Journal of Jilin University(Engineering and Technology Edition) ›› 2024, Vol. 54 ›› Issue (10): 2994-2999.doi: 10.13229/j.cnki.jdxbgxb.20230594

Previous Articles    

Hybrid encryption method for biological information database based on AES and hash algorithm

Han-chi YAN(),Chun-lin SU   

  1. School of Life Sciences,Tianjin University,Tianjin 300072,China
  • Received:2024-04-28 Online:2024-10-01 Published:2024-11-22

Abstract:

With the continuous development of network communication technology, intrusion attacks have become increasingly covert and difficult to detect, posing a serious threat to data security. To this end, a hybrid encryption method for biological information databases based on AES and Hash algorithms is designed. AES algorithm is used to map the Information mapping of biological data to the state matrix to obtain the key. After multiple rounds of byte replacement, row displacement, column confusion and round key addition, encryption operations are completed to obtain ciphertext. Use the MD5 function in the Hash algorithm and binary method to authenticate ciphertext data information. When an error message is found, trigger the reader to modify it to ensure data integrity. When a visitor sends an access request to the database, their identity information is reviewed through a reader. If the review is successful, they can access the database, and vice versa. Using AES algorithm to decrypt ciphertext, check if there is secondary identity information in the access permission identity of this file. If there is, read this data, otherwise, prohibit reading, and achieve mixed encryption of the two. The experimental results show that the proposed method can ensure the integrity of biological data information, and the time for data encryption, data decryption, and identity authentication is extremely short.

Key words: AES algorithm, Hash algorithm, bioinformatics database, secret civilization text, encryption operation

CLC Number: 

  • TP309.7

Fig.1

AES encryption and decryption schematic diagram"

Fig.2

Analysis of encryption time consumption for each method"

Fig.3

Analysis of decryption time consumption for various methods"

Fig.4

Analysis of authentication time consumption for date attribute sets of various methods"

Table 1

Comparative analysis of data integrity among various databases under DoS attacks"

信息库类型/非法用户访问识别本文方法图卷积神经网络支持向量机方法
PubMe10085.179.3
Ref Seq10088.977.1
db EST10079.185.3
Gene10086.278.4
ncRNAdb10085.788.1
miRBase10086.383.6
UNiprot10079.679.7
PDB1007.876.3
1 曹慧,刘馨莲,张录顺.生物信息数据库分析INHBA在结直肠癌中的表达及临床意义[J].电子科技大学学报,2022,51(2): 295-304.
Cao Hui, Liu Xin-lian, Zhang Lu-shun. Expression and clinical significance of INHBA in colorectal cancer based on bioinformatics databases[J]. Journal of University of Electronic Science and Technology of China, 2022, 51(2): 295-304.
2 王建茹,彭广操,朱明军.基于GEO数据库和生物信息学分析筛选小鼠心肌缺血再灌注损伤相关的潜在枢纽基因[J].上海交通大学学报:医学版,2022,42(1): 51-62.
Wang Jian-ru, Peng Guang-cao, Zhu Ming-jun. Screening potential hub genes associated with myocardial ischemia-reperfusion injury in mice based on GEO database and bioinformatics analysis[J]. Journal of Shanghai Jiaotong University(Medical Science), 2022,42(1): 51-62.
3 王一鹤,王焱,底斐瑶,等.基于TCGA数据库对前列腺癌中免疫相关的长链非编码RNA(lncRNA)的生物信息学分析[J].细胞与分子免疫学杂志,2021,37(2): 113-118.
Wang Yi-he, Wang Yan, Di Fei-yao, et al. Bioinformatic analysis of immune-related lncRNA based on TCGA database in patients with prostate cancer[J]. Chinese Journal of Cellular and Molecular Immunology, 2021,37(2): 113-118.
4 龙草芳,肖衡.无线传感器网络分布式数据库加密方法研究[J].传感技术学报,2022,35(8):1131-1136.
Long Cao-fang, Xiao Heng. Research on encryption method of distributed database in wireless sensor network[J]. Chinese Journal of Sensors and Actuators, 2022,35(8): 1131-1136.
5 孙僖泽,周福才,李宇溪,等.基于可搜索加密机制的数据库加密方案[J].计算机学报,2021,44(4):806-819.
Sun Xi-ze, Zhou Fu-cai, Li Yu-xi, et al. A database encryption scheme based on searchable encryption[J]. Chinese Journal of Computers, 2021,44(4): 806-819.
6 陈君.基于B/S结构的异构数据库加密算法仿真[J].计算机仿真,2021,38(4):236-239, 262.
Chen Jun. Simulation of heterogeneous database encryption algorithm based on B/S structure[J]. Computer Simulation, 2021,38(4): 236-239, 262.
7 聂一,郑博文,柴志雷.基于异构可重构计算的AES加密系统研究[J].计算机应用研究,2022,39(7):2143-2148.
Nie Yi, Zheng Bo-wen, Chai Zhi-lei. AES encryption system based on heterogeneous reconfigurable computing[J]. Application Research of Computers, 2022,39(7): 2143-2148.
8 Jiang H, Zhu X, Pang J, et al. A method for fault recognition in the last three rounds of advanced encryption standard[J]. Electronics Letters, 2021, 57(13): 511-513.
9 Garipcan A M, Design Erdem E., FPGA implementation and statistical analysis of a high-speed and low-area TRNG based on an AES S-box post-processing technique[J]. ISA Transactions, 2021,117: 160-171.
10 辜双佳,刘万平,黄东.基于AES和QR的快递信息加密应用[J].计算机科学,2021,48(): 588-591, 624.
Gu Shuang-jia, Liu Wan-ping, Huang Dong. Application of express information encryption based on AES and QR[J]. Computer Science, 2021,48(Sup.2): 588-591, 624.
11 Choi P, Kong W, Kim J H, et al. Architectural supports for block ciphers in a RISC CPU core by instruction overloading[J]. IEEE Transactions on Computers, 2021(99): 1-13.
12 Kumar R, Liu X, Suresh V, et al. A time-/frequency-domain side-channel attack resistant AES-128 and RSA-4K crypto-processor in 14 nm CMOS[J]. IEEE Journal of Solid-State Circuits, 2021(99):1-14.
13 童宇,蔡婧雯.针对AES算法的两点联合能量分析攻击及仿真[J].系统仿真学报,2021,33(8): 1980-1988.
Tong Yu, Cai Jing-wen. Two-point joint CPA attacks against AES and its simulation[J]. Journal of System Simulation, 2021,33(8): 1980-1988.
14 张丽,吴文玲,张蕾,等.基于交换等价的缩减轮AES-128的密钥恢复攻击[J].计算机研究与发展,2021,58(10): 2213-2221.
Zhang Li, Wu Wen-ling, Zhang Lei, et al. Key-Recovery attack on reduced-round AES-128 using the exchange-equivalence[J]. Journal of Computer Research and Development, 2021,58(10): 2213-2221.
15 谷正川,郭渊博,方晨.基于代理重加密的消息队列遥测传输协议端到端安全解决方案[J].计算机应用,2021,41(5): 1378-1385.
Gu Zheng-chuan, Guo Yuan-bo, Fang Chen. End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption[J]. Journal of Computer Applications, 2021,41(5): 1378-1385.
16 Zhang Q, Han J, Ye Y. Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding[J]. IET Image Processing, 2021,15(4): 885-896.
17 Mao J Y, Pan Q K, Miao Z H, et al. A hash map-based memetic algorithm for the distributed permutation flowshop scheduling problem with preventive maintenance to minimize total flowtime[J]. Knowledge-based Systems, 2022,242(6): No.108413.
18 邓宇乔,宋歌,杨波,等.基于身份的可验证密钥的公钥内积函数加密算法[J].计算机学报,2021,44(1):209-221.
Deng Yu-qiao, Song Ge, Yang Bo, et al. Identity-based inner product functional encryption with verified secret key[J]. Chinese Journal of Computers, 2021,44(1): 209-221.
19 魏爽,江荣旺,乔艳琰.基于无证书代理环签名的光纤通信数据加密传输[J].激光杂志,2022,43(9):154-158.
Wei Shuang, Jiang Rong-wang, Qiao Yan-yan. Encryption transmission of optical fiber communication data based on certificateless proxy ring signature[J]. Laser Journal, 2022,43(9): 154-158.
20 潘登,钟诚.二级Hash全局和局部索引筛选的长序列比对并行算法[J].小型微型计算机系统,2022,43(9): 1999-2004.
Pan Deng, Zhong Cheng. Parallel algorithm for long-read alignment using two-level global and local hash index filtering[J]. Journal of Chinese Computer Systems, 2022,43(9): 1999-2004.
21 黎琳,张芳,张闻宇.一种实现数据库同态计算的ELGamal重加密算法[J]. 北京交通大学学报,2021,45(2): 127-134.
Li Lin, Zhang Fang, Zhang Wen-yu. ELGamal re-encryption algorithm for database homomorphic computation[J]. Journal of Beijing Jiaotong University, 2021,45(2): 127-134.
[1] Xian-feng GUO,Hao-hua LI,Jin-yu WEI. Image encryption scheme based on Fibonacci transform and improved Logistic-Tent chaotic map [J]. Journal of Jilin University(Engineering and Technology Edition), 2023, 53(7): 2115-2120.
[2] Guang-song LI,Wen-qing LI,Qing LI. Encrypted and compressed traffic classification based on random feature set [J]. Journal of Jilin University(Engineering and Technology Edition), 2021, 51(4): 1375-1386.
[3] ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267.
[4] HU Liang, YAN Zhi-jia, CHU Jian-feng, YUAN Wei, XU Xiao-bo. Cryptanalysis and improvement on subkey extendable algorithm of IDEA [J]. , 2012, (06): 1515-1520.
[5] LI Zhi-min, XU Xin, LI Cun-hua. Multi-domain signcryption algorithm for communication of mobile Ad hoc networks [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 322-326.
[6] GUO Ping, DAN Guang-xiang. Mixed encryption algorithm in cloud computing [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 327-331.
[7] HU Liang, CHI Ling, YUAN Wei, CHU Jian-feng, XU Xiao-bo. Improvements against fault induction attack for RC4 algorithm [J]. , 2012, 42(05): 1231-1236.
[8] HU Liang,YUAN Wei,YU Meng-tao, CHU Jian-feng, LIU Fang . One-way property strategy and improvement of key generation algorithm of Rijndael [J]. 吉林大学学报(工学版), 2009, 39(01): 137-142.
[9] YANG Jia-xi1, LI Lei1,2,ZHU Hui1, WANG Yu-min1 . Publicity verifiable fair electronic auction protocol [J]. 吉林大学学报(工学版), 2008, 38(04): 886-889.
[10] Hu De-bin,Wang Jin-ling,Yu Meng-tao,Lin Yu,Hu Liang . ID alias IBE scheme with a trusted third party [J]. 吉林大学学报(工学版), 2008, 38(02): 419-0422.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!