吉林大学学报(工学版) ›› 2024, Vol. 54 ›› Issue (10): 2994-2999.doi: 10.13229/j.cnki.jdxbgxb.20230594

• 计算机科学与技术 • 上一篇    

基于AES和Hash算法的生物信息数据库混合加密方法

严汉池(),苏春林   

  1. 天津大学 生命科学学院,天津 300072
  • 收稿日期:2024-04-28 出版日期:2024-10-01 发布日期:2024-11-22
  • 作者简介:严汉池(1975-),男,教授,博士.研究方向:结构生物学.E-mail:yanhanchi7895@126.com
  • 基金资助:
    国家自然科学基金项目(31870742)

Hybrid encryption method for biological information database based on AES and hash algorithm

Han-chi YAN(),Chun-lin SU   

  1. School of Life Sciences,Tianjin University,Tianjin 300072,China
  • Received:2024-04-28 Online:2024-10-01 Published:2024-11-22

摘要:

针对生物信息数据库入侵攻击行为越来越隐蔽、严重威胁数据安全性,本文设计了一种基于AES和Hash算法的生物信息数据库混合加密方法。采用AES算法将生物数据信息映射至状态矩阵中得出密钥,经过多轮的字节替换、行位移、列混淆与轮密钥加运算,完成加密运算,得到密文。使用Hash算法中MD5函数、二进制方式认证密文数据信息,发现错误信息时触发阅读器对其修改,保证数据的完整性。当访问者向数据库发出访问请求时,通过阅读器审查其身份信息,若审查通过,则可以访问此数据库;反之,不能访问。采用AES算法解密密文,查找此文件访问权限身份中是否有此身份信息,若有,读取此数据;反之,禁止读取,实现二者的混合加密。实验结果表明,本文方法能保证生物数据信息的完整性,且数据加密、数据解密和身份认证时间极短。

关键词: AES算法, Hash算法, 生物信息数据库, 密文明文, 加密运算

Abstract:

With the continuous development of network communication technology, intrusion attacks have become increasingly covert and difficult to detect, posing a serious threat to data security. To this end, a hybrid encryption method for biological information databases based on AES and Hash algorithms is designed. AES algorithm is used to map the Information mapping of biological data to the state matrix to obtain the key. After multiple rounds of byte replacement, row displacement, column confusion and round key addition, encryption operations are completed to obtain ciphertext. Use the MD5 function in the Hash algorithm and binary method to authenticate ciphertext data information. When an error message is found, trigger the reader to modify it to ensure data integrity. When a visitor sends an access request to the database, their identity information is reviewed through a reader. If the review is successful, they can access the database, and vice versa. Using AES algorithm to decrypt ciphertext, check if there is secondary identity information in the access permission identity of this file. If there is, read this data, otherwise, prohibit reading, and achieve mixed encryption of the two. The experimental results show that the proposed method can ensure the integrity of biological data information, and the time for data encryption, data decryption, and identity authentication is extremely short.

Key words: AES algorithm, Hash algorithm, bioinformatics database, secret civilization text, encryption operation

中图分类号: 

  • TP309.7

图1

AES加密、解密示意图"

图2

各方法加密耗时分析"

图3

各方法加密耗时分析"

图4

各方法数据属性集认证耗时分析"

表1

DoS攻击下各数据库数据完整性对比分析 (%)"

信息库类型/非法用户访问识别本文方法图卷积神经网络支持向量机方法
PubMe10085.179.3
Ref Seq10088.977.1
db EST10079.185.3
Gene10086.278.4
ncRNAdb10085.788.1
miRBase10086.383.6
UNiprot10079.679.7
PDB1007.876.3
1 曹慧,刘馨莲,张录顺.生物信息数据库分析INHBA在结直肠癌中的表达及临床意义[J].电子科技大学学报,2022,51(2): 295-304.
Cao Hui, Liu Xin-lian, Zhang Lu-shun. Expression and clinical significance of INHBA in colorectal cancer based on bioinformatics databases[J]. Journal of University of Electronic Science and Technology of China, 2022, 51(2): 295-304.
2 王建茹,彭广操,朱明军.基于GEO数据库和生物信息学分析筛选小鼠心肌缺血再灌注损伤相关的潜在枢纽基因[J].上海交通大学学报:医学版,2022,42(1): 51-62.
Wang Jian-ru, Peng Guang-cao, Zhu Ming-jun. Screening potential hub genes associated with myocardial ischemia-reperfusion injury in mice based on GEO database and bioinformatics analysis[J]. Journal of Shanghai Jiaotong University(Medical Science), 2022,42(1): 51-62.
3 王一鹤,王焱,底斐瑶,等.基于TCGA数据库对前列腺癌中免疫相关的长链非编码RNA(lncRNA)的生物信息学分析[J].细胞与分子免疫学杂志,2021,37(2): 113-118.
Wang Yi-he, Wang Yan, Di Fei-yao, et al. Bioinformatic analysis of immune-related lncRNA based on TCGA database in patients with prostate cancer[J]. Chinese Journal of Cellular and Molecular Immunology, 2021,37(2): 113-118.
4 龙草芳,肖衡.无线传感器网络分布式数据库加密方法研究[J].传感技术学报,2022,35(8):1131-1136.
Long Cao-fang, Xiao Heng. Research on encryption method of distributed database in wireless sensor network[J]. Chinese Journal of Sensors and Actuators, 2022,35(8): 1131-1136.
5 孙僖泽,周福才,李宇溪,等.基于可搜索加密机制的数据库加密方案[J].计算机学报,2021,44(4):806-819.
Sun Xi-ze, Zhou Fu-cai, Li Yu-xi, et al. A database encryption scheme based on searchable encryption[J]. Chinese Journal of Computers, 2021,44(4): 806-819.
6 陈君.基于B/S结构的异构数据库加密算法仿真[J].计算机仿真,2021,38(4):236-239, 262.
Chen Jun. Simulation of heterogeneous database encryption algorithm based on B/S structure[J]. Computer Simulation, 2021,38(4): 236-239, 262.
7 聂一,郑博文,柴志雷.基于异构可重构计算的AES加密系统研究[J].计算机应用研究,2022,39(7):2143-2148.
Nie Yi, Zheng Bo-wen, Chai Zhi-lei. AES encryption system based on heterogeneous reconfigurable computing[J]. Application Research of Computers, 2022,39(7): 2143-2148.
8 Jiang H, Zhu X, Pang J, et al. A method for fault recognition in the last three rounds of advanced encryption standard[J]. Electronics Letters, 2021, 57(13): 511-513.
9 Garipcan A M, Design Erdem E., FPGA implementation and statistical analysis of a high-speed and low-area TRNG based on an AES S-box post-processing technique[J]. ISA Transactions, 2021,117: 160-171.
10 辜双佳,刘万平,黄东.基于AES和QR的快递信息加密应用[J].计算机科学,2021,48(): 588-591, 624.
Gu Shuang-jia, Liu Wan-ping, Huang Dong. Application of express information encryption based on AES and QR[J]. Computer Science, 2021,48(Sup.2): 588-591, 624.
11 Choi P, Kong W, Kim J H, et al. Architectural supports for block ciphers in a RISC CPU core by instruction overloading[J]. IEEE Transactions on Computers, 2021(99): 1-13.
12 Kumar R, Liu X, Suresh V, et al. A time-/frequency-domain side-channel attack resistant AES-128 and RSA-4K crypto-processor in 14 nm CMOS[J]. IEEE Journal of Solid-State Circuits, 2021(99):1-14.
13 童宇,蔡婧雯.针对AES算法的两点联合能量分析攻击及仿真[J].系统仿真学报,2021,33(8): 1980-1988.
Tong Yu, Cai Jing-wen. Two-point joint CPA attacks against AES and its simulation[J]. Journal of System Simulation, 2021,33(8): 1980-1988.
14 张丽,吴文玲,张蕾,等.基于交换等价的缩减轮AES-128的密钥恢复攻击[J].计算机研究与发展,2021,58(10): 2213-2221.
Zhang Li, Wu Wen-ling, Zhang Lei, et al. Key-Recovery attack on reduced-round AES-128 using the exchange-equivalence[J]. Journal of Computer Research and Development, 2021,58(10): 2213-2221.
15 谷正川,郭渊博,方晨.基于代理重加密的消息队列遥测传输协议端到端安全解决方案[J].计算机应用,2021,41(5): 1378-1385.
Gu Zheng-chuan, Guo Yuan-bo, Fang Chen. End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption[J]. Journal of Computer Applications, 2021,41(5): 1378-1385.
16 Zhang Q, Han J, Ye Y. Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding[J]. IET Image Processing, 2021,15(4): 885-896.
17 Mao J Y, Pan Q K, Miao Z H, et al. A hash map-based memetic algorithm for the distributed permutation flowshop scheduling problem with preventive maintenance to minimize total flowtime[J]. Knowledge-based Systems, 2022,242(6): No.108413.
18 邓宇乔,宋歌,杨波,等.基于身份的可验证密钥的公钥内积函数加密算法[J].计算机学报,2021,44(1):209-221.
Deng Yu-qiao, Song Ge, Yang Bo, et al. Identity-based inner product functional encryption with verified secret key[J]. Chinese Journal of Computers, 2021,44(1): 209-221.
19 魏爽,江荣旺,乔艳琰.基于无证书代理环签名的光纤通信数据加密传输[J].激光杂志,2022,43(9):154-158.
Wei Shuang, Jiang Rong-wang, Qiao Yan-yan. Encryption transmission of optical fiber communication data based on certificateless proxy ring signature[J]. Laser Journal, 2022,43(9): 154-158.
20 潘登,钟诚.二级Hash全局和局部索引筛选的长序列比对并行算法[J].小型微型计算机系统,2022,43(9): 1999-2004.
Pan Deng, Zhong Cheng. Parallel algorithm for long-read alignment using two-level global and local hash index filtering[J]. Journal of Chinese Computer Systems, 2022,43(9): 1999-2004.
21 黎琳,张芳,张闻宇.一种实现数据库同态计算的ELGamal重加密算法[J]. 北京交通大学学报,2021,45(2): 127-134.
Li Lin, Zhang Fang, Zhang Wen-yu. ELGamal re-encryption algorithm for database homomorphic computation[J]. Journal of Beijing Jiaotong University, 2021,45(2): 127-134.
[1] 郭现峰,李浩华,魏金玉. 基于Fibonacci变换和改进Logistic-Tent混沌映射的图像加密方案[J]. 吉林大学学报(工学版), 2023, 53(7): 2115-2120.
[2] 李光松,李文清,李青. 基于随机性特征的加密和压缩流量分类[J]. 吉林大学学报(工学版), 2021, 51(4): 1375-1386.
[3] 赵博, 秦贵和, 赵永哲, 杨文迪. 基于半陷门单向函数的公钥密码[J]. 吉林大学学报(工学版), 2018, 48(1): 259-267.
[4] 胡亮, 闫智佳, 初剑峰, 袁巍, 徐小博. 改进的国际数据加密算法的子密钥扩展算法[J]. , 2012, (06): 1515-1520.
[5] 李志敏, 徐馨, 李存华. 适于移动Ad hoc网络通信的多域签密算法[J]. 吉林大学学报(工学版), 2012, 42(增刊1): 322-326.
[6] 郭平, 但光祥. 云计算中的混合加密算法[J]. 吉林大学学报(工学版), 2012, 42(增刊1): 327-331.
[7] 胡亮, 迟令, 袁巍, 初剑峰, 徐小博. 基于抵抗故障引入攻击的RC4算法的改进[J]. , 2012, 42(05): 1231-1236.
[8] 胡亮,袁巍,于孟涛,初剑峰,刘方 . 单向性策略与AES密钥生成算法的改进[J]. 吉林大学学报(工学版), 2009, 39(01): 137-142.
[9] 杨加喜,李磊,,朱辉,王育民 . 一种公平的可公开验证的电子拍卖协议[J]. 吉林大学学报(工学版), 2008, 38(04): 886-889.
[10] 胡德斌,王金玲,于孟涛,林宇,胡亮 . 基于身份别名的加入辅助认证方的IBE方案[J]. 吉林大学学报(工学版), 2008, 38(02): 419-0422.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!