pp. 2028–2035, 2010, https://doi.org/10.1016/j.mcm.2010.06.005.
E. M. S. Hossain, K. M. R. Alam, M. R. Biswas and Y. Morimoto, "A DNA cryptographic technique based on dynamic DNA sequence table," 2016 19th International Conference on Computer and Information Technology (ICCIT), pp. 270-275, 2016, https://doi.org/10.1109/ICCITECHN.2016.7860208.
O. Tornea, M. Borda, T. Hodorogea, and M. Vaida, "Encryption system with indexing DNA chromosomes cryptographic algorithm," in Proc. IASTED Int. Conf., vol. 680, p. 99, 2010, https://doi.org/10.2316/J.2010.216.680-0099.
H. Liu, X. Wang, and A. Kadir, "Image encryption using DNA complementary rule and chaotic maps," Applied Soft Computing, vol. 12, no. 5, pp. 1457–1466, 2012, https://doi.org/10.1016/j.asoc.2012.01.016.
S. Sadeg, M. Gougache, N. Mansouri, and H. Drias, "An encryption algorithm inspired from DNA," in Proc. Int. Conf. Machine Web Intelligence, pp. 344–349, 2010, https://doi.org/10.1109/ICMWI.2010.5648076.
R. Enayatifar, A. H. Abdullah, and I. F. Isnin, "Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence," Optics and Lasers in Engineering, vol. 56, pp. 83–93, 2014, https://doi.org/10.1016/j.optlaseng.2013.12.003.
X. Wang and Q. Zhang, "DNA computing-based cryptography," in Proc. 4th Int. Conf. Bio-Inspired Comput., pp. 1–3, 2009, https://doi.org/10.1109/BICTA.2009.5338153.
J. Kalpana and P. Murali, "An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos," Optik, vol. 126, no. 24, pp. 5703–5709, 2015, https://doi.org/10.1016/j.ijleo.2015.09.091.
T. Mandge and V. Choudhary, "A DNA encryption technique based on matrix manipulation and secure key generation scheme," in Proc. Int. Conf. Inf. Commun. Embedded Syst. (ICICES), pp. 47–52, 2013, https://doi.org/10.1109/ICICES.2013.6508181.
X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, "A novel image encryption scheme based on DNA sequence operations and chaotic systems," Neural Computing and Applications, vol. 31, pp. 219–237, 2019, https://doi.org/10.1007/s00521-017-2993-9.
D. Prabhu, M. Adimoolam, "Bi-serial DNA encryption algorithm (BDEA)," arXiv preprint arXiv:1101.2577, 2011. https://arxiv.org/abs/1101.2577.
E. Z. Zefreh, "An image encryption scheme based on a hybrid model of DNA computing, chaotic systems, and hash functions," Multimedia Tools and Applications, vol. 79, no. 33–34, pp. 24993–25022, 2020, https://doi.org/10.1007/s11042-020-09111-1.
S. Zhou, Q. Zhang, and X. Wei, "An image encryption algorithm based on DNA self-assembly technology," in Proc. IEEE Int. Conf. Intell. Comput. Intell. Syst., vol. 2, pp. 315–319, 2010, https://doi.org/10.1109/ICICISYS.2010.5658364.
Q. Li, and L. Chen, "An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding," Multimedia Tools and Applications, vol. 83, no. 2, pp. 5351–5368, 2024, https://doi.org/10.1007/s11042-023-15550-3.
V. Kolate and R. Joshi, "An information security using DNA cryptography along with AES algorithm," Turkish Journal of Computer and Mathematics Education, vol. 12, no. 1S, pp. 183–192, 2021, https://doi.org/10.17762/turcomat.v12i1S.1607.
H. Liu, L. Teng, Y. Zhang, R. Si, and P. Liu, "Multi-medical image encryption by a new spatiotemporal chaos model and DNA computing for information security," Expert Systems with Applications, vol. 235, article 121090, 2024, https://doi.org/10.1016/j.eswa.2023.121090.
R. N. Grass, R. Heckel, C. Dessimoz, and W.J. Stark, "Genomic encryption of digital data stored in synthetic DNA," Angewandte Chemie International Edition in English, vol. 59, no. 22, pp. 8476–8480, 2020, https://doi.org/10.1002/anie.202001162.
M. Najaftorkaman and N. S. Kazazi, "A method to encrypt information with DNA-based cryptography," International Journal of Cyber-Security and Digital Forensics, vol. 4, no. 3, pp. 417–426, 2015, https://doi.org/10.17781/P001648.
M. Alawida, "A novel DNA tree-based chaotic image encryption algorithm," Journal of Information Security and Applications, vol. 83, article 103791, 2024, https://doi.org/10.1016/j.jisa.2024.103791.
C. S. Sreeja, M. Misbahuddin and N. P. Mohammed Hashim, "DNA for information security: A Survey on DNA computing and a pseudo DNA method based on central dogma of molecular biology," International Conference on Computing and Communication Technologies, pp. 1-6, 2014, https://doi.org/10.1109/ICCCT2.2014.7066757.
Hans Georg Schaathun, "Steganography and Steganalysis," in Machine Learning in Image Steganalysis , IEEE, pp.7-24, 2012, https://doi.org/10.1002/9781118437957.ch2.
A. Leier, C. Richter, W. Banzhaf, and H. Rauhe, "Cryptography with DNA binary strands," Biosystems, vol. 57, no. 1, pp. 13–22, 2000, https://doi.org/10.1016/S0303-2647(00)00083-6.
B. Shimanovsky, J. Feng, and M. Potkonjak, "Hiding data in DNA," in Proc. Int. Workshop Inf. Hiding, pp. 373–386, 2002, https://doi.org/10.1007/3-540-36415-3_24.
H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, "Data hiding methods based upon DNA sequences," Information Sciences, vol. 180, no. 11, pp. 2196–2208, 2010, https://doi.org/10.1016/j.ins.2010.01.030.
M. R. N. Torkaman, P. Nikfard, N. S. Kazazi, M. R. Abbasy, and S. F. Tabatabaiee, "Improving Hybrid Cryptosystems with DNA Steganography," in Digital Enterprise and Information Systems (DEIS 2011), vol. 194, 2011, https://doi.org/10.1007/978-3-642-22603-8_4.
M. R. Abbasy, A. A. Manaf, and M. Shahidan, "Data Hiding Method Based on DNA Basic Characteristics," in Digital Enterprise and Information Systems, pp. 53–62, 2011, https://doi.org/10.1007/978-3-642-22603-8_5.
H. Liu, D. Lin, and A. Kadir, "A Novel Data Hiding Method Based on Deoxyribonucleic Acid Coding," Computers & Electrical Engineering, vol. 39, no. 4, pp. 1164–1173, 2013, https://doi.org/10.1016/j.compeleceng.2013.01.017.
N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, "Image Steganography: A Review of the Recent Advances," IEEE Access, vol. 9, pp. 23409–23423, 2021, https://doi.org/10.1109/ACCESS.2021.3053998.
M. A. Majeed, R. Sulaiman, Z. Shukur, and M. K. Hasan, "A Review on Text Steganography Techniques," Mathematics, vol. 9, no. 21, p. 2829, 2021, https://doi.org/10.3390/math9212829.
M. A. Wani, and B. Sultan, "Deep Learning-Based Image Steganography: A Review," Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 13, no. 3, e1481, 2022, https://doi.org/10.1002/widm.1481.
G. K. Murthy and T. Kanimozhi, "Methodologies in Steganography and Cryptography – Review," in Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough, vol. 1117, 2024, https://doi.org/10.1007/978-3-031-43009-1_18.
Y. Sanjalawe, S. Al-E’mari, M. Abualhaj, and S. Fraihat, "A Deep Learning-Driven Multi-Layered Steganographic Approach for Enhanced Data Security," Scientific Reports, vol. 15, p. 4761, 2025, https://doi.org/10.1038/s41598-025-89189-5.
N. D. Majeed, A. J. Al-Askery, F. S. Hasan, and S. Abood, "A Survey on Steganography and Image Encryption Techniques," Electrical Engineering Technical Journal, vol. 2, no. 1, pp. 11–24, 2025, https://doi.org/10.51173/eetj.v2i1.13.
T. Kramp, R. van Kranenburg, and S. Lange, "Introduction to the Internet of Things," in Enabling Things to Talk, 2013, https://doi.org/10.1007/978-3-642-40403-0_1.
S. Dargaoui, M. Azrour, A. E. Allaoui, F. Amounas, A. Guezzaz, H. Attou, C. Hazman, S. Benkirane, and S. H. Bouazza, "An Overview of the Security Challenges in IoT Environment," in Advanced Technology for Smart Environment and Energy, pp. 151–160, 2023, https://doi.org/10.1007/978-3-031-25662-2_13.
M. Adam, M. Hammoudeh, R. Alrawashdeh, and B. Alsulaimy, "A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems," IEEE Access, vol. 12, pp. 57128–57149, 2024, https://doi.org/10.1109/ACCESS.2024.3382709.
L. D. Xu, Y. Lu, and L. Li, "Embedding Blockchain Technology Into IoT for Security: A Survey," IEEE Internet of Things Journal, vol. 8, no. 13, pp. 10452–10473, 2021, https://doi.org/10.1109/JIOT.2021.3060508.
Z. Ruan, "Blockchain Technology for Security Issues and Challenges in IoT," in 2023 International Conference on Computer Simulation and Modeling, Information Security (CSMIS), pp. 572–580, 2023, https://doi.org/10.1109/CSMIS60634.2023.00108.
R. M. Haris and S. Al-Maadeed, "Integrating Blockchain Technology in 5G-enabled IoT: A Review," in 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 367–371, 2020, https://doi.org/10.1109/ICIoT48696.2020.9089600.
I. Mistry, S. Tanwar, S. Tyagi, and N. Kumar, "Blockchain for 5G-enabled IoT for Industrial Automation: A Systematic Review, Solutions, and Challenges," Mechanical Systems and Signal Processing, vol. 135, 106382, 2020, https://doi.org/10.1016/j.ymssp.2019.106382.
M. Azrour, J. Mabrouki, A. Guezzaz, and A. Kanwal, "Internet of Things Security: Challenges and Key Issues," Security and Communication Networks, 2021, https://doi.org/10.1155/2021/5533843.
M. U. Bokhari, S. Afzal, I. Khan, and M. Z. Khan, "Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher," SN Computer Science, vol. 6, p. 88, 2025, https://doi.org/10.1007/s42979-024-03618-2.
K. S. Mohamed, "New Trends in Cryptography: Quantum, Blockchain, Lightweight, Chaotic, and DNA Cryptography," in New Frontiers in Cryptography, 2020, https://doi.org/10.1007/978-3-030-58996-7_4.
K. Rarhi and S. Saha, "Image Encryption in IoT Devices Using DNA and Hyperchaotic Neural Network," in Design Frameworks for Wireless Networks, vol. 82, 2020, https://doi.org/10.1007/978-981-13-9574-1_15.
M. A. F. Al-Husainy, B. Al-Shargabi, and S. Aljawarneh, "Lightweight cryptography system for IoT devices using DNA," Computers and Electrical Engineering, vol. 95, p. 107418, 2021, https://doi.org/10.1016/j.compeleceng.2021.107418.
M. Imdad, A. Fazil, S. N. B. Ramli, J. Ryu, H. B. Mahdin, and Z. Manzoor, "DNA-PRESENT: An Improved Security and Low-Latency, Lightweight Cryptographic Solution for IoT," Sensors, vol. 24, no. 24, p. 7900, 2024, https://doi.org/10.3390/s24247900.
G. Mathur, A. Pandey, and S. Goyal, "A review on blockchain for DNA sequence: security issues, application in DNA classification, challenges and future trends," Multimedia Tools and Applications, vol. 83, pp. 5813–5835, 2024, https://doi.org/10.1007/s11042-023-15857-1.
M. Mondal and K. S. Ray, “Review on DNA cryptography,” arXiv preprint arXiv:1904.05528, 2019, https://doi.org/10.48550/arXiv.1904.05528.
B. B. Raj and V. C. Sharmila, "An Survey on DNA Based Cryptography," 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR), pp. 1-3, 2018, https://doi.org/10.1109/ICETIETR.2018.8529075.
K. Jain, P. Krishnan and V. V. Rao, "A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography," 2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1-6, 2021, https://doi.org/10.1109/ICECCT52121.2021.9616899.
S. B. Sadkhan and B. S. Yaseen, "DNA-based cryptanalysis: challenges, and future trends," 2019 2nd Scientific Conference of Computer Sciences (SCCS), pp. 24–27, 2019, https://doi.org/10.1109/SCCS.2019.8852613.
O. H. Alhabeeb, F. Fauzi, and R. Sulaiman, "A review of modern DNA-based steganography approaches," International Journal of Advanced Computer Science and Applications, vol. 12, no. 10, pp. 184–196, 2021. https://doi.org/10.14569/IJACSA.2021.0121021.
F. M. Afify and K. H. Rahouma, "Applying Machine Learning for Securing Data Storage Using Random DNA Sequences and Pseudo-Random Sequence Generators,” In Advanced Machine Learning Technologies and Applications. AMLTA 2021, vol. 1339, 2021, https://doi.org/10.1007/978-3-030-69717-4_29S.
B. Rani and M, Popli, "A Novel Approach for Data Security Using DNA Cryptography with Artificial Bee Colony Algorithm in Cloud Computing," In Machine Learning for Edge Computing (pp. 69-82, 2022, https://doi.org/10.1201/9781003143468.

Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Mircea Ţălu

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.